Oct 2 19:13:31.837619 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Oct 2 17:52:37 -00 2023 Oct 2 19:13:31.837644 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:13:31.837657 kernel: BIOS-provided physical RAM map: Oct 2 19:13:31.837665 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Oct 2 19:13:31.837673 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable Oct 2 19:13:31.837680 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Oct 2 19:13:31.837690 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable Oct 2 19:13:31.837699 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Oct 2 19:13:31.837707 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable Oct 2 19:13:31.837717 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Oct 2 19:13:31.837725 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable Oct 2 19:13:31.837733 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Oct 2 19:13:31.837741 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Oct 2 19:13:31.837749 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Oct 2 19:13:31.837760 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Oct 2 19:13:31.837771 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Oct 2 19:13:31.837779 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Oct 2 19:13:31.837788 kernel: NX (Execute Disable) protection: active Oct 2 19:13:31.837797 kernel: e820: update [mem 0x9b3fa018-0x9b403c57] usable ==> usable Oct 2 19:13:31.837806 kernel: e820: update [mem 0x9b3fa018-0x9b403c57] usable ==> usable Oct 2 19:13:31.837814 kernel: e820: update [mem 0x9b3bd018-0x9b3f9e57] usable ==> usable Oct 2 19:13:31.837822 kernel: e820: update [mem 0x9b3bd018-0x9b3f9e57] usable ==> usable Oct 2 19:13:31.837830 kernel: extended physical RAM map: Oct 2 19:13:31.837838 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable Oct 2 19:13:31.837847 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable Oct 2 19:13:31.837857 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Oct 2 19:13:31.837865 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable Oct 2 19:13:31.837873 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Oct 2 19:13:31.837881 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable Oct 2 19:13:31.837889 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Oct 2 19:13:31.837897 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b3bd017] usable Oct 2 19:13:31.837905 kernel: reserve setup_data: [mem 0x000000009b3bd018-0x000000009b3f9e57] usable Oct 2 19:13:31.837913 kernel: reserve setup_data: [mem 0x000000009b3f9e58-0x000000009b3fa017] usable Oct 2 19:13:31.837921 kernel: reserve setup_data: [mem 0x000000009b3fa018-0x000000009b403c57] usable Oct 2 19:13:31.837929 kernel: reserve setup_data: [mem 0x000000009b403c58-0x000000009c8eefff] usable Oct 2 19:13:31.837937 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Oct 2 19:13:31.837947 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Oct 2 19:13:31.837955 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Oct 2 19:13:31.837963 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Oct 2 19:13:31.837972 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Oct 2 19:13:31.837984 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Oct 2 19:13:31.837993 kernel: efi: EFI v2.70 by EDK II Oct 2 19:13:31.838002 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b773018 RNG=0x9cb75018 Oct 2 19:13:31.838013 kernel: random: crng init done Oct 2 19:13:31.838022 kernel: SMBIOS 2.8 present. Oct 2 19:13:31.838031 kernel: DMI: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015 Oct 2 19:13:31.838040 kernel: Hypervisor detected: KVM Oct 2 19:13:31.838049 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Oct 2 19:13:31.838058 kernel: kvm-clock: cpu 0, msr 1ff8a001, primary cpu clock Oct 2 19:13:31.838067 kernel: kvm-clock: using sched offset of 5357280948 cycles Oct 2 19:13:31.838077 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Oct 2 19:13:31.838086 kernel: tsc: Detected 2794.748 MHz processor Oct 2 19:13:31.838099 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 2 19:13:31.838109 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 2 19:13:31.838178 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 Oct 2 19:13:31.838189 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 2 19:13:31.838199 kernel: Using GB pages for direct mapping Oct 2 19:13:31.838208 kernel: Secure boot disabled Oct 2 19:13:31.838218 kernel: ACPI: Early table checksum verification disabled Oct 2 19:13:31.838227 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) Oct 2 19:13:31.838237 kernel: ACPI: XSDT 0x000000009CB7D0E8 00004C (v01 BOCHS BXPC 00000001 01000013) Oct 2 19:13:31.838249 kernel: ACPI: FACP 0x000000009CB7A000 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:13:31.838259 kernel: ACPI: DSDT 0x000000009CB7B000 001A39 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:13:31.838269 kernel: ACPI: FACS 0x000000009CBDD000 000040 Oct 2 19:13:31.838278 kernel: ACPI: APIC 0x000000009CB79000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:13:31.838288 kernel: ACPI: HPET 0x000000009CB78000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:13:31.838297 kernel: ACPI: WAET 0x000000009CB77000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:13:31.838307 kernel: ACPI: BGRT 0x000000009CB76000 000038 (v01 INTEL EDK2 00000002 01000013) Oct 2 19:13:31.838317 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb7a000-0x9cb7a073] Oct 2 19:13:31.838326 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7b000-0x9cb7ca38] Oct 2 19:13:31.838338 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] Oct 2 19:13:31.838347 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb79000-0x9cb7908f] Oct 2 19:13:31.838357 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb78000-0x9cb78037] Oct 2 19:13:31.838366 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb77000-0x9cb77027] Oct 2 19:13:31.838376 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb76000-0x9cb76037] Oct 2 19:13:31.838385 kernel: No NUMA configuration found Oct 2 19:13:31.838395 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] Oct 2 19:13:31.838404 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] Oct 2 19:13:31.838414 kernel: Zone ranges: Oct 2 19:13:31.838425 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 2 19:13:31.838434 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] Oct 2 19:13:31.838443 kernel: Normal empty Oct 2 19:13:31.838452 kernel: Movable zone start for each node Oct 2 19:13:31.838470 kernel: Early memory node ranges Oct 2 19:13:31.838479 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Oct 2 19:13:31.838487 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] Oct 2 19:13:31.838513 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] Oct 2 19:13:31.838523 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] Oct 2 19:13:31.838537 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] Oct 2 19:13:31.838546 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] Oct 2 19:13:31.838556 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] Oct 2 19:13:31.838565 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 2 19:13:31.838574 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Oct 2 19:13:31.838583 kernel: On node 0, zone DMA: 8 pages in unavailable ranges Oct 2 19:13:31.838592 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 2 19:13:31.838601 kernel: On node 0, zone DMA: 240 pages in unavailable ranges Oct 2 19:13:31.838610 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges Oct 2 19:13:31.838622 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges Oct 2 19:13:31.838632 kernel: ACPI: PM-Timer IO Port: 0xb008 Oct 2 19:13:31.838641 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Oct 2 19:13:31.838650 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Oct 2 19:13:31.838659 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Oct 2 19:13:31.838669 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Oct 2 19:13:31.838678 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 2 19:13:31.838687 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Oct 2 19:13:31.838697 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Oct 2 19:13:31.838709 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 2 19:13:31.838718 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Oct 2 19:13:31.838727 kernel: TSC deadline timer available Oct 2 19:13:31.838736 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Oct 2 19:13:31.838745 kernel: kvm-guest: KVM setup pv remote TLB flush Oct 2 19:13:31.838754 kernel: kvm-guest: setup PV sched yield Oct 2 19:13:31.838762 kernel: [mem 0x9d000000-0xffffffff] available for PCI devices Oct 2 19:13:31.838771 kernel: Booting paravirtualized kernel on KVM Oct 2 19:13:31.838781 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 2 19:13:31.838791 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Oct 2 19:13:31.838803 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u524288 Oct 2 19:13:31.838813 kernel: pcpu-alloc: s185624 r8192 d31464 u524288 alloc=1*2097152 Oct 2 19:13:31.838829 kernel: pcpu-alloc: [0] 0 1 2 3 Oct 2 19:13:31.838840 kernel: kvm-guest: setup async PF for cpu 0 Oct 2 19:13:31.838849 kernel: kvm-guest: stealtime: cpu 0, msr 9b01c0c0 Oct 2 19:13:31.838859 kernel: kvm-guest: PV spinlocks enabled Oct 2 19:13:31.838869 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Oct 2 19:13:31.838878 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 Oct 2 19:13:31.838888 kernel: Policy zone: DMA32 Oct 2 19:13:31.838899 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:13:31.838909 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 19:13:31.838922 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Oct 2 19:13:31.838931 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 19:13:31.838940 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 19:13:31.838950 kernel: Memory: 2400508K/2567000K available (12294K kernel code, 2274K rwdata, 13692K rodata, 45372K init, 4176K bss, 166232K reserved, 0K cma-reserved) Oct 2 19:13:31.838961 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Oct 2 19:13:31.838971 kernel: ftrace: allocating 34453 entries in 135 pages Oct 2 19:13:31.838980 kernel: ftrace: allocated 135 pages with 4 groups Oct 2 19:13:31.838990 kernel: rcu: Hierarchical RCU implementation. Oct 2 19:13:31.839000 kernel: rcu: RCU event tracing is enabled. Oct 2 19:13:31.839010 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Oct 2 19:13:31.839019 kernel: Rude variant of Tasks RCU enabled. Oct 2 19:13:31.839029 kernel: Tracing variant of Tasks RCU enabled. Oct 2 19:13:31.839039 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 19:13:31.839051 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Oct 2 19:13:31.839060 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Oct 2 19:13:31.839070 kernel: Console: colour dummy device 80x25 Oct 2 19:13:31.839080 kernel: printk: console [ttyS0] enabled Oct 2 19:13:31.839089 kernel: ACPI: Core revision 20210730 Oct 2 19:13:31.839099 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Oct 2 19:13:31.839108 kernel: APIC: Switch to symmetric I/O mode setup Oct 2 19:13:31.839140 kernel: x2apic enabled Oct 2 19:13:31.839150 kernel: Switched APIC routing to physical x2apic. Oct 2 19:13:31.839159 kernel: kvm-guest: setup PV IPIs Oct 2 19:13:31.839172 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Oct 2 19:13:31.839182 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Oct 2 19:13:31.839191 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Oct 2 19:13:31.839201 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Oct 2 19:13:31.839211 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Oct 2 19:13:31.839221 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Oct 2 19:13:31.839231 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 2 19:13:31.839240 kernel: Spectre V2 : Mitigation: Retpolines Oct 2 19:13:31.839252 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Oct 2 19:13:31.839262 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Oct 2 19:13:31.839272 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Oct 2 19:13:31.839282 kernel: RETBleed: Mitigation: untrained return thunk Oct 2 19:13:31.839292 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Oct 2 19:13:31.839302 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Oct 2 19:13:31.839312 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 2 19:13:31.839322 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 2 19:13:31.839332 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 2 19:13:31.839344 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 2 19:13:31.839354 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Oct 2 19:13:31.839364 kernel: Freeing SMP alternatives memory: 32K Oct 2 19:13:31.839373 kernel: pid_max: default: 32768 minimum: 301 Oct 2 19:13:31.839383 kernel: LSM: Security Framework initializing Oct 2 19:13:31.839393 kernel: SELinux: Initializing. Oct 2 19:13:31.839403 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 2 19:13:31.839413 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 2 19:13:31.839423 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Oct 2 19:13:31.839434 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Oct 2 19:13:31.839444 kernel: ... version: 0 Oct 2 19:13:31.839454 kernel: ... bit width: 48 Oct 2 19:13:31.839471 kernel: ... generic registers: 6 Oct 2 19:13:31.839481 kernel: ... value mask: 0000ffffffffffff Oct 2 19:13:31.839491 kernel: ... max period: 00007fffffffffff Oct 2 19:13:31.839501 kernel: ... fixed-purpose events: 0 Oct 2 19:13:31.839510 kernel: ... event mask: 000000000000003f Oct 2 19:13:31.839533 kernel: signal: max sigframe size: 1776 Oct 2 19:13:31.839546 kernel: rcu: Hierarchical SRCU implementation. Oct 2 19:13:31.839556 kernel: smp: Bringing up secondary CPUs ... Oct 2 19:13:31.839566 kernel: x86: Booting SMP configuration: Oct 2 19:13:31.839576 kernel: .... node #0, CPUs: #1 Oct 2 19:13:31.839585 kernel: kvm-clock: cpu 1, msr 1ff8a041, secondary cpu clock Oct 2 19:13:31.839596 kernel: kvm-guest: setup async PF for cpu 1 Oct 2 19:13:31.839605 kernel: kvm-guest: stealtime: cpu 1, msr 9b09c0c0 Oct 2 19:13:31.839615 kernel: #2 Oct 2 19:13:31.839625 kernel: kvm-clock: cpu 2, msr 1ff8a081, secondary cpu clock Oct 2 19:13:31.839635 kernel: kvm-guest: setup async PF for cpu 2 Oct 2 19:13:31.839647 kernel: kvm-guest: stealtime: cpu 2, msr 9b11c0c0 Oct 2 19:13:31.839656 kernel: #3 Oct 2 19:13:31.839666 kernel: kvm-clock: cpu 3, msr 1ff8a0c1, secondary cpu clock Oct 2 19:13:31.839676 kernel: kvm-guest: setup async PF for cpu 3 Oct 2 19:13:31.839685 kernel: kvm-guest: stealtime: cpu 3, msr 9b19c0c0 Oct 2 19:13:31.839695 kernel: smp: Brought up 1 node, 4 CPUs Oct 2 19:13:31.839705 kernel: smpboot: Max logical packages: 1 Oct 2 19:13:31.839714 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Oct 2 19:13:31.839724 kernel: devtmpfs: initialized Oct 2 19:13:31.839735 kernel: x86/mm: Memory block size: 128MB Oct 2 19:13:31.839745 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) Oct 2 19:13:31.839755 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) Oct 2 19:13:31.839765 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) Oct 2 19:13:31.839775 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) Oct 2 19:13:31.839785 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) Oct 2 19:13:31.839795 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 19:13:31.839805 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Oct 2 19:13:31.839815 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 19:13:31.839826 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 19:13:31.839836 kernel: audit: initializing netlink subsys (disabled) Oct 2 19:13:31.839846 kernel: audit: type=2000 audit(1696274012.165:1): state=initialized audit_enabled=0 res=1 Oct 2 19:13:31.839856 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 19:13:31.839866 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 2 19:13:31.839875 kernel: cpuidle: using governor menu Oct 2 19:13:31.839885 kernel: ACPI: bus type PCI registered Oct 2 19:13:31.839922 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 19:13:31.839933 kernel: dca service started, version 1.12.1 Oct 2 19:13:31.839945 kernel: PCI: Using configuration type 1 for base access Oct 2 19:13:31.839960 kernel: PCI: Using configuration type 1 for extended access Oct 2 19:13:31.839970 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 2 19:13:31.839980 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 19:13:31.839990 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 19:13:31.839999 kernel: ACPI: Added _OSI(Module Device) Oct 2 19:13:31.840016 kernel: ACPI: Added _OSI(Processor Device) Oct 2 19:13:31.840137 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 19:13:31.840147 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 19:13:31.840161 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 19:13:31.840170 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 19:13:31.840180 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 19:13:31.840190 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 2 19:13:31.840199 kernel: ACPI: Interpreter enabled Oct 2 19:13:31.840209 kernel: ACPI: PM: (supports S0 S3 S5) Oct 2 19:13:31.840219 kernel: ACPI: Using IOAPIC for interrupt routing Oct 2 19:13:31.840229 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 2 19:13:31.840238 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Oct 2 19:13:31.840250 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 2 19:13:31.840432 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Oct 2 19:13:31.840449 kernel: acpiphp: Slot [3] registered Oct 2 19:13:31.840467 kernel: acpiphp: Slot [4] registered Oct 2 19:13:31.840477 kernel: acpiphp: Slot [5] registered Oct 2 19:13:31.840487 kernel: acpiphp: Slot [6] registered Oct 2 19:13:31.840496 kernel: acpiphp: Slot [7] registered Oct 2 19:13:31.840506 kernel: acpiphp: Slot [8] registered Oct 2 19:13:31.840521 kernel: acpiphp: Slot [9] registered Oct 2 19:13:31.840531 kernel: acpiphp: Slot [10] registered Oct 2 19:13:31.840542 kernel: acpiphp: Slot [11] registered Oct 2 19:13:31.840551 kernel: acpiphp: Slot [12] registered Oct 2 19:13:31.840561 kernel: acpiphp: Slot [13] registered Oct 2 19:13:31.840570 kernel: acpiphp: Slot [14] registered Oct 2 19:13:31.840580 kernel: acpiphp: Slot [15] registered Oct 2 19:13:31.840589 kernel: acpiphp: Slot [16] registered Oct 2 19:13:31.840598 kernel: acpiphp: Slot [17] registered Oct 2 19:13:31.840608 kernel: acpiphp: Slot [18] registered Oct 2 19:13:31.840620 kernel: acpiphp: Slot [19] registered Oct 2 19:13:31.840629 kernel: acpiphp: Slot [20] registered Oct 2 19:13:31.840639 kernel: acpiphp: Slot [21] registered Oct 2 19:13:31.840648 kernel: acpiphp: Slot [22] registered Oct 2 19:13:31.840658 kernel: acpiphp: Slot [23] registered Oct 2 19:13:31.840667 kernel: acpiphp: Slot [24] registered Oct 2 19:13:31.840676 kernel: acpiphp: Slot [25] registered Oct 2 19:13:31.840685 kernel: acpiphp: Slot [26] registered Oct 2 19:13:31.840695 kernel: acpiphp: Slot [27] registered Oct 2 19:13:31.840706 kernel: acpiphp: Slot [28] registered Oct 2 19:13:31.840716 kernel: acpiphp: Slot [29] registered Oct 2 19:13:31.840725 kernel: acpiphp: Slot [30] registered Oct 2 19:13:31.840735 kernel: acpiphp: Slot [31] registered Oct 2 19:13:31.840759 kernel: PCI host bridge to bus 0000:00 Oct 2 19:13:31.840901 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 2 19:13:31.840992 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 2 19:13:31.841088 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 2 19:13:31.841254 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xfebfffff window] Oct 2 19:13:31.841343 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0x87fffffff window] Oct 2 19:13:31.841429 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 2 19:13:31.841572 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Oct 2 19:13:31.841681 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Oct 2 19:13:31.841780 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Oct 2 19:13:31.841861 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc0c0-0xc0cf] Oct 2 19:13:31.841934 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Oct 2 19:13:31.842018 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Oct 2 19:13:31.842136 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Oct 2 19:13:31.842221 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Oct 2 19:13:31.842314 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Oct 2 19:13:31.842388 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Oct 2 19:13:31.842526 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Oct 2 19:13:31.842656 kernel: pci 0000:00:02.0: [1234:1111] type 00 class 0x030000 Oct 2 19:13:31.842760 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] Oct 2 19:13:31.842852 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xc1043000-0xc1043fff] Oct 2 19:13:31.842930 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] Oct 2 19:13:31.843031 kernel: pci 0000:00:02.0: BAR 0: assigned to efifb Oct 2 19:13:31.843132 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 2 19:13:31.843239 kernel: pci 0000:00:03.0: [1af4:1005] type 00 class 0x00ff00 Oct 2 19:13:31.843335 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0a0-0xc0bf] Oct 2 19:13:31.843437 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] Oct 2 19:13:31.843543 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] Oct 2 19:13:31.843659 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Oct 2 19:13:31.843755 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Oct 2 19:13:31.843859 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] Oct 2 19:13:31.843958 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] Oct 2 19:13:31.844042 kernel: pci 0000:00:05.0: [1af4:1000] type 00 class 0x020000 Oct 2 19:13:31.844134 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Oct 2 19:13:31.844224 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc1040000-0xc1040fff] Oct 2 19:13:31.844304 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] Oct 2 19:13:31.844377 kernel: pci 0000:00:05.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] Oct 2 19:13:31.844387 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Oct 2 19:13:31.844397 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Oct 2 19:13:31.844405 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 2 19:13:31.844412 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Oct 2 19:13:31.844420 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Oct 2 19:13:31.844427 kernel: iommu: Default domain type: Translated Oct 2 19:13:31.844434 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 2 19:13:31.844515 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Oct 2 19:13:31.844619 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 2 19:13:31.844701 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Oct 2 19:13:31.844714 kernel: vgaarb: loaded Oct 2 19:13:31.844722 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 19:13:31.844729 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 19:13:31.844736 kernel: PTP clock support registered Oct 2 19:13:31.844746 kernel: Registered efivars operations Oct 2 19:13:31.844755 kernel: PCI: Using ACPI for IRQ routing Oct 2 19:13:31.844764 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 2 19:13:31.844772 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] Oct 2 19:13:31.844780 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] Oct 2 19:13:31.844791 kernel: e820: reserve RAM buffer [mem 0x9b3bd018-0x9bffffff] Oct 2 19:13:31.844799 kernel: e820: reserve RAM buffer [mem 0x9b3fa018-0x9bffffff] Oct 2 19:13:31.844807 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] Oct 2 19:13:31.844815 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] Oct 2 19:13:31.844824 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Oct 2 19:13:31.844832 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Oct 2 19:13:31.844840 kernel: clocksource: Switched to clocksource kvm-clock Oct 2 19:13:31.844848 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 19:13:31.844858 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 19:13:31.844866 kernel: pnp: PnP ACPI init Oct 2 19:13:31.844965 kernel: pnp 00:02: [dma 2] Oct 2 19:13:31.844977 kernel: pnp: PnP ACPI: found 6 devices Oct 2 19:13:31.844984 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 2 19:13:31.844992 kernel: NET: Registered PF_INET protocol family Oct 2 19:13:31.844999 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 2 19:13:31.845007 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Oct 2 19:13:31.845014 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 19:13:31.845024 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 2 19:13:31.845031 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Oct 2 19:13:31.845039 kernel: TCP: Hash tables configured (established 32768 bind 32768) Oct 2 19:13:31.845046 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 2 19:13:31.845053 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 2 19:13:31.845061 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 19:13:31.845068 kernel: NET: Registered PF_XDP protocol family Oct 2 19:13:31.845164 kernel: pci 0000:00:05.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window Oct 2 19:13:31.845254 kernel: pci 0000:00:05.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] Oct 2 19:13:31.845334 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 2 19:13:31.845412 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 2 19:13:31.845500 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 2 19:13:31.845580 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xfebfffff window] Oct 2 19:13:31.845657 kernel: pci_bus 0000:00: resource 8 [mem 0x800000000-0x87fffffff window] Oct 2 19:13:31.845751 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Oct 2 19:13:31.845843 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Oct 2 19:13:31.845938 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Oct 2 19:13:31.845951 kernel: PCI: CLS 0 bytes, default 64 Oct 2 19:13:31.845962 kernel: Initialise system trusted keyrings Oct 2 19:13:31.845971 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Oct 2 19:13:31.845981 kernel: Key type asymmetric registered Oct 2 19:13:31.845991 kernel: Asymmetric key parser 'x509' registered Oct 2 19:13:31.846001 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 19:13:31.846011 kernel: io scheduler mq-deadline registered Oct 2 19:13:31.846023 kernel: io scheduler kyber registered Oct 2 19:13:31.846033 kernel: io scheduler bfq registered Oct 2 19:13:31.846042 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 2 19:13:31.846053 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Oct 2 19:13:31.846062 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Oct 2 19:13:31.846071 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Oct 2 19:13:31.846080 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 19:13:31.846089 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 2 19:13:31.846099 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Oct 2 19:13:31.846110 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 2 19:13:31.846132 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 2 19:13:31.846228 kernel: rtc_cmos 00:05: RTC can wake from S4 Oct 2 19:13:31.846244 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Oct 2 19:13:31.846325 kernel: rtc_cmos 00:05: registered as rtc0 Oct 2 19:13:31.846406 kernel: rtc_cmos 00:05: setting system clock to 2023-10-02T19:13:31 UTC (1696274011) Oct 2 19:13:31.846489 kernel: rtc_cmos 00:05: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Oct 2 19:13:31.846499 kernel: efifb: probing for efifb Oct 2 19:13:31.846509 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k Oct 2 19:13:31.846518 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 Oct 2 19:13:31.846528 kernel: efifb: scrolling: redraw Oct 2 19:13:31.846538 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Oct 2 19:13:31.846548 kernel: Console: switching to colour frame buffer device 160x50 Oct 2 19:13:31.846557 kernel: fb0: EFI VGA frame buffer device Oct 2 19:13:31.846569 kernel: pstore: Registered efi as persistent store backend Oct 2 19:13:31.846579 kernel: NET: Registered PF_INET6 protocol family Oct 2 19:13:31.846588 kernel: Segment Routing with IPv6 Oct 2 19:13:31.846598 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 19:13:31.846608 kernel: NET: Registered PF_PACKET protocol family Oct 2 19:13:31.846620 kernel: Key type dns_resolver registered Oct 2 19:13:31.846629 kernel: IPI shorthand broadcast: enabled Oct 2 19:13:31.846638 kernel: sched_clock: Marking stable (376247216, 89452579)->(516589624, -50889829) Oct 2 19:13:31.846647 kernel: registered taskstats version 1 Oct 2 19:13:31.846659 kernel: Loading compiled-in X.509 certificates Oct 2 19:13:31.846668 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 6f9e51af8b3ef67eb6e93ecfe77d55665ad3d861' Oct 2 19:13:31.846677 kernel: Key type .fscrypt registered Oct 2 19:13:31.846687 kernel: Key type fscrypt-provisioning registered Oct 2 19:13:31.846699 kernel: pstore: Using crash dump compression: deflate Oct 2 19:13:31.846709 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 2 19:13:31.846718 kernel: ima: Allocated hash algorithm: sha1 Oct 2 19:13:31.846727 kernel: ima: No architecture policies found Oct 2 19:13:31.846737 kernel: Freeing unused kernel image (initmem) memory: 45372K Oct 2 19:13:31.846748 kernel: Write protecting the kernel read-only data: 28672k Oct 2 19:13:31.846758 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 2 19:13:31.846770 kernel: Freeing unused kernel image (rodata/data gap) memory: 644K Oct 2 19:13:31.846779 kernel: Run /init as init process Oct 2 19:13:31.846788 kernel: with arguments: Oct 2 19:13:31.846798 kernel: /init Oct 2 19:13:31.846808 kernel: with environment: Oct 2 19:13:31.846818 kernel: HOME=/ Oct 2 19:13:31.846829 kernel: TERM=linux Oct 2 19:13:31.846842 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 19:13:31.846855 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:13:31.846867 systemd[1]: Detected virtualization kvm. Oct 2 19:13:31.846879 systemd[1]: Detected architecture x86-64. Oct 2 19:13:31.846889 systemd[1]: Running in initrd. Oct 2 19:13:31.846900 systemd[1]: No hostname configured, using default hostname. Oct 2 19:13:31.846910 systemd[1]: Hostname set to . Oct 2 19:13:31.846922 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:13:31.846931 systemd[1]: Queued start job for default target initrd.target. Oct 2 19:13:31.846939 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:13:31.846947 systemd[1]: Reached target cryptsetup.target. Oct 2 19:13:31.846955 systemd[1]: Reached target paths.target. Oct 2 19:13:31.846963 systemd[1]: Reached target slices.target. Oct 2 19:13:31.846971 systemd[1]: Reached target swap.target. Oct 2 19:13:31.846979 systemd[1]: Reached target timers.target. Oct 2 19:13:31.846989 systemd[1]: Listening on iscsid.socket. Oct 2 19:13:31.846997 systemd[1]: Listening on iscsiuio.socket. Oct 2 19:13:31.847005 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 19:13:31.847013 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 19:13:31.847022 systemd[1]: Listening on systemd-journald.socket. Oct 2 19:13:31.847030 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:13:31.847038 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:13:31.847046 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:13:31.847055 systemd[1]: Reached target sockets.target. Oct 2 19:13:31.847064 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:13:31.847072 systemd[1]: Finished network-cleanup.service. Oct 2 19:13:31.847080 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 19:13:31.847088 systemd[1]: Starting systemd-journald.service... Oct 2 19:13:31.847096 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:13:31.847104 systemd[1]: Starting systemd-resolved.service... Oct 2 19:13:31.847112 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 19:13:31.847132 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:13:31.847142 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 19:13:31.847150 kernel: audit: type=1130 audit(1696274011.836:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:31.847159 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 19:13:31.847167 kernel: audit: type=1130 audit(1696274011.839:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:31.847181 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 19:13:31.847189 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:13:31.847201 systemd-journald[197]: Journal started Oct 2 19:13:31.847247 systemd-journald[197]: Runtime Journal (/run/log/journal/eae4b584420440b088802e44a4217af5) is 6.0M, max 48.4M, 42.4M free. Oct 2 19:13:31.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:31.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:31.838525 systemd-modules-load[198]: Inserted module 'overlay' Oct 2 19:13:31.851738 systemd[1]: Started systemd-journald.service. Oct 2 19:13:31.851797 kernel: audit: type=1130 audit(1696274011.849:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:31.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:31.853035 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:13:31.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:31.856135 kernel: audit: type=1130 audit(1696274011.854:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:31.861224 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 19:13:31.866892 kernel: audit: type=1130 audit(1696274011.861:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:31.866908 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 19:13:31.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:31.863759 systemd[1]: Starting dracut-cmdline.service... Oct 2 19:13:31.868793 systemd-modules-load[198]: Inserted module 'br_netfilter' Oct 2 19:13:31.869393 kernel: Bridge firewalling registered Oct 2 19:13:31.871136 systemd-resolved[199]: Positive Trust Anchors: Oct 2 19:13:31.871151 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:13:31.871179 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:13:31.874088 systemd-resolved[199]: Defaulting to hostname 'linux'. Oct 2 19:13:31.875001 systemd[1]: Started systemd-resolved.service. Oct 2 19:13:31.879450 kernel: audit: type=1130 audit(1696274011.876:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:31.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:31.876772 systemd[1]: Reached target nss-lookup.target. Oct 2 19:13:31.885180 dracut-cmdline[216]: dracut-dracut-053 Oct 2 19:13:31.887374 dracut-cmdline[216]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:13:31.892136 kernel: SCSI subsystem initialized Oct 2 19:13:31.903556 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 19:13:31.903631 kernel: device-mapper: uevent: version 1.0.3 Oct 2 19:13:31.903642 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 19:13:31.906308 systemd-modules-load[198]: Inserted module 'dm_multipath' Oct 2 19:13:31.907198 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:13:31.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:31.908602 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:13:31.911315 kernel: audit: type=1130 audit(1696274011.907:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:31.917034 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:13:31.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:31.920136 kernel: audit: type=1130 audit(1696274011.917:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:31.948164 kernel: Loading iSCSI transport class v2.0-870. Oct 2 19:13:31.959159 kernel: iscsi: registered transport (tcp) Oct 2 19:13:31.978510 kernel: iscsi: registered transport (qla4xxx) Oct 2 19:13:31.978591 kernel: QLogic iSCSI HBA Driver Oct 2 19:13:32.004437 systemd[1]: Finished dracut-cmdline.service. Oct 2 19:13:32.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:32.006285 systemd[1]: Starting dracut-pre-udev.service... Oct 2 19:13:32.008362 kernel: audit: type=1130 audit(1696274012.005:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:32.055172 kernel: raid6: avx2x4 gen() 30767 MB/s Oct 2 19:13:32.072158 kernel: raid6: avx2x4 xor() 8113 MB/s Oct 2 19:13:32.089163 kernel: raid6: avx2x2 gen() 32768 MB/s Oct 2 19:13:32.106158 kernel: raid6: avx2x2 xor() 19333 MB/s Oct 2 19:13:32.123146 kernel: raid6: avx2x1 gen() 26755 MB/s Oct 2 19:13:32.140163 kernel: raid6: avx2x1 xor() 15416 MB/s Oct 2 19:13:32.157151 kernel: raid6: sse2x4 gen() 14781 MB/s Oct 2 19:13:32.174141 kernel: raid6: sse2x4 xor() 7561 MB/s Oct 2 19:13:32.191167 kernel: raid6: sse2x2 gen() 16511 MB/s Oct 2 19:13:32.208148 kernel: raid6: sse2x2 xor() 9865 MB/s Oct 2 19:13:32.225145 kernel: raid6: sse2x1 gen() 12367 MB/s Oct 2 19:13:32.242485 kernel: raid6: sse2x1 xor() 7841 MB/s Oct 2 19:13:32.242510 kernel: raid6: using algorithm avx2x2 gen() 32768 MB/s Oct 2 19:13:32.242520 kernel: raid6: .... xor() 19333 MB/s, rmw enabled Oct 2 19:13:32.242529 kernel: raid6: using avx2x2 recovery algorithm Oct 2 19:13:32.254141 kernel: xor: automatically using best checksumming function avx Oct 2 19:13:32.343159 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 2 19:13:32.352433 systemd[1]: Finished dracut-pre-udev.service. Oct 2 19:13:32.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:32.353000 audit: BPF prog-id=7 op=LOAD Oct 2 19:13:32.353000 audit: BPF prog-id=8 op=LOAD Oct 2 19:13:32.353888 systemd[1]: Starting systemd-udevd.service... Oct 2 19:13:32.365829 systemd-udevd[401]: Using default interface naming scheme 'v252'. Oct 2 19:13:32.370564 systemd[1]: Started systemd-udevd.service. Oct 2 19:13:32.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:32.371773 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 19:13:32.384193 dracut-pre-trigger[403]: rd.md=0: removing MD RAID activation Oct 2 19:13:32.411187 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 19:13:32.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:32.411974 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:13:32.452248 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:13:32.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:32.479149 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 19:13:32.493144 kernel: AVX2 version of gcm_enc/dec engaged. Oct 2 19:13:32.493200 kernel: AES CTR mode by8 optimization enabled Oct 2 19:13:32.504146 kernel: virtio_blk virtio1: [vda] 9289728 512-byte logical blocks (4.76 GB/4.43 GiB) Oct 2 19:13:32.504322 kernel: libata version 3.00 loaded. Oct 2 19:13:32.509450 kernel: ata_piix 0000:00:01.1: version 2.13 Oct 2 19:13:32.510062 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 2 19:13:32.511145 kernel: scsi host0: ata_piix Oct 2 19:13:32.514704 kernel: scsi host1: ata_piix Oct 2 19:13:32.514888 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0c0 irq 14 Oct 2 19:13:32.514900 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0c8 irq 15 Oct 2 19:13:32.524029 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 19:13:32.525355 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (448) Oct 2 19:13:32.528309 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 19:13:32.533172 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 19:13:32.533879 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 19:13:32.540694 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:13:32.542036 systemd[1]: Starting disk-uuid.service... Oct 2 19:13:32.548142 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 2 19:13:32.553147 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 2 19:13:32.676180 kernel: ata2.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Oct 2 19:13:32.676266 kernel: scsi 1:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Oct 2 19:13:32.705158 kernel: sr 1:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Oct 2 19:13:32.705353 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Oct 2 19:13:32.722223 kernel: sr 1:0:0:0: Attached scsi CD-ROM sr0 Oct 2 19:13:33.556794 disk-uuid[514]: The operation has completed successfully. Oct 2 19:13:33.558006 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 2 19:13:33.576687 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 19:13:33.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:33.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:33.576766 systemd[1]: Finished disk-uuid.service. Oct 2 19:13:33.587383 systemd[1]: Starting verity-setup.service... Oct 2 19:13:33.600136 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Oct 2 19:13:33.631799 systemd[1]: Found device dev-mapper-usr.device. Oct 2 19:13:33.633224 systemd[1]: Mounting sysusr-usr.mount... Oct 2 19:13:33.635888 systemd[1]: Finished verity-setup.service. Oct 2 19:13:33.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:33.702830 systemd[1]: Mounted sysusr-usr.mount. Oct 2 19:13:33.703899 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 19:13:33.703504 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 19:13:33.704208 systemd[1]: Starting ignition-setup.service... Oct 2 19:13:33.705806 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 19:13:33.712474 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:13:33.712501 kernel: BTRFS info (device vda6): using free space tree Oct 2 19:13:33.712511 kernel: BTRFS info (device vda6): has skinny extents Oct 2 19:13:33.720691 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 2 19:13:33.728991 systemd[1]: Finished ignition-setup.service. Oct 2 19:13:33.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:33.730792 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 19:13:33.767956 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 19:13:33.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:33.770000 audit: BPF prog-id=9 op=LOAD Oct 2 19:13:33.770673 systemd[1]: Starting systemd-networkd.service... Oct 2 19:13:33.789527 systemd-networkd[693]: lo: Link UP Oct 2 19:13:33.789536 systemd-networkd[693]: lo: Gained carrier Oct 2 19:13:33.789919 systemd-networkd[693]: Enumeration completed Oct 2 19:13:33.790153 systemd-networkd[693]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:13:33.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:33.791002 systemd[1]: Started systemd-networkd.service. Oct 2 19:13:33.792048 systemd-networkd[693]: eth0: Link UP Oct 2 19:13:33.792051 systemd-networkd[693]: eth0: Gained carrier Oct 2 19:13:33.792392 systemd[1]: Reached target network.target. Oct 2 19:13:33.794255 systemd[1]: Starting iscsiuio.service... Oct 2 19:13:33.798630 systemd[1]: Started iscsiuio.service. Oct 2 19:13:33.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:33.799722 systemd[1]: Starting iscsid.service... Oct 2 19:13:33.803044 iscsid[698]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:13:33.803044 iscsid[698]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 19:13:33.803044 iscsid[698]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 19:13:33.803044 iscsid[698]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 19:13:33.803044 iscsid[698]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:13:33.803044 iscsid[698]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 19:13:33.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:33.804152 systemd[1]: Started iscsid.service. Oct 2 19:13:33.808685 systemd[1]: Starting dracut-initqueue.service... Oct 2 19:13:33.811172 systemd-networkd[693]: eth0: DHCPv4 address 10.0.0.100/16, gateway 10.0.0.1 acquired from 10.0.0.1 Oct 2 19:13:33.818185 systemd[1]: Finished dracut-initqueue.service. Oct 2 19:13:33.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:33.818778 systemd[1]: Reached target remote-fs-pre.target. Oct 2 19:13:33.819883 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:13:33.821350 ignition[619]: Ignition 2.14.0 Oct 2 19:13:33.820647 systemd[1]: Reached target remote-fs.target. Oct 2 19:13:33.821357 ignition[619]: Stage: fetch-offline Oct 2 19:13:33.822814 systemd[1]: Starting dracut-pre-mount.service... Oct 2 19:13:33.821398 ignition[619]: no configs at "/usr/lib/ignition/base.d" Oct 2 19:13:33.821413 ignition[619]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 2 19:13:33.821514 ignition[619]: parsed url from cmdline: "" Oct 2 19:13:33.821517 ignition[619]: no config URL provided Oct 2 19:13:33.821521 ignition[619]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:13:33.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:33.832362 systemd[1]: Finished dracut-pre-mount.service. Oct 2 19:13:33.821527 ignition[619]: no config at "/usr/lib/ignition/user.ign" Oct 2 19:13:33.821543 ignition[619]: op(1): [started] loading QEMU firmware config module Oct 2 19:13:33.821548 ignition[619]: op(1): executing: "modprobe" "qemu_fw_cfg" Oct 2 19:13:33.826301 ignition[619]: op(1): [finished] loading QEMU firmware config module Oct 2 19:13:33.844092 ignition[619]: parsing config with SHA512: a2556dbcfb442bccb78e2db85c6db423c35f648101b72d692bc332d021556ac46291f6c24a86b41aa3576754c2919a10fb4f5136eed8abf116882718990f496d Oct 2 19:13:33.866013 unknown[619]: fetched base config from "system" Oct 2 19:13:33.866030 unknown[619]: fetched user config from "qemu" Oct 2 19:13:33.866596 ignition[619]: fetch-offline: fetch-offline passed Oct 2 19:13:33.866663 ignition[619]: Ignition finished successfully Oct 2 19:13:33.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:33.867947 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 19:13:33.868939 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Oct 2 19:13:33.869975 systemd[1]: Starting ignition-kargs.service... Oct 2 19:13:33.877872 ignition[716]: Ignition 2.14.0 Oct 2 19:13:33.877882 ignition[716]: Stage: kargs Oct 2 19:13:33.878001 ignition[716]: no configs at "/usr/lib/ignition/base.d" Oct 2 19:13:33.878014 ignition[716]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 2 19:13:33.879285 ignition[716]: kargs: kargs passed Oct 2 19:13:33.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:33.880764 systemd[1]: Finished ignition-kargs.service. Oct 2 19:13:33.879345 ignition[716]: Ignition finished successfully Oct 2 19:13:33.882367 systemd[1]: Starting ignition-disks.service... Oct 2 19:13:33.888698 ignition[722]: Ignition 2.14.0 Oct 2 19:13:33.888707 ignition[722]: Stage: disks Oct 2 19:13:33.888807 ignition[722]: no configs at "/usr/lib/ignition/base.d" Oct 2 19:13:33.888817 ignition[722]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 2 19:13:33.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:33.890366 systemd[1]: Finished ignition-disks.service. Oct 2 19:13:33.889716 ignition[722]: disks: disks passed Oct 2 19:13:33.891179 systemd[1]: Reached target initrd-root-device.target. Oct 2 19:13:33.889755 ignition[722]: Ignition finished successfully Oct 2 19:13:33.892544 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:13:33.893306 systemd[1]: Reached target local-fs.target. Oct 2 19:13:33.893929 systemd[1]: Reached target sysinit.target. Oct 2 19:13:33.895001 systemd[1]: Reached target basic.target. Oct 2 19:13:33.895926 systemd[1]: Starting systemd-fsck-root.service... Oct 2 19:13:33.905062 systemd-fsck[730]: ROOT: clean, 603/553520 files, 56012/553472 blocks Oct 2 19:13:33.909920 systemd[1]: Finished systemd-fsck-root.service. Oct 2 19:13:33.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:33.911199 systemd[1]: Mounting sysroot.mount... Oct 2 19:13:33.918843 systemd[1]: Mounted sysroot.mount. Oct 2 19:13:33.919748 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 19:13:33.919770 systemd[1]: Reached target initrd-root-fs.target. Oct 2 19:13:33.921475 systemd[1]: Mounting sysroot-usr.mount... Oct 2 19:13:33.923003 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 2 19:13:33.923051 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 19:13:33.923078 systemd[1]: Reached target ignition-diskful.target. Oct 2 19:13:33.926874 systemd[1]: Mounted sysroot-usr.mount. Oct 2 19:13:33.928379 systemd[1]: Starting initrd-setup-root.service... Oct 2 19:13:33.932521 initrd-setup-root[740]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 19:13:33.935516 initrd-setup-root[748]: cut: /sysroot/etc/group: No such file or directory Oct 2 19:13:33.938626 initrd-setup-root[756]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 19:13:33.941560 initrd-setup-root[764]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 19:13:33.967106 systemd[1]: Finished initrd-setup-root.service. Oct 2 19:13:33.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:33.968164 systemd[1]: Starting ignition-mount.service... Oct 2 19:13:33.969295 systemd[1]: Starting sysroot-boot.service... Oct 2 19:13:33.975086 bash[782]: umount: /sysroot/usr/share/oem: not mounted. Oct 2 19:13:33.983391 ignition[783]: INFO : Ignition 2.14.0 Oct 2 19:13:33.983391 ignition[783]: INFO : Stage: mount Oct 2 19:13:33.984845 ignition[783]: INFO : no configs at "/usr/lib/ignition/base.d" Oct 2 19:13:33.984845 ignition[783]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 2 19:13:33.984845 ignition[783]: INFO : mount: mount passed Oct 2 19:13:33.984845 ignition[783]: INFO : Ignition finished successfully Oct 2 19:13:33.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:33.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:33.986403 systemd[1]: Finished sysroot-boot.service. Oct 2 19:13:33.987101 systemd[1]: Finished ignition-mount.service. Oct 2 19:13:34.646958 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:13:34.654148 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (793) Oct 2 19:13:34.655658 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:13:34.655686 kernel: BTRFS info (device vda6): using free space tree Oct 2 19:13:34.655708 kernel: BTRFS info (device vda6): has skinny extents Oct 2 19:13:34.659270 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:13:34.660713 systemd[1]: Starting ignition-files.service... Oct 2 19:13:34.674659 ignition[813]: INFO : Ignition 2.14.0 Oct 2 19:13:34.674659 ignition[813]: INFO : Stage: files Oct 2 19:13:34.688555 ignition[813]: INFO : no configs at "/usr/lib/ignition/base.d" Oct 2 19:13:34.688555 ignition[813]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 2 19:13:34.690992 ignition[813]: DEBUG : files: compiled without relabeling support, skipping Oct 2 19:13:34.690992 ignition[813]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 19:13:34.690992 ignition[813]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 19:13:34.695059 ignition[813]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 19:13:34.695059 ignition[813]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 19:13:34.695059 ignition[813]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 19:13:34.695059 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Oct 2 19:13:34.695059 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Oct 2 19:13:34.693407 unknown[813]: wrote ssh authorized keys file for user: core Oct 2 19:13:35.018639 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Oct 2 19:13:35.138924 ignition[813]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Oct 2 19:13:35.140906 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Oct 2 19:13:35.140906 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.24.2-linux-amd64.tar.gz" Oct 2 19:13:35.140906 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.24.2/crictl-v1.24.2-linux-amd64.tar.gz: attempt #1 Oct 2 19:13:35.245706 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Oct 2 19:13:35.306244 systemd-networkd[693]: eth0: Gained IPv6LL Oct 2 19:13:35.317822 ignition[813]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: 961188117863ca9af5b084e84691e372efee93ad09daf6a0422e8d75a5803f394d8968064f7ca89f14e8973766201e731241f32538cf2c8d91f0233e786302df Oct 2 19:13:35.317822 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.24.2-linux-amd64.tar.gz" Oct 2 19:13:35.321030 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:13:35.321030 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://storage.googleapis.com/kubernetes-release/release/v1.25.10/bin/linux/amd64/kubeadm: attempt #1 Oct 2 19:13:35.419224 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Oct 2 19:13:35.903768 ignition[813]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 43b8f213f1732c092e34008d5334e6622a6603f7ec5890c395ac911d50069d0dc11a81fa38436df40fc875a10fee6ee13aa285c017f1de210171065e847c99c5 Oct 2 19:13:35.905850 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:13:35.905850 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:13:35.905850 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://storage.googleapis.com/kubernetes-release/release/v1.25.10/bin/linux/amd64/kubelet: attempt #1 Oct 2 19:13:35.968259 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Oct 2 19:13:37.407944 ignition[813]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 82b36a0b83a1d48ef1f70e3ed2a263b3ce935304cdc0606d194b290217fb04f98628b0d82e200b51ccf5c05c718b2476274ae710bb143fffe28dc6bbf8407d54 Oct 2 19:13:37.410832 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:13:37.410832 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Oct 2 19:13:37.410832 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 19:13:37.410832 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:13:37.410832 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:13:37.410832 ignition[813]: INFO : files: op(9): [started] processing unit "prepare-cni-plugins.service" Oct 2 19:13:37.410832 ignition[813]: INFO : files: op(9): op(a): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:13:37.410832 ignition[813]: INFO : files: op(9): op(a): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:13:37.410832 ignition[813]: INFO : files: op(9): [finished] processing unit "prepare-cni-plugins.service" Oct 2 19:13:37.410832 ignition[813]: INFO : files: op(b): [started] processing unit "prepare-critools.service" Oct 2 19:13:37.410832 ignition[813]: INFO : files: op(b): op(c): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:13:37.410832 ignition[813]: INFO : files: op(b): op(c): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:13:37.410832 ignition[813]: INFO : files: op(b): [finished] processing unit "prepare-critools.service" Oct 2 19:13:37.410832 ignition[813]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" Oct 2 19:13:37.410832 ignition[813]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Oct 2 19:13:37.410832 ignition[813]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Oct 2 19:13:37.410832 ignition[813]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" Oct 2 19:13:37.410832 ignition[813]: INFO : files: op(f): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:13:37.432360 ignition[813]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:13:37.432360 ignition[813]: INFO : files: op(10): [started] setting preset to enabled for "prepare-critools.service" Oct 2 19:13:37.432360 ignition[813]: INFO : files: op(10): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 19:13:37.432360 ignition[813]: INFO : files: op(11): [started] setting preset to disabled for "coreos-metadata.service" Oct 2 19:13:37.432360 ignition[813]: INFO : files: op(11): op(12): [started] removing enablement symlink(s) for "coreos-metadata.service" Oct 2 19:13:37.462950 ignition[813]: INFO : files: op(11): op(12): [finished] removing enablement symlink(s) for "coreos-metadata.service" Oct 2 19:13:37.464338 ignition[813]: INFO : files: op(11): [finished] setting preset to disabled for "coreos-metadata.service" Oct 2 19:13:37.464338 ignition[813]: INFO : files: createResultFile: createFiles: op(13): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:13:37.464338 ignition[813]: INFO : files: createResultFile: createFiles: op(13): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:13:37.464338 ignition[813]: INFO : files: files passed Oct 2 19:13:37.464338 ignition[813]: INFO : Ignition finished successfully Oct 2 19:13:37.472869 kernel: kauditd_printk_skb: 24 callbacks suppressed Oct 2 19:13:37.472890 kernel: audit: type=1130 audit(1696274017.465:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.464337 systemd[1]: Finished ignition-files.service. Oct 2 19:13:37.478294 kernel: audit: type=1130 audit(1696274017.473:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.478315 kernel: audit: type=1131 audit(1696274017.473:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.478325 kernel: audit: type=1130 audit(1696274017.478:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.466847 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 19:13:37.470107 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 19:13:37.483096 initrd-setup-root-after-ignition[837]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Oct 2 19:13:37.470768 systemd[1]: Starting ignition-quench.service... Oct 2 19:13:37.484688 initrd-setup-root-after-ignition[841]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 19:13:37.472898 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 19:13:37.472966 systemd[1]: Finished ignition-quench.service. Oct 2 19:13:37.473954 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 19:13:37.478357 systemd[1]: Reached target ignition-complete.target. Oct 2 19:13:37.480768 systemd[1]: Starting initrd-parse-etc.service... Oct 2 19:13:37.490688 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 19:13:37.490762 systemd[1]: Finished initrd-parse-etc.service. Oct 2 19:13:37.496347 kernel: audit: type=1130 audit(1696274017.491:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.496368 kernel: audit: type=1131 audit(1696274017.491:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.491905 systemd[1]: Reached target initrd-fs.target. Oct 2 19:13:37.496357 systemd[1]: Reached target initrd.target. Oct 2 19:13:37.496858 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 19:13:37.497431 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 19:13:37.505526 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 19:13:37.509189 kernel: audit: type=1130 audit(1696274017.506:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.506780 systemd[1]: Starting initrd-cleanup.service... Oct 2 19:13:37.514075 systemd[1]: Stopped target nss-lookup.target. Oct 2 19:13:37.514816 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 19:13:37.516009 systemd[1]: Stopped target timers.target. Oct 2 19:13:37.517257 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 19:13:37.521947 kernel: audit: type=1131 audit(1696274017.518:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.517394 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 19:13:37.518589 systemd[1]: Stopped target initrd.target. Oct 2 19:13:37.522068 systemd[1]: Stopped target basic.target. Oct 2 19:13:37.523112 systemd[1]: Stopped target ignition-complete.target. Oct 2 19:13:37.524186 systemd[1]: Stopped target ignition-diskful.target. Oct 2 19:13:37.525235 systemd[1]: Stopped target initrd-root-device.target. Oct 2 19:13:37.526392 systemd[1]: Stopped target remote-fs.target. Oct 2 19:13:37.527534 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 19:13:37.528710 systemd[1]: Stopped target sysinit.target. Oct 2 19:13:37.529776 systemd[1]: Stopped target local-fs.target. Oct 2 19:13:37.530819 systemd[1]: Stopped target local-fs-pre.target. Oct 2 19:13:37.531902 systemd[1]: Stopped target swap.target. Oct 2 19:13:37.536799 kernel: audit: type=1131 audit(1696274017.533:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.532870 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 19:13:37.532990 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 19:13:37.541444 kernel: audit: type=1131 audit(1696274017.537:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.534022 systemd[1]: Stopped target cryptsetup.target. Oct 2 19:13:37.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.536874 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 19:13:37.536987 systemd[1]: Stopped dracut-initqueue.service. Oct 2 19:13:37.538127 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 19:13:37.538247 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 19:13:37.541600 systemd[1]: Stopped target paths.target. Oct 2 19:13:37.542537 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 19:13:37.546175 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 19:13:37.546892 systemd[1]: Stopped target slices.target. Oct 2 19:13:37.547935 systemd[1]: Stopped target sockets.target. Oct 2 19:13:37.548924 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 19:13:37.549018 systemd[1]: Closed iscsid.socket. Oct 2 19:13:37.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.549945 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 19:13:37.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.550072 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 19:13:37.551179 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 19:13:37.551295 systemd[1]: Stopped ignition-files.service. Oct 2 19:13:37.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.553067 systemd[1]: Stopping ignition-mount.service... Oct 2 19:13:37.564169 ignition[854]: INFO : Ignition 2.14.0 Oct 2 19:13:37.564169 ignition[854]: INFO : Stage: umount Oct 2 19:13:37.564169 ignition[854]: INFO : no configs at "/usr/lib/ignition/base.d" Oct 2 19:13:37.564169 ignition[854]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 2 19:13:37.564169 ignition[854]: INFO : umount: umount passed Oct 2 19:13:37.564169 ignition[854]: INFO : Ignition finished successfully Oct 2 19:13:37.554148 systemd[1]: Stopping iscsiuio.service... Oct 2 19:13:37.555954 systemd[1]: Stopping sysroot-boot.service... Oct 2 19:13:37.556597 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 19:13:37.556731 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 19:13:37.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.557636 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 19:13:37.557754 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 19:13:37.560220 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 19:13:37.560327 systemd[1]: Stopped iscsiuio.service. Oct 2 19:13:37.562325 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 19:13:37.562405 systemd[1]: Finished initrd-cleanup.service. Oct 2 19:13:37.569350 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 19:13:37.570737 systemd[1]: Stopped ignition-mount.service. Oct 2 19:13:37.577841 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 2 19:13:37.578813 systemd[1]: Stopped target network.target. Oct 2 19:13:37.579883 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 19:13:37.579910 systemd[1]: Closed iscsiuio.socket. Oct 2 19:13:37.581451 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 19:13:37.581500 systemd[1]: Stopped ignition-disks.service. Oct 2 19:13:37.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.583129 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 19:13:37.583161 systemd[1]: Stopped ignition-kargs.service. Oct 2 19:13:37.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.584798 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 19:13:37.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.584847 systemd[1]: Stopped ignition-setup.service. Oct 2 19:13:37.586961 systemd[1]: Stopping systemd-networkd.service... Oct 2 19:13:37.588387 systemd[1]: Stopping systemd-resolved.service... Oct 2 19:13:37.592194 systemd-networkd[693]: eth0: DHCPv6 lease lost Oct 2 19:13:37.593363 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 19:13:37.594037 systemd[1]: Stopped systemd-networkd.service. Oct 2 19:13:37.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.595740 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 19:13:37.595781 systemd[1]: Closed systemd-networkd.socket. Oct 2 19:13:37.598147 systemd[1]: Stopping network-cleanup.service... Oct 2 19:13:37.599274 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 19:13:37.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.601000 audit: BPF prog-id=9 op=UNLOAD Oct 2 19:13:37.599330 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 19:13:37.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.600825 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 19:13:37.600872 systemd[1]: Stopped systemd-sysctl.service. Oct 2 19:13:37.601609 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 19:13:37.601654 systemd[1]: Stopped systemd-modules-load.service. Oct 2 19:13:37.603089 systemd[1]: Stopping systemd-udevd.service... Oct 2 19:13:37.608490 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 2 19:13:37.609029 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 19:13:37.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.609157 systemd[1]: Stopped systemd-resolved.service. Oct 2 19:13:37.611652 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 19:13:37.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.611774 systemd[1]: Stopped systemd-udevd.service. Oct 2 19:13:37.614000 audit: BPF prog-id=6 op=UNLOAD Oct 2 19:13:37.614384 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 19:13:37.614426 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 19:13:37.615159 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 19:13:37.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.615184 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 19:13:37.616581 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 19:13:37.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.616622 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 19:13:37.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.617777 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 19:13:37.617810 systemd[1]: Stopped dracut-cmdline.service. Oct 2 19:13:37.619015 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 19:13:37.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.619048 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 19:13:37.620835 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 19:13:37.621806 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Oct 2 19:13:37.621854 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Oct 2 19:13:37.623360 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 19:13:37.623393 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 19:13:37.624220 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 19:13:37.624252 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 19:13:37.625894 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Oct 2 19:13:37.626280 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 19:13:37.626361 systemd[1]: Stopped network-cleanup.service. Oct 2 19:13:37.627948 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 19:13:37.628033 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 19:13:37.680745 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 19:13:37.680853 systemd[1]: Stopped sysroot-boot.service. Oct 2 19:13:37.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.681640 systemd[1]: Reached target initrd-switch-root.target. Oct 2 19:13:37.682900 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 19:13:37.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:37.682937 systemd[1]: Stopped initrd-setup-root.service. Oct 2 19:13:37.684644 systemd[1]: Starting initrd-switch-root.service... Oct 2 19:13:37.700718 systemd[1]: Switching root. Oct 2 19:13:37.720437 iscsid[698]: iscsid shutting down. Oct 2 19:13:37.720910 systemd-journald[197]: Journal stopped Oct 2 19:13:40.433127 systemd-journald[197]: Received SIGTERM from PID 1 (systemd). Oct 2 19:13:40.433187 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 19:13:40.433213 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 19:13:40.433234 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 19:13:40.433247 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 19:13:40.433260 kernel: SELinux: policy capability open_perms=1 Oct 2 19:13:40.433273 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 19:13:40.433285 kernel: SELinux: policy capability always_check_network=0 Oct 2 19:13:40.433298 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 19:13:40.433314 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 19:13:40.433326 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 19:13:40.433342 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 19:13:40.433354 systemd[1]: Successfully loaded SELinux policy in 37.329ms. Oct 2 19:13:40.433374 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.891ms. Oct 2 19:13:40.433387 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:13:40.433400 systemd[1]: Detected virtualization kvm. Oct 2 19:13:40.433416 systemd[1]: Detected architecture x86-64. Oct 2 19:13:40.433430 systemd[1]: Detected first boot. Oct 2 19:13:40.433445 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:13:40.433461 systemd[1]: Populated /etc with preset unit settings. Oct 2 19:13:40.433478 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:13:40.433492 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:13:40.433508 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:13:40.433524 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 19:13:40.433537 systemd[1]: Stopped iscsid.service. Oct 2 19:13:40.433552 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 19:13:40.433566 systemd[1]: Stopped initrd-switch-root.service. Oct 2 19:13:40.433579 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 19:13:40.433594 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 19:13:40.433609 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 19:13:40.433623 systemd[1]: Created slice system-getty.slice. Oct 2 19:13:40.433639 systemd[1]: Created slice system-modprobe.slice. Oct 2 19:13:40.433657 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 19:13:40.433673 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 19:13:40.433688 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 19:13:40.433703 systemd[1]: Created slice user.slice. Oct 2 19:13:40.433718 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:13:40.433735 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 19:13:40.433750 systemd[1]: Set up automount boot.automount. Oct 2 19:13:40.433764 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 19:13:40.433778 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 19:13:40.433796 systemd[1]: Stopped target initrd-fs.target. Oct 2 19:13:40.433809 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 19:13:40.433823 systemd[1]: Reached target integritysetup.target. Oct 2 19:13:40.433837 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:13:40.433851 systemd[1]: Reached target remote-fs.target. Oct 2 19:13:40.433865 systemd[1]: Reached target slices.target. Oct 2 19:13:40.433878 systemd[1]: Reached target swap.target. Oct 2 19:13:40.433892 systemd[1]: Reached target torcx.target. Oct 2 19:13:40.433907 systemd[1]: Reached target veritysetup.target. Oct 2 19:13:40.433921 systemd[1]: Listening on systemd-coredump.socket. Oct 2 19:13:40.433960 systemd[1]: Listening on systemd-initctl.socket. Oct 2 19:13:40.433976 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:13:40.433992 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:13:40.434006 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:13:40.434021 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 19:13:40.434036 systemd[1]: Mounting dev-hugepages.mount... Oct 2 19:13:40.434050 systemd[1]: Mounting dev-mqueue.mount... Oct 2 19:13:40.434070 systemd[1]: Mounting media.mount... Oct 2 19:13:40.434086 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:13:40.434100 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 19:13:40.434133 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 19:13:40.434150 systemd[1]: Mounting tmp.mount... Oct 2 19:13:40.434165 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 19:13:40.434180 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 19:13:40.434195 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:13:40.434211 systemd[1]: Starting modprobe@configfs.service... Oct 2 19:13:40.434240 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 19:13:40.434257 systemd[1]: Starting modprobe@drm.service... Oct 2 19:13:40.434271 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 19:13:40.434286 systemd[1]: Starting modprobe@fuse.service... Oct 2 19:13:40.434305 systemd[1]: Starting modprobe@loop.service... Oct 2 19:13:40.434321 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 19:13:40.434336 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 19:13:40.434351 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 19:13:40.434366 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 19:13:40.434384 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 19:13:40.434399 systemd[1]: Stopped systemd-journald.service. Oct 2 19:13:40.434414 kernel: loop: module loaded Oct 2 19:13:40.434430 systemd[1]: Starting systemd-journald.service... Oct 2 19:13:40.434445 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:13:40.434459 kernel: fuse: init (API version 7.34) Oct 2 19:13:40.434474 systemd[1]: Starting systemd-network-generator.service... Oct 2 19:13:40.434489 systemd[1]: Starting systemd-remount-fs.service... Oct 2 19:13:40.434504 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:13:40.434521 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 19:13:40.434536 systemd[1]: Stopped verity-setup.service. Oct 2 19:13:40.434551 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:13:40.434566 systemd[1]: Mounted dev-hugepages.mount. Oct 2 19:13:40.434582 systemd[1]: Mounted dev-mqueue.mount. Oct 2 19:13:40.434597 systemd[1]: Mounted media.mount. Oct 2 19:13:40.434612 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 19:13:40.434627 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 19:13:40.434641 systemd[1]: Mounted tmp.mount. Oct 2 19:13:40.434659 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:13:40.434677 systemd-journald[960]: Journal started Oct 2 19:13:40.434730 systemd-journald[960]: Runtime Journal (/run/log/journal/eae4b584420440b088802e44a4217af5) is 6.0M, max 48.4M, 42.4M free. Oct 2 19:13:37.789000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 19:13:38.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:13:38.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:13:38.109000 audit: BPF prog-id=10 op=LOAD Oct 2 19:13:38.109000 audit: BPF prog-id=10 op=UNLOAD Oct 2 19:13:38.109000 audit: BPF prog-id=11 op=LOAD Oct 2 19:13:38.109000 audit: BPF prog-id=11 op=UNLOAD Oct 2 19:13:40.327000 audit: BPF prog-id=12 op=LOAD Oct 2 19:13:40.327000 audit: BPF prog-id=3 op=UNLOAD Oct 2 19:13:40.327000 audit: BPF prog-id=13 op=LOAD Oct 2 19:13:40.328000 audit: BPF prog-id=14 op=LOAD Oct 2 19:13:40.328000 audit: BPF prog-id=4 op=UNLOAD Oct 2 19:13:40.328000 audit: BPF prog-id=5 op=UNLOAD Oct 2 19:13:40.328000 audit: BPF prog-id=15 op=LOAD Oct 2 19:13:40.328000 audit: BPF prog-id=12 op=UNLOAD Oct 2 19:13:40.329000 audit: BPF prog-id=16 op=LOAD Oct 2 19:13:40.329000 audit: BPF prog-id=17 op=LOAD Oct 2 19:13:40.329000 audit: BPF prog-id=13 op=UNLOAD Oct 2 19:13:40.329000 audit: BPF prog-id=14 op=UNLOAD Oct 2 19:13:40.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.346000 audit: BPF prog-id=15 op=UNLOAD Oct 2 19:13:40.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.409000 audit: BPF prog-id=18 op=LOAD Oct 2 19:13:40.409000 audit: BPF prog-id=19 op=LOAD Oct 2 19:13:40.409000 audit: BPF prog-id=20 op=LOAD Oct 2 19:13:40.409000 audit: BPF prog-id=16 op=UNLOAD Oct 2 19:13:40.409000 audit: BPF prog-id=17 op=UNLOAD Oct 2 19:13:40.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.431000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 19:13:40.431000 audit[960]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffe8cd97360 a2=4000 a3=7ffe8cd973fc items=0 ppid=1 pid=960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:40.431000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 19:13:40.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:38.172590 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2023-10-02T19:13:38Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:13:40.326595 systemd[1]: Queued start job for default target multi-user.target. Oct 2 19:13:38.172934 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2023-10-02T19:13:38Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:13:40.326605 systemd[1]: Unnecessary job was removed for dev-vda6.device. Oct 2 19:13:40.436389 systemd[1]: Started systemd-journald.service. Oct 2 19:13:38.172951 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2023-10-02T19:13:38Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:13:40.329910 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 19:13:38.172978 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2023-10-02T19:13:38Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 19:13:38.172987 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2023-10-02T19:13:38Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 19:13:38.173013 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2023-10-02T19:13:38Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 19:13:38.173024 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2023-10-02T19:13:38Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 19:13:40.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:38.173214 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2023-10-02T19:13:38Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 19:13:38.173248 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2023-10-02T19:13:38Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:13:38.173259 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2023-10-02T19:13:38Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:13:40.437334 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 19:13:38.173577 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2023-10-02T19:13:38Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 19:13:40.437438 systemd[1]: Finished modprobe@configfs.service. Oct 2 19:13:38.173610 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2023-10-02T19:13:38Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 19:13:38.173626 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2023-10-02T19:13:38Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 19:13:38.173638 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2023-10-02T19:13:38Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 19:13:38.173652 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2023-10-02T19:13:38Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 19:13:40.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:38.173664 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2023-10-02T19:13:38Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 19:13:40.044901 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2023-10-02T19:13:40Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:13:40.045289 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2023-10-02T19:13:40Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:13:40.045443 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2023-10-02T19:13:40Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:13:40.438367 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 19:13:40.045687 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2023-10-02T19:13:40Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:13:40.438462 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 19:13:40.045754 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2023-10-02T19:13:40Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 19:13:40.045841 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2023-10-02T19:13:40Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 19:13:40.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.439348 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 19:13:40.439513 systemd[1]: Finished modprobe@drm.service. Oct 2 19:13:40.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.439000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.440314 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 19:13:40.440435 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 19:13:40.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.441235 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 19:13:40.441356 systemd[1]: Finished modprobe@fuse.service. Oct 2 19:13:40.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.442090 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 19:13:40.442376 systemd[1]: Finished modprobe@loop.service. Oct 2 19:13:40.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.443320 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:13:40.444174 systemd[1]: Finished systemd-network-generator.service. Oct 2 19:13:40.444993 systemd[1]: Finished systemd-remount-fs.service. Oct 2 19:13:40.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.446113 systemd[1]: Reached target network-pre.target. Oct 2 19:13:40.447669 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 19:13:40.448962 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 19:13:40.449493 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 19:13:40.450584 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 19:13:40.451954 systemd[1]: Starting systemd-journal-flush.service... Oct 2 19:13:40.455650 systemd-journald[960]: Time spent on flushing to /var/log/journal/eae4b584420440b088802e44a4217af5 is 23.659ms for 1145 entries. Oct 2 19:13:40.455650 systemd-journald[960]: System Journal (/var/log/journal/eae4b584420440b088802e44a4217af5) is 8.0M, max 195.6M, 187.6M free. Oct 2 19:13:40.487032 systemd-journald[960]: Received client request to flush runtime journal. Oct 2 19:13:40.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.452650 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 19:13:40.453409 systemd[1]: Starting systemd-random-seed.service... Oct 2 19:13:40.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.454018 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 19:13:40.454811 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:13:40.456636 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 19:13:40.457445 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 19:13:40.459309 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 19:13:40.461584 systemd[1]: Starting systemd-sysusers.service... Oct 2 19:13:40.467710 systemd[1]: Finished systemd-random-seed.service. Oct 2 19:13:40.468402 systemd[1]: Reached target first-boot-complete.target. Oct 2 19:13:40.470508 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:13:40.486237 systemd[1]: Finished systemd-sysusers.service. Oct 2 19:13:40.487197 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:13:40.488110 systemd[1]: Finished systemd-journal-flush.service. Oct 2 19:13:40.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.489909 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:13:40.491246 systemd[1]: Starting systemd-udev-settle.service... Oct 2 19:13:40.499626 udevadm[996]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Oct 2 19:13:40.509308 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:13:40.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.892603 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 19:13:40.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.893000 audit: BPF prog-id=21 op=LOAD Oct 2 19:13:40.894000 audit: BPF prog-id=22 op=LOAD Oct 2 19:13:40.894000 audit: BPF prog-id=7 op=UNLOAD Oct 2 19:13:40.894000 audit: BPF prog-id=8 op=UNLOAD Oct 2 19:13:40.894893 systemd[1]: Starting systemd-udevd.service... Oct 2 19:13:40.912432 systemd-udevd[997]: Using default interface naming scheme 'v252'. Oct 2 19:13:40.929952 systemd[1]: Started systemd-udevd.service. Oct 2 19:13:40.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.932000 audit: BPF prog-id=23 op=LOAD Oct 2 19:13:40.933189 systemd[1]: Starting systemd-networkd.service... Oct 2 19:13:40.942000 audit: BPF prog-id=24 op=LOAD Oct 2 19:13:40.942000 audit: BPF prog-id=25 op=LOAD Oct 2 19:13:40.942000 audit: BPF prog-id=26 op=LOAD Oct 2 19:13:40.943959 systemd[1]: Starting systemd-userdbd.service... Oct 2 19:13:40.952384 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 2 19:13:40.978874 systemd[1]: Started systemd-userdbd.service. Oct 2 19:13:40.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:40.998160 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Oct 2 19:13:41.006149 kernel: ACPI: button: Power Button [PWRF] Oct 2 19:13:41.009794 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:13:41.030994 systemd-networkd[1008]: lo: Link UP Oct 2 19:13:41.031006 systemd-networkd[1008]: lo: Gained carrier Oct 2 19:13:41.031380 systemd-networkd[1008]: Enumeration completed Oct 2 19:13:41.031470 systemd-networkd[1008]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:13:41.031483 systemd[1]: Started systemd-networkd.service. Oct 2 19:13:41.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:41.033033 systemd-networkd[1008]: eth0: Link UP Oct 2 19:13:41.033044 systemd-networkd[1008]: eth0: Gained carrier Oct 2 19:13:41.017000 audit[1016]: AVC avc: denied { confidentiality } for pid=1016 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 19:13:41.017000 audit[1016]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d9869797e0 a1=32194 a2=7f9f8f69fbc5 a3=5 items=106 ppid=997 pid=1016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:41.017000 audit: CWD cwd="/" Oct 2 19:13:41.017000 audit: PATH item=0 name=(null) inode=10024 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=1 name=(null) inode=10025 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=2 name=(null) inode=10024 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=3 name=(null) inode=10026 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=4 name=(null) inode=10024 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=5 name=(null) inode=10027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=6 name=(null) inode=10027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=7 name=(null) inode=10028 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=8 name=(null) inode=10027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=9 name=(null) inode=10029 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=10 name=(null) inode=10027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=11 name=(null) inode=10030 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=12 name=(null) inode=10027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=13 name=(null) inode=10031 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=14 name=(null) inode=10027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=15 name=(null) inode=10032 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=16 name=(null) inode=10024 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=17 name=(null) inode=10033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=18 name=(null) inode=10033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=19 name=(null) inode=10034 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=20 name=(null) inode=10033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=21 name=(null) inode=10035 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=22 name=(null) inode=10033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=23 name=(null) inode=10036 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=24 name=(null) inode=10033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=25 name=(null) inode=10037 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.046247 systemd-networkd[1008]: eth0: DHCPv4 address 10.0.0.100/16, gateway 10.0.0.1 acquired from 10.0.0.1 Oct 2 19:13:41.017000 audit: PATH item=26 name=(null) inode=10033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=27 name=(null) inode=10038 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=28 name=(null) inode=10024 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=29 name=(null) inode=10039 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=30 name=(null) inode=10039 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=31 name=(null) inode=10040 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=32 name=(null) inode=10039 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=33 name=(null) inode=10041 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=34 name=(null) inode=10039 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=35 name=(null) inode=10042 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=36 name=(null) inode=10039 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=37 name=(null) inode=10043 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=38 name=(null) inode=10039 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=39 name=(null) inode=10044 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=40 name=(null) inode=10024 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=41 name=(null) inode=10045 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=42 name=(null) inode=10045 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=43 name=(null) inode=10046 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=44 name=(null) inode=10045 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=45 name=(null) inode=10047 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=46 name=(null) inode=10045 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=47 name=(null) inode=10048 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=48 name=(null) inode=10045 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=49 name=(null) inode=10049 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=50 name=(null) inode=10045 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=51 name=(null) inode=10050 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=52 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=53 name=(null) inode=10051 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=54 name=(null) inode=10051 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=55 name=(null) inode=10052 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=56 name=(null) inode=10051 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=57 name=(null) inode=10053 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=58 name=(null) inode=10051 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=59 name=(null) inode=10054 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=60 name=(null) inode=10054 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=61 name=(null) inode=10055 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=62 name=(null) inode=10054 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=63 name=(null) inode=10056 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=64 name=(null) inode=10054 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=65 name=(null) inode=10057 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=66 name=(null) inode=10054 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=67 name=(null) inode=10058 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=68 name=(null) inode=10054 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=69 name=(null) inode=10059 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=70 name=(null) inode=10051 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=71 name=(null) inode=10060 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=72 name=(null) inode=10060 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=73 name=(null) inode=10061 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=74 name=(null) inode=10060 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=75 name=(null) inode=10062 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=76 name=(null) inode=10060 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=77 name=(null) inode=10063 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=78 name=(null) inode=10060 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=79 name=(null) inode=10064 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=80 name=(null) inode=10060 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=81 name=(null) inode=10065 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=82 name=(null) inode=10051 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=83 name=(null) inode=10066 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=84 name=(null) inode=10066 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=85 name=(null) inode=10067 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=86 name=(null) inode=10066 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=87 name=(null) inode=10068 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=88 name=(null) inode=10066 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=89 name=(null) inode=10069 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=90 name=(null) inode=10066 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=91 name=(null) inode=10070 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=92 name=(null) inode=10066 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=93 name=(null) inode=10071 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=94 name=(null) inode=10051 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=95 name=(null) inode=10072 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=96 name=(null) inode=10072 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=97 name=(null) inode=10073 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=98 name=(null) inode=10072 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=99 name=(null) inode=10074 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=100 name=(null) inode=10072 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=101 name=(null) inode=10075 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=102 name=(null) inode=10072 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=103 name=(null) inode=10076 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=104 name=(null) inode=10072 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PATH item=105 name=(null) inode=10077 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:41.017000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 19:13:41.056145 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 0 Oct 2 19:13:41.060172 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Oct 2 19:13:41.064174 kernel: mousedev: PS/2 mouse device common for all mice Oct 2 19:13:41.111159 kernel: kvm: Nested Virtualization enabled Oct 2 19:13:41.111345 kernel: SVM: kvm: Nested Paging enabled Oct 2 19:13:41.125143 kernel: EDAC MC: Ver: 3.0.0 Oct 2 19:13:41.143524 systemd[1]: Finished systemd-udev-settle.service. Oct 2 19:13:41.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:41.145331 systemd[1]: Starting lvm2-activation-early.service... Oct 2 19:13:41.158537 lvm[1033]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:13:41.185099 systemd[1]: Finished lvm2-activation-early.service. Oct 2 19:13:41.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:41.185996 systemd[1]: Reached target cryptsetup.target. Oct 2 19:13:41.187841 systemd[1]: Starting lvm2-activation.service... Oct 2 19:13:41.190852 lvm[1034]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:13:41.215168 systemd[1]: Finished lvm2-activation.service. Oct 2 19:13:41.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:41.215985 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:13:41.216589 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 19:13:41.216615 systemd[1]: Reached target local-fs.target. Oct 2 19:13:41.217167 systemd[1]: Reached target machines.target. Oct 2 19:13:41.219048 systemd[1]: Starting ldconfig.service... Oct 2 19:13:41.219921 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 19:13:41.219965 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:13:41.220837 systemd[1]: Starting systemd-boot-update.service... Oct 2 19:13:41.222279 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 19:13:41.224488 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 19:13:41.225697 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:13:41.225740 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:13:41.226670 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 19:13:41.228791 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1036 (bootctl) Oct 2 19:13:41.229726 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 19:13:41.233612 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 19:13:41.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:41.240076 systemd-tmpfiles[1039]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 19:13:41.240620 systemd-tmpfiles[1039]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 19:13:41.241800 systemd-tmpfiles[1039]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 19:13:41.260232 systemd-fsck[1044]: fsck.fat 4.2 (2021-01-31) Oct 2 19:13:41.260232 systemd-fsck[1044]: /dev/vda1: 790 files, 115092/258078 clusters Oct 2 19:13:41.261985 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 19:13:41.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:41.400280 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 19:13:41.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:41.426603 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 19:13:41.428165 systemd[1]: Mounting boot.mount... Oct 2 19:13:41.434500 systemd[1]: Mounted boot.mount. Oct 2 19:13:41.448076 systemd[1]: Finished systemd-boot-update.service. Oct 2 19:13:41.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:41.507002 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 19:13:41.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:41.508956 systemd[1]: Starting audit-rules.service... Oct 2 19:13:41.510431 systemd[1]: Starting clean-ca-certificates.service... Oct 2 19:13:41.511906 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 19:13:41.513000 audit: BPF prog-id=27 op=LOAD Oct 2 19:13:41.513796 systemd[1]: Starting systemd-resolved.service... Oct 2 19:13:41.514000 audit: BPF prog-id=28 op=LOAD Oct 2 19:13:41.515890 systemd[1]: Starting systemd-timesyncd.service... Oct 2 19:13:41.518242 systemd[1]: Starting systemd-update-utmp.service... Oct 2 19:13:41.521622 systemd[1]: Finished clean-ca-certificates.service. Oct 2 19:13:41.522508 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 19:13:41.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:41.523000 audit[1055]: SYSTEM_BOOT pid=1055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 19:13:41.527519 systemd[1]: Finished systemd-update-utmp.service. Oct 2 19:13:41.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:41.538561 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 19:13:41.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:41.545000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 19:13:41.545000 audit[1069]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe952bb870 a2=420 a3=0 items=0 ppid=1049 pid=1069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:41.545000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 19:13:41.546416 augenrules[1069]: No rules Oct 2 19:13:41.547145 systemd[1]: Finished audit-rules.service. Oct 2 19:13:41.564156 ldconfig[1035]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 19:13:41.569981 systemd[1]: Finished ldconfig.service. Oct 2 19:13:42.654453 systemd-timesyncd[1054]: Contacted time server 10.0.0.1:123 (10.0.0.1). Oct 2 19:13:42.654494 systemd-timesyncd[1054]: Initial clock synchronization to Mon 2023-10-02 19:13:42.654390 UTC. Oct 2 19:13:42.654747 systemd[1]: Starting systemd-update-done.service... Oct 2 19:13:42.655404 systemd[1]: Started systemd-timesyncd.service. Oct 2 19:13:42.656219 systemd[1]: Reached target time-set.target. Oct 2 19:13:42.662242 systemd[1]: Finished systemd-update-done.service. Oct 2 19:13:42.663703 systemd-resolved[1052]: Positive Trust Anchors: Oct 2 19:13:42.663727 systemd-resolved[1052]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:13:42.663760 systemd-resolved[1052]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:13:42.677871 systemd-resolved[1052]: Defaulting to hostname 'linux'. Oct 2 19:13:42.679228 systemd[1]: Started systemd-resolved.service. Oct 2 19:13:42.679889 systemd[1]: Reached target network.target. Oct 2 19:13:42.680398 systemd[1]: Reached target nss-lookup.target. Oct 2 19:13:42.680948 systemd[1]: Reached target sysinit.target. Oct 2 19:13:42.681518 systemd[1]: Started motdgen.path. Oct 2 19:13:42.682026 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 19:13:42.682852 systemd[1]: Started logrotate.timer. Oct 2 19:13:42.683420 systemd[1]: Started mdadm.timer. Oct 2 19:13:42.683907 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 19:13:42.684475 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 19:13:42.684498 systemd[1]: Reached target paths.target. Oct 2 19:13:42.685021 systemd[1]: Reached target timers.target. Oct 2 19:13:42.685800 systemd[1]: Listening on dbus.socket. Oct 2 19:13:42.687233 systemd[1]: Starting docker.socket... Oct 2 19:13:42.690069 systemd[1]: Listening on sshd.socket. Oct 2 19:13:42.690775 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:13:42.691143 systemd[1]: Listening on docker.socket. Oct 2 19:13:42.691710 systemd[1]: Reached target sockets.target. Oct 2 19:13:42.692192 systemd[1]: Reached target basic.target. Oct 2 19:13:42.692681 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:13:42.692715 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:13:42.693530 systemd[1]: Starting containerd.service... Oct 2 19:13:42.694895 systemd[1]: Starting dbus.service... Oct 2 19:13:42.696067 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 19:13:42.697479 systemd[1]: Starting extend-filesystems.service... Oct 2 19:13:42.698060 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 19:13:42.699077 systemd[1]: Starting motdgen.service... Oct 2 19:13:42.702775 jq[1080]: false Oct 2 19:13:42.700706 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 19:13:42.702565 systemd[1]: Starting prepare-critools.service... Oct 2 19:13:42.704164 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 19:13:42.705553 systemd[1]: Starting sshd-keygen.service... Oct 2 19:13:42.708083 systemd[1]: Starting systemd-logind.service... Oct 2 19:13:42.708602 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:13:42.708654 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 2 19:13:42.721805 extend-filesystems[1081]: Found sr0 Oct 2 19:13:42.721805 extend-filesystems[1081]: Found vda Oct 2 19:13:42.721805 extend-filesystems[1081]: Found vda1 Oct 2 19:13:42.721805 extend-filesystems[1081]: Found vda2 Oct 2 19:13:42.721805 extend-filesystems[1081]: Found vda3 Oct 2 19:13:42.721805 extend-filesystems[1081]: Found usr Oct 2 19:13:42.721805 extend-filesystems[1081]: Found vda4 Oct 2 19:13:42.721805 extend-filesystems[1081]: Found vda6 Oct 2 19:13:42.721805 extend-filesystems[1081]: Found vda7 Oct 2 19:13:42.721805 extend-filesystems[1081]: Found vda9 Oct 2 19:13:42.721805 extend-filesystems[1081]: Checking size of /dev/vda9 Oct 2 19:13:42.709034 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 19:13:42.734008 jq[1097]: true Oct 2 19:13:42.709540 systemd[1]: Starting update-engine.service... Oct 2 19:13:42.711059 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 19:13:42.734372 tar[1100]: ./ Oct 2 19:13:42.734372 tar[1100]: ./macvlan Oct 2 19:13:42.712938 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 19:13:42.734645 tar[1102]: crictl Oct 2 19:13:42.713114 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 19:13:42.713352 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 19:13:42.735006 jq[1108]: true Oct 2 19:13:42.713481 systemd[1]: Finished motdgen.service. Oct 2 19:13:42.715172 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 19:13:42.715341 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 19:13:42.743583 dbus-daemon[1079]: [system] SELinux support is enabled Oct 2 19:13:42.744046 systemd[1]: Started dbus.service. Oct 2 19:13:42.746670 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 19:13:42.746732 systemd[1]: Reached target system-config.target. Oct 2 19:13:42.747302 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 19:13:42.747313 systemd[1]: Reached target user-config.target. Oct 2 19:13:42.753214 extend-filesystems[1081]: Old size kept for /dev/vda9 Oct 2 19:13:42.754494 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 19:13:42.754664 systemd[1]: Finished extend-filesystems.service. Oct 2 19:13:42.769708 bash[1129]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:13:42.772109 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 19:13:42.778371 env[1103]: time="2023-10-02T19:13:42.778322993Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 19:13:42.787956 update_engine[1096]: I1002 19:13:42.787484 1096 main.cc:92] Flatcar Update Engine starting Oct 2 19:13:42.790316 tar[1100]: ./static Oct 2 19:13:42.790544 systemd[1]: Started update-engine.service. Oct 2 19:13:42.790637 update_engine[1096]: I1002 19:13:42.790573 1096 update_check_scheduler.cc:74] Next update check in 7m19s Oct 2 19:13:42.792991 systemd[1]: Started locksmithd.service. Oct 2 19:13:42.807476 systemd-logind[1094]: Watching system buttons on /dev/input/event1 (Power Button) Oct 2 19:13:42.807501 systemd-logind[1094]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 2 19:13:42.807771 systemd-logind[1094]: New seat seat0. Oct 2 19:13:42.809523 systemd[1]: Started systemd-logind.service. Oct 2 19:13:42.820186 env[1103]: time="2023-10-02T19:13:42.820144358Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 19:13:42.820308 env[1103]: time="2023-10-02T19:13:42.820285673Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:13:42.821010 tar[1100]: ./vlan Oct 2 19:13:42.829923 env[1103]: time="2023-10-02T19:13:42.829886532Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:13:42.829923 env[1103]: time="2023-10-02T19:13:42.829914775Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:13:42.830123 env[1103]: time="2023-10-02T19:13:42.830096265Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:13:42.830123 env[1103]: time="2023-10-02T19:13:42.830116614Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 19:13:42.830196 env[1103]: time="2023-10-02T19:13:42.830127304Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 19:13:42.830196 env[1103]: time="2023-10-02T19:13:42.830136140Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 19:13:42.830236 env[1103]: time="2023-10-02T19:13:42.830200681Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:13:42.830417 env[1103]: time="2023-10-02T19:13:42.830392691Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:13:42.830514 env[1103]: time="2023-10-02T19:13:42.830490595Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:13:42.830514 env[1103]: time="2023-10-02T19:13:42.830507797Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 19:13:42.830581 env[1103]: time="2023-10-02T19:13:42.830551720Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 19:13:42.830581 env[1103]: time="2023-10-02T19:13:42.830562289Z" level=info msg="metadata content store policy set" policy=shared Oct 2 19:13:42.837210 env[1103]: time="2023-10-02T19:13:42.837179812Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 19:13:42.837210 env[1103]: time="2023-10-02T19:13:42.837211391Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 19:13:42.837287 env[1103]: time="2023-10-02T19:13:42.837223404Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 19:13:42.837287 env[1103]: time="2023-10-02T19:13:42.837247218Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 19:13:42.837287 env[1103]: time="2023-10-02T19:13:42.837263770Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 19:13:42.837287 env[1103]: time="2023-10-02T19:13:42.837275461Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 19:13:42.837287 env[1103]: time="2023-10-02T19:13:42.837286021Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 19:13:42.837391 env[1103]: time="2023-10-02T19:13:42.837298174Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 19:13:42.837391 env[1103]: time="2023-10-02T19:13:42.837309315Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 19:13:42.837391 env[1103]: time="2023-10-02T19:13:42.837320536Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 19:13:42.837391 env[1103]: time="2023-10-02T19:13:42.837330855Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 19:13:42.837391 env[1103]: time="2023-10-02T19:13:42.837340704Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 19:13:42.837514 env[1103]: time="2023-10-02T19:13:42.837413300Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 19:13:42.837514 env[1103]: time="2023-10-02T19:13:42.837473272Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 19:13:42.837672 env[1103]: time="2023-10-02T19:13:42.837647319Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 19:13:42.837748 env[1103]: time="2023-10-02T19:13:42.837673969Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 19:13:42.837748 env[1103]: time="2023-10-02T19:13:42.837685571Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 19:13:42.837748 env[1103]: time="2023-10-02T19:13:42.837745563Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 19:13:42.837845 env[1103]: time="2023-10-02T19:13:42.837757145Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 19:13:42.837845 env[1103]: time="2023-10-02T19:13:42.837776551Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 19:13:42.837845 env[1103]: time="2023-10-02T19:13:42.837788744Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 19:13:42.837845 env[1103]: time="2023-10-02T19:13:42.837800206Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 19:13:42.837845 env[1103]: time="2023-10-02T19:13:42.837812178Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 19:13:42.837845 env[1103]: time="2023-10-02T19:13:42.837822167Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 19:13:42.837845 env[1103]: time="2023-10-02T19:13:42.837831945Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 19:13:42.837845 env[1103]: time="2023-10-02T19:13:42.837843507Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 19:13:42.838041 env[1103]: time="2023-10-02T19:13:42.837933085Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 19:13:42.838041 env[1103]: time="2023-10-02T19:13:42.837946590Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 19:13:42.838041 env[1103]: time="2023-10-02T19:13:42.837957250Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 19:13:42.838041 env[1103]: time="2023-10-02T19:13:42.837967119Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 19:13:42.838041 env[1103]: time="2023-10-02T19:13:42.837978781Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 19:13:42.838041 env[1103]: time="2023-10-02T19:13:42.837987758Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 19:13:42.838041 env[1103]: time="2023-10-02T19:13:42.838003978Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 19:13:42.838041 env[1103]: time="2023-10-02T19:13:42.838034345Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 19:13:42.838250 env[1103]: time="2023-10-02T19:13:42.838196790Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 19:13:42.838250 env[1103]: time="2023-10-02T19:13:42.838248787Z" level=info msg="Connect containerd service" Oct 2 19:13:42.839910 env[1103]: time="2023-10-02T19:13:42.838274986Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 19:13:42.839910 env[1103]: time="2023-10-02T19:13:42.838729679Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:13:42.839910 env[1103]: time="2023-10-02T19:13:42.838956414Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 19:13:42.839910 env[1103]: time="2023-10-02T19:13:42.838985960Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 19:13:42.839910 env[1103]: time="2023-10-02T19:13:42.839023621Z" level=info msg="containerd successfully booted in 0.072485s" Oct 2 19:13:42.839106 systemd[1]: Started containerd.service. Oct 2 19:13:42.844821 env[1103]: time="2023-10-02T19:13:42.844774598Z" level=info msg="Start subscribing containerd event" Oct 2 19:13:42.846310 env[1103]: time="2023-10-02T19:13:42.846294268Z" level=info msg="Start recovering state" Oct 2 19:13:42.846426 env[1103]: time="2023-10-02T19:13:42.846410366Z" level=info msg="Start event monitor" Oct 2 19:13:42.846505 env[1103]: time="2023-10-02T19:13:42.846487380Z" level=info msg="Start snapshots syncer" Oct 2 19:13:42.846592 env[1103]: time="2023-10-02T19:13:42.846574674Z" level=info msg="Start cni network conf syncer for default" Oct 2 19:13:42.846661 env[1103]: time="2023-10-02T19:13:42.846643684Z" level=info msg="Start streaming server" Oct 2 19:13:42.859063 tar[1100]: ./portmap Oct 2 19:13:42.890055 tar[1100]: ./host-local Oct 2 19:13:42.916396 locksmithd[1135]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 19:13:42.920279 tar[1100]: ./vrf Oct 2 19:13:42.968331 tar[1100]: ./bridge Oct 2 19:13:43.213644 sshd_keygen[1104]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 19:13:43.326025 systemd[1]: Finished sshd-keygen.service. Oct 2 19:13:43.327505 tar[1100]: ./tuning Oct 2 19:13:43.328830 systemd[1]: Starting issuegen.service... Oct 2 19:13:43.334246 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 19:13:43.334437 systemd[1]: Finished issuegen.service. Oct 2 19:13:43.336905 systemd[1]: Starting systemd-user-sessions.service... Oct 2 19:13:43.342269 systemd[1]: Finished systemd-user-sessions.service. Oct 2 19:13:43.344654 systemd[1]: Started getty@tty1.service. Oct 2 19:13:43.347409 systemd[1]: Started serial-getty@ttyS0.service. Oct 2 19:13:43.348535 systemd[1]: Reached target getty.target. Oct 2 19:13:43.354554 tar[1100]: ./firewall Oct 2 19:13:43.361663 systemd[1]: Finished prepare-critools.service. Oct 2 19:13:43.398492 tar[1100]: ./host-device Oct 2 19:13:43.434176 tar[1100]: ./sbr Oct 2 19:13:43.484908 tar[1100]: ./loopback Oct 2 19:13:43.518297 tar[1100]: ./dhcp Oct 2 19:13:43.621150 tar[1100]: ./ptp Oct 2 19:13:43.651617 tar[1100]: ./ipvlan Oct 2 19:13:43.680721 tar[1100]: ./bandwidth Oct 2 19:13:43.727261 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 19:13:43.728469 systemd[1]: Reached target multi-user.target. Oct 2 19:13:43.730556 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 19:13:43.737228 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 19:13:43.737381 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 19:13:43.738240 systemd[1]: Startup finished in 559ms (kernel) + 6.049s (initrd) + 4.910s (userspace) = 11.518s. Oct 2 19:13:44.324901 systemd-networkd[1008]: eth0: Gained IPv6LL Oct 2 19:13:46.693122 systemd[1]: Created slice system-sshd.slice. Oct 2 19:13:46.694271 systemd[1]: Started sshd@0-10.0.0.100:22-10.0.0.1:49088.service. Oct 2 19:13:46.737567 sshd[1162]: Accepted publickey for core from 10.0.0.1 port 49088 ssh2: RSA SHA256:9wRqOmzBU7I1L73Sd3XbDPVeoZziQ4I3fHnP0PJ8idM Oct 2 19:13:46.739350 sshd[1162]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:13:46.747804 systemd[1]: Created slice user-500.slice. Oct 2 19:13:46.748941 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 19:13:46.750647 systemd-logind[1094]: New session 1 of user core. Oct 2 19:13:46.756893 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 19:13:46.758073 systemd[1]: Starting user@500.service... Oct 2 19:13:46.761551 (systemd)[1165]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:13:46.836997 systemd[1165]: Queued start job for default target default.target. Oct 2 19:13:46.837481 systemd[1165]: Reached target paths.target. Oct 2 19:13:46.837501 systemd[1165]: Reached target sockets.target. Oct 2 19:13:46.837514 systemd[1165]: Reached target timers.target. Oct 2 19:13:46.837525 systemd[1165]: Reached target basic.target. Oct 2 19:13:46.837580 systemd[1165]: Reached target default.target. Oct 2 19:13:46.837609 systemd[1165]: Startup finished in 69ms. Oct 2 19:13:46.837716 systemd[1]: Started user@500.service. Oct 2 19:13:46.838701 systemd[1]: Started session-1.scope. Oct 2 19:13:46.889327 systemd[1]: Started sshd@1-10.0.0.100:22-10.0.0.1:49098.service. Oct 2 19:13:46.919961 sshd[1174]: Accepted publickey for core from 10.0.0.1 port 49098 ssh2: RSA SHA256:9wRqOmzBU7I1L73Sd3XbDPVeoZziQ4I3fHnP0PJ8idM Oct 2 19:13:46.921042 sshd[1174]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:13:46.924453 systemd-logind[1094]: New session 2 of user core. Oct 2 19:13:46.925218 systemd[1]: Started session-2.scope. Oct 2 19:13:46.979167 sshd[1174]: pam_unix(sshd:session): session closed for user core Oct 2 19:13:46.981938 systemd[1]: sshd@1-10.0.0.100:22-10.0.0.1:49098.service: Deactivated successfully. Oct 2 19:13:46.982589 systemd[1]: session-2.scope: Deactivated successfully. Oct 2 19:13:46.983100 systemd-logind[1094]: Session 2 logged out. Waiting for processes to exit. Oct 2 19:13:46.984288 systemd[1]: Started sshd@2-10.0.0.100:22-10.0.0.1:49112.service. Oct 2 19:13:46.984989 systemd-logind[1094]: Removed session 2. Oct 2 19:13:47.012786 sshd[1180]: Accepted publickey for core from 10.0.0.1 port 49112 ssh2: RSA SHA256:9wRqOmzBU7I1L73Sd3XbDPVeoZziQ4I3fHnP0PJ8idM Oct 2 19:13:47.014034 sshd[1180]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:13:47.017645 systemd-logind[1094]: New session 3 of user core. Oct 2 19:13:47.018357 systemd[1]: Started session-3.scope. Oct 2 19:13:47.067273 sshd[1180]: pam_unix(sshd:session): session closed for user core Oct 2 19:13:47.069850 systemd[1]: sshd@2-10.0.0.100:22-10.0.0.1:49112.service: Deactivated successfully. Oct 2 19:13:47.070312 systemd[1]: session-3.scope: Deactivated successfully. Oct 2 19:13:47.070734 systemd-logind[1094]: Session 3 logged out. Waiting for processes to exit. Oct 2 19:13:47.071639 systemd[1]: Started sshd@3-10.0.0.100:22-10.0.0.1:49116.service. Oct 2 19:13:47.072192 systemd-logind[1094]: Removed session 3. Oct 2 19:13:47.099847 sshd[1186]: Accepted publickey for core from 10.0.0.1 port 49116 ssh2: RSA SHA256:9wRqOmzBU7I1L73Sd3XbDPVeoZziQ4I3fHnP0PJ8idM Oct 2 19:13:47.101842 sshd[1186]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:13:47.106743 systemd-logind[1094]: New session 4 of user core. Oct 2 19:13:47.107646 systemd[1]: Started session-4.scope. Oct 2 19:13:47.161477 sshd[1186]: pam_unix(sshd:session): session closed for user core Oct 2 19:13:47.164137 systemd[1]: sshd@3-10.0.0.100:22-10.0.0.1:49116.service: Deactivated successfully. Oct 2 19:13:47.164676 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 19:13:47.165228 systemd-logind[1094]: Session 4 logged out. Waiting for processes to exit. Oct 2 19:13:47.166239 systemd[1]: Started sshd@4-10.0.0.100:22-10.0.0.1:49128.service. Oct 2 19:13:47.166995 systemd-logind[1094]: Removed session 4. Oct 2 19:13:47.193326 sshd[1192]: Accepted publickey for core from 10.0.0.1 port 49128 ssh2: RSA SHA256:9wRqOmzBU7I1L73Sd3XbDPVeoZziQ4I3fHnP0PJ8idM Oct 2 19:13:47.194298 sshd[1192]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:13:47.197705 systemd-logind[1094]: New session 5 of user core. Oct 2 19:13:47.198463 systemd[1]: Started session-5.scope. Oct 2 19:13:47.257186 sudo[1195]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 19:13:47.257394 sudo[1195]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:13:47.267886 dbus-daemon[1079]: нh\xf7\xccU: received setenforce notice (enforcing=-1620538272) Oct 2 19:13:47.269855 sudo[1195]: pam_unix(sudo:session): session closed for user root Oct 2 19:13:47.271966 sshd[1192]: pam_unix(sshd:session): session closed for user core Oct 2 19:13:47.274657 systemd[1]: sshd@4-10.0.0.100:22-10.0.0.1:49128.service: Deactivated successfully. Oct 2 19:13:47.275267 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 19:13:47.275869 systemd-logind[1094]: Session 5 logged out. Waiting for processes to exit. Oct 2 19:13:47.276973 systemd[1]: Started sshd@5-10.0.0.100:22-10.0.0.1:49136.service. Oct 2 19:13:47.277682 systemd-logind[1094]: Removed session 5. Oct 2 19:13:47.307967 sshd[1199]: Accepted publickey for core from 10.0.0.1 port 49136 ssh2: RSA SHA256:9wRqOmzBU7I1L73Sd3XbDPVeoZziQ4I3fHnP0PJ8idM Oct 2 19:13:47.309320 sshd[1199]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:13:47.312672 systemd-logind[1094]: New session 6 of user core. Oct 2 19:13:47.313544 systemd[1]: Started session-6.scope. Oct 2 19:13:47.367339 sudo[1203]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 19:13:47.367583 sudo[1203]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:13:47.370200 sudo[1203]: pam_unix(sudo:session): session closed for user root Oct 2 19:13:47.374561 sudo[1202]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 19:13:47.374791 sudo[1202]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:13:47.382719 systemd[1]: Stopping audit-rules.service... Oct 2 19:13:47.383000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:13:47.383930 auditctl[1206]: No rules Oct 2 19:13:47.384245 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 19:13:47.384430 systemd[1]: Stopped audit-rules.service. Oct 2 19:13:47.385681 kernel: kauditd_printk_skb: 231 callbacks suppressed Oct 2 19:13:47.385811 kernel: audit: type=1305 audit(1696274027.383:163): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:13:47.385835 kernel: audit: type=1300 audit(1696274027.383:163): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff59b9a5f0 a2=420 a3=0 items=0 ppid=1 pid=1206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:47.383000 audit[1206]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff59b9a5f0 a2=420 a3=0 items=0 ppid=1 pid=1206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:47.386072 systemd[1]: Starting audit-rules.service... Oct 2 19:13:47.388363 kernel: audit: type=1327 audit(1696274027.383:163): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:13:47.383000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:13:47.389195 kernel: audit: type=1131 audit(1696274027.383:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:47.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:47.401009 augenrules[1223]: No rules Oct 2 19:13:47.401721 systemd[1]: Finished audit-rules.service. Oct 2 19:13:47.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:47.403018 sudo[1202]: pam_unix(sudo:session): session closed for user root Oct 2 19:13:47.402000 audit[1202]: USER_END pid=1202 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:13:47.404921 sshd[1199]: pam_unix(sshd:session): session closed for user core Oct 2 19:13:47.407182 kernel: audit: type=1130 audit(1696274027.401:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:47.409074 kernel: audit: type=1106 audit(1696274027.402:166): pid=1202 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:13:47.409111 kernel: audit: type=1104 audit(1696274027.402:167): pid=1202 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:13:47.402000 audit[1202]: CRED_DISP pid=1202 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:13:47.407479 systemd[1]: sshd@5-10.0.0.100:22-10.0.0.1:49136.service: Deactivated successfully. Oct 2 19:13:47.408206 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 19:13:47.405000 audit[1199]: USER_END pid=1199 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:13:47.411762 systemd-logind[1094]: Session 6 logged out. Waiting for processes to exit. Oct 2 19:13:47.412969 systemd[1]: Started sshd@6-10.0.0.100:22-10.0.0.1:49142.service. Oct 2 19:13:47.413569 kernel: audit: type=1106 audit(1696274027.405:168): pid=1199 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:13:47.413626 kernel: audit: type=1104 audit(1696274027.405:169): pid=1199 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:13:47.405000 audit[1199]: CRED_DISP pid=1199 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:13:47.413947 systemd-logind[1094]: Removed session 6. Oct 2 19:13:47.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.100:22-10.0.0.1:49136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:47.418306 kernel: audit: type=1131 audit(1696274027.406:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.100:22-10.0.0.1:49136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:47.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.100:22-10.0.0.1:49142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:47.444000 audit[1229]: USER_ACCT pid=1229 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:13:47.445074 sshd[1229]: Accepted publickey for core from 10.0.0.1 port 49142 ssh2: RSA SHA256:9wRqOmzBU7I1L73Sd3XbDPVeoZziQ4I3fHnP0PJ8idM Oct 2 19:13:47.445000 audit[1229]: CRED_ACQ pid=1229 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:13:47.445000 audit[1229]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff235fab80 a2=3 a3=0 items=0 ppid=1 pid=1229 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:47.445000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:13:47.446437 sshd[1229]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:13:47.450142 systemd-logind[1094]: New session 7 of user core. Oct 2 19:13:47.450878 systemd[1]: Started session-7.scope. Oct 2 19:13:47.454000 audit[1229]: USER_START pid=1229 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:13:47.456000 audit[1231]: CRED_ACQ pid=1231 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:13:47.504000 audit[1232]: USER_ACCT pid=1232 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:13:47.504000 audit[1232]: CRED_REFR pid=1232 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:13:47.505422 sudo[1232]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 19:13:47.505681 sudo[1232]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:13:47.506000 audit[1232]: USER_START pid=1232 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:13:48.032468 systemd[1]: Reloading. Oct 2 19:13:48.100589 /usr/lib/systemd/system-generators/torcx-generator[1261]: time="2023-10-02T19:13:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:13:48.100613 /usr/lib/systemd/system-generators/torcx-generator[1261]: time="2023-10-02T19:13:48Z" level=info msg="torcx already run" Oct 2 19:13:48.177330 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:13:48.177350 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:13:48.198169 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:13:48.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.253000 audit: BPF prog-id=34 op=LOAD Oct 2 19:13:48.253000 audit: BPF prog-id=23 op=UNLOAD Oct 2 19:13:48.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.254000 audit: BPF prog-id=35 op=LOAD Oct 2 19:13:48.254000 audit: BPF prog-id=27 op=UNLOAD Oct 2 19:13:48.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.255000 audit: BPF prog-id=36 op=LOAD Oct 2 19:13:48.255000 audit: BPF prog-id=29 op=UNLOAD Oct 2 19:13:48.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.255000 audit: BPF prog-id=37 op=LOAD Oct 2 19:13:48.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.255000 audit: BPF prog-id=38 op=LOAD Oct 2 19:13:48.255000 audit: BPF prog-id=30 op=UNLOAD Oct 2 19:13:48.255000 audit: BPF prog-id=31 op=UNLOAD Oct 2 19:13:48.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.256000 audit: BPF prog-id=39 op=LOAD Oct 2 19:13:48.256000 audit: BPF prog-id=24 op=UNLOAD Oct 2 19:13:48.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.256000 audit: BPF prog-id=40 op=LOAD Oct 2 19:13:48.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.256000 audit: BPF prog-id=41 op=LOAD Oct 2 19:13:48.256000 audit: BPF prog-id=25 op=UNLOAD Oct 2 19:13:48.256000 audit: BPF prog-id=26 op=UNLOAD Oct 2 19:13:48.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.257000 audit: BPF prog-id=42 op=LOAD Oct 2 19:13:48.257000 audit: BPF prog-id=18 op=UNLOAD Oct 2 19:13:48.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.257000 audit: BPF prog-id=43 op=LOAD Oct 2 19:13:48.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.257000 audit: BPF prog-id=44 op=LOAD Oct 2 19:13:48.257000 audit: BPF prog-id=19 op=UNLOAD Oct 2 19:13:48.257000 audit: BPF prog-id=20 op=UNLOAD Oct 2 19:13:48.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.258000 audit: BPF prog-id=45 op=LOAD Oct 2 19:13:48.258000 audit: BPF prog-id=28 op=UNLOAD Oct 2 19:13:48.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.259000 audit: BPF prog-id=46 op=LOAD Oct 2 19:13:48.259000 audit: BPF prog-id=32 op=UNLOAD Oct 2 19:13:48.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.260000 audit: BPF prog-id=47 op=LOAD Oct 2 19:13:48.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:48.260000 audit: BPF prog-id=48 op=LOAD Oct 2 19:13:48.260000 audit: BPF prog-id=21 op=UNLOAD Oct 2 19:13:48.260000 audit: BPF prog-id=22 op=UNLOAD Oct 2 19:13:48.269000 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 19:13:48.275419 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 19:13:48.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:48.275802 systemd[1]: Reached target network-online.target. Oct 2 19:13:48.277088 systemd[1]: Started kubelet.service. Oct 2 19:13:48.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:48.287766 systemd[1]: Starting coreos-metadata.service... Oct 2 19:13:48.298193 systemd[1]: coreos-metadata.service: Deactivated successfully. Oct 2 19:13:48.298380 systemd[1]: Finished coreos-metadata.service. Oct 2 19:13:48.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:48.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:48.338491 kubelet[1303]: E1002 19:13:48.338399 1303 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 19:13:48.340855 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:13:48.340999 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:13:48.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:13:48.614393 systemd[1]: Stopped kubelet.service. Oct 2 19:13:48.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:48.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:48.629955 systemd[1]: Reloading. Oct 2 19:13:48.702476 /usr/lib/systemd/system-generators/torcx-generator[1370]: time="2023-10-02T19:13:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:13:48.702514 /usr/lib/systemd/system-generators/torcx-generator[1370]: time="2023-10-02T19:13:48Z" level=info msg="torcx already run" Oct 2 19:13:48.936291 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:13:48.936306 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:13:48.955515 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:13:49.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.008000 audit: BPF prog-id=49 op=LOAD Oct 2 19:13:49.008000 audit: BPF prog-id=34 op=UNLOAD Oct 2 19:13:49.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.009000 audit: BPF prog-id=50 op=LOAD Oct 2 19:13:49.009000 audit: BPF prog-id=35 op=UNLOAD Oct 2 19:13:49.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit: BPF prog-id=51 op=LOAD Oct 2 19:13:49.010000 audit: BPF prog-id=36 op=UNLOAD Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit: BPF prog-id=52 op=LOAD Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit: BPF prog-id=53 op=LOAD Oct 2 19:13:49.010000 audit: BPF prog-id=37 op=UNLOAD Oct 2 19:13:49.010000 audit: BPF prog-id=38 op=UNLOAD Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit: BPF prog-id=54 op=LOAD Oct 2 19:13:49.010000 audit: BPF prog-id=39 op=UNLOAD Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit: BPF prog-id=55 op=LOAD Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.011000 audit: BPF prog-id=56 op=LOAD Oct 2 19:13:49.011000 audit: BPF prog-id=40 op=UNLOAD Oct 2 19:13:49.011000 audit: BPF prog-id=41 op=UNLOAD Oct 2 19:13:49.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.012000 audit: BPF prog-id=57 op=LOAD Oct 2 19:13:49.012000 audit: BPF prog-id=42 op=UNLOAD Oct 2 19:13:49.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.012000 audit: BPF prog-id=58 op=LOAD Oct 2 19:13:49.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.012000 audit: BPF prog-id=59 op=LOAD Oct 2 19:13:49.012000 audit: BPF prog-id=43 op=UNLOAD Oct 2 19:13:49.012000 audit: BPF prog-id=44 op=UNLOAD Oct 2 19:13:49.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.012000 audit: BPF prog-id=60 op=LOAD Oct 2 19:13:49.012000 audit: BPF prog-id=45 op=UNLOAD Oct 2 19:13:49.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.013000 audit: BPF prog-id=61 op=LOAD Oct 2 19:13:49.013000 audit: BPF prog-id=46 op=UNLOAD Oct 2 19:13:49.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.015000 audit: BPF prog-id=62 op=LOAD Oct 2 19:13:49.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.015000 audit: BPF prog-id=63 op=LOAD Oct 2 19:13:49.015000 audit: BPF prog-id=47 op=UNLOAD Oct 2 19:13:49.015000 audit: BPF prog-id=48 op=UNLOAD Oct 2 19:13:49.026493 systemd[1]: Started kubelet.service. Oct 2 19:13:49.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:49.073752 kubelet[1412]: Flag --container-runtime has been deprecated, will be removed in 1.27 as the only valid value is 'remote' Oct 2 19:13:49.073752 kubelet[1412]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 19:13:49.073752 kubelet[1412]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:13:49.074197 kubelet[1412]: I1002 19:13:49.073777 1412 server.go:200] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:13:49.075106 kubelet[1412]: Flag --container-runtime has been deprecated, will be removed in 1.27 as the only valid value is 'remote' Oct 2 19:13:49.075106 kubelet[1412]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 19:13:49.075106 kubelet[1412]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:13:49.321150 kubelet[1412]: I1002 19:13:49.321046 1412 server.go:413] "Kubelet version" kubeletVersion="v1.25.10" Oct 2 19:13:49.321150 kubelet[1412]: I1002 19:13:49.321074 1412 server.go:415] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:13:49.321443 kubelet[1412]: I1002 19:13:49.321415 1412 server.go:825] "Client rotation is on, will bootstrap in background" Oct 2 19:13:49.323687 kubelet[1412]: I1002 19:13:49.323606 1412 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:13:49.331366 kubelet[1412]: I1002 19:13:49.331332 1412 server.go:660] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:13:49.331600 kubelet[1412]: I1002 19:13:49.331568 1412 container_manager_linux.go:262] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:13:49.331670 kubelet[1412]: I1002 19:13:49.331656 1412 container_manager_linux.go:267] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] ExperimentalCPUManagerPolicy:none ExperimentalCPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container ExperimentalCPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none} Oct 2 19:13:49.331807 kubelet[1412]: I1002 19:13:49.331681 1412 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 19:13:49.331807 kubelet[1412]: I1002 19:13:49.331707 1412 container_manager_linux.go:302] "Creating device plugin manager" devicePluginEnabled=true Oct 2 19:13:49.331875 kubelet[1412]: I1002 19:13:49.331818 1412 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:13:49.334626 kubelet[1412]: I1002 19:13:49.334601 1412 kubelet.go:381] "Attempting to sync node with API server" Oct 2 19:13:49.334674 kubelet[1412]: I1002 19:13:49.334632 1412 kubelet.go:270] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:13:49.334674 kubelet[1412]: I1002 19:13:49.334655 1412 kubelet.go:281] "Adding apiserver pod source" Oct 2 19:13:49.334674 kubelet[1412]: I1002 19:13:49.334670 1412 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:13:49.334753 kubelet[1412]: E1002 19:13:49.334730 1412 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:13:49.334774 kubelet[1412]: E1002 19:13:49.334770 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:13:49.335530 kubelet[1412]: I1002 19:13:49.335517 1412 kuberuntime_manager.go:240] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:13:49.335898 kubelet[1412]: W1002 19:13:49.335870 1412 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 19:13:49.336216 kubelet[1412]: I1002 19:13:49.336193 1412 server.go:1175] "Started kubelet" Oct 2 19:13:49.336373 kubelet[1412]: I1002 19:13:49.336357 1412 server.go:155] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:13:49.336914 kubelet[1412]: E1002 19:13:49.336895 1412 cri_stats_provider.go:452] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:13:49.336914 kubelet[1412]: I1002 19:13:49.336904 1412 server.go:438] "Adding debug handlers to kubelet server" Oct 2 19:13:49.336996 kubelet[1412]: E1002 19:13:49.336923 1412 kubelet.go:1317] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:13:49.336000 audit[1412]: AVC avc: denied { mac_admin } for pid=1412 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.336000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:13:49.336000 audit[1412]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d7e9f0 a1=c000b28180 a2=c000d7e9c0 a3=25 items=0 ppid=1 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.336000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:13:49.336000 audit[1412]: AVC avc: denied { mac_admin } for pid=1412 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.336000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:13:49.336000 audit[1412]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0000f4300 a1=c000b28198 a2=c000d7ea80 a3=25 items=0 ppid=1 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.336000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:13:49.337588 kubelet[1412]: I1002 19:13:49.337236 1412 kubelet.go:1274] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:13:49.337588 kubelet[1412]: I1002 19:13:49.337269 1412 kubelet.go:1278] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:13:49.337588 kubelet[1412]: I1002 19:13:49.337313 1412 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:13:49.337588 kubelet[1412]: I1002 19:13:49.337545 1412 volume_manager.go:293] "Starting Kubelet Volume Manager" Oct 2 19:13:49.337588 kubelet[1412]: I1002 19:13:49.337586 1412 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Oct 2 19:13:49.339081 kubelet[1412]: E1002 19:13:49.339051 1412 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:13:49.346022 kubelet[1412]: E1002 19:13:49.345990 1412 controller.go:144] failed to ensure lease exists, will retry in 200ms, error: leases.coordination.k8s.io "10.0.0.100" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Oct 2 19:13:49.346107 kubelet[1412]: W1002 19:13:49.346088 1412 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Node: nodes "10.0.0.100" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:13:49.346133 kubelet[1412]: E1002 19:13:49.346106 1412 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.100" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:13:49.346241 kubelet[1412]: E1002 19:13:49.346134 1412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100.178a603e104da6e0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.100", UID:"10.0.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 336176352, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 336176352, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:13:49.347789 kubelet[1412]: W1002 19:13:49.346383 1412 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 19:13:49.347789 kubelet[1412]: E1002 19:13:49.346401 1412 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 19:13:49.347789 kubelet[1412]: W1002 19:13:49.346443 1412 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:13:49.347789 kubelet[1412]: E1002 19:13:49.346452 1412 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:13:49.350721 kubelet[1412]: E1002 19:13:49.349899 1412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100.178a603e1058dde3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.100", UID:"10.0.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 336911331, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 336911331, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:13:49.357870 kubelet[1412]: I1002 19:13:49.357844 1412 cpu_manager.go:213] "Starting CPU manager" policy="none" Oct 2 19:13:49.357870 kubelet[1412]: I1002 19:13:49.357862 1412 cpu_manager.go:214] "Reconciling" reconcilePeriod="10s" Oct 2 19:13:49.357978 kubelet[1412]: I1002 19:13:49.357878 1412 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:13:49.358337 kubelet[1412]: E1002 19:13:49.358243 1412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100.178a603e118cfe6c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.100", UID:"10.0.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.100 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 357104748, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 357104748, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:13:49.361000 audit[1426]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:49.361000 audit[1426]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffec079e9b0 a2=0 a3=7ffec079e99c items=0 ppid=1412 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.361000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:13:49.362382 kubelet[1412]: E1002 19:13:49.359228 1412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100.178a603e118d169b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.100", UID:"10.0.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.100 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 357110939, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 357110939, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:13:49.362447 kubelet[1412]: E1002 19:13:49.359947 1412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100.178a603e118d2353", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.100", UID:"10.0.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.100 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 357114195, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 357114195, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:13:49.362000 audit[1433]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:49.362000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffed7c463a0 a2=0 a3=7ffed7c4638c items=0 ppid=1412 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.362000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:13:49.393325 kubelet[1412]: I1002 19:13:49.393274 1412 policy_none.go:49] "None policy: Start" Oct 2 19:13:49.394107 kubelet[1412]: I1002 19:13:49.394087 1412 memory_manager.go:168] "Starting memorymanager" policy="None" Oct 2 19:13:49.394107 kubelet[1412]: I1002 19:13:49.394114 1412 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:13:49.363000 audit[1435]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:49.363000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffeb614b240 a2=0 a3=7ffeb614b22c items=0 ppid=1412 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.363000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:13:49.397000 audit[1440]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:49.397000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe7113b390 a2=0 a3=7ffe7113b37c items=0 ppid=1412 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.397000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:13:49.399609 systemd[1]: Created slice kubepods.slice. Oct 2 19:13:49.402785 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 19:13:49.410632 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 19:13:49.411599 kubelet[1412]: I1002 19:13:49.411568 1412 manager.go:447] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:13:49.410000 audit[1412]: AVC avc: denied { mac_admin } for pid=1412 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:49.410000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:13:49.410000 audit[1412]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cac390 a1=c000e03920 a2=c000cac360 a3=25 items=0 ppid=1 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.410000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:13:49.411833 kubelet[1412]: I1002 19:13:49.411630 1412 server.go:86] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:13:49.411833 kubelet[1412]: I1002 19:13:49.411775 1412 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:13:49.412829 kubelet[1412]: E1002 19:13:49.412811 1412 eviction_manager.go:256] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.100\" not found" Oct 2 19:13:49.417626 kubelet[1412]: E1002 19:13:49.417529 1412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100.178a603e1511526c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.100", UID:"10.0.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 416108652, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 416108652, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:13:49.431000 audit[1445]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:49.431000 audit[1445]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffcca7f84a0 a2=0 a3=7ffcca7f848c items=0 ppid=1412 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.431000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 19:13:49.432000 audit[1446]: NETFILTER_CFG table=nat:7 family=2 entries=2 op=nft_register_chain pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:49.432000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd35d5be30 a2=0 a3=7ffd35d5be1c items=0 ppid=1412 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.432000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Oct 2 19:13:49.436000 audit[1449]: NETFILTER_CFG table=nat:8 family=2 entries=1 op=nft_register_rule pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:49.436000 audit[1449]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fffb909d380 a2=0 a3=7fffb909d36c items=0 ppid=1412 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.436000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Oct 2 19:13:49.437902 kubelet[1412]: E1002 19:13:49.437874 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:49.438512 kubelet[1412]: I1002 19:13:49.438496 1412 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.100" Oct 2 19:13:49.440723 kubelet[1412]: E1002 19:13:49.440686 1412 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.100" Oct 2 19:13:49.440918 kubelet[1412]: E1002 19:13:49.440844 1412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100.178a603e118cfe6c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.100", UID:"10.0.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.100 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 357104748, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 438458213, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.100.178a603e118cfe6c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:13:49.440000 audit[1452]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1452 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:49.440000 audit[1452]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffd24ab39d0 a2=0 a3=7ffd24ab39bc items=0 ppid=1412 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.440000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Oct 2 19:13:49.441887 kubelet[1412]: E1002 19:13:49.441832 1412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100.178a603e118d169b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.100", UID:"10.0.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.100 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 357110939, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 438464736, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.100.178a603e118d169b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:13:49.441000 audit[1453]: NETFILTER_CFG table=nat:10 family=2 entries=1 op=nft_register_chain pid=1453 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:49.441000 audit[1453]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffedc78dd90 a2=0 a3=7ffedc78dd7c items=0 ppid=1412 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.441000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Oct 2 19:13:49.442649 kubelet[1412]: E1002 19:13:49.442577 1412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100.178a603e118d2353", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.100", UID:"10.0.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.100 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 357114195, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 438468423, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.100.178a603e118d2353" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:13:49.442000 audit[1454]: NETFILTER_CFG table=nat:11 family=2 entries=1 op=nft_register_chain pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:49.442000 audit[1454]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5f798ac0 a2=0 a3=7fff5f798aac items=0 ppid=1412 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.442000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:13:49.444000 audit[1456]: NETFILTER_CFG table=nat:12 family=2 entries=1 op=nft_register_rule pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:49.444000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe8f199550 a2=0 a3=7ffe8f19953c items=0 ppid=1412 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.444000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Oct 2 19:13:49.445000 audit[1458]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:49.445000 audit[1458]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdf323c940 a2=0 a3=7ffdf323c92c items=0 ppid=1412 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.445000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:13:49.466000 audit[1461]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:49.466000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffec8cdc020 a2=0 a3=7ffec8cdc00c items=0 ppid=1412 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.466000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Oct 2 19:13:49.468000 audit[1463]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_rule pid=1463 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:49.468000 audit[1463]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffcb29fb210 a2=0 a3=7ffcb29fb1fc items=0 ppid=1412 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.468000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Oct 2 19:13:49.474000 audit[1466]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_rule pid=1466 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:49.474000 audit[1466]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7ffd01fc41e0 a2=0 a3=7ffd01fc41cc items=0 ppid=1412 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.474000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Oct 2 19:13:49.475813 kubelet[1412]: I1002 19:13:49.475787 1412 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 19:13:49.475000 audit[1467]: NETFILTER_CFG table=mangle:17 family=10 entries=2 op=nft_register_chain pid=1467 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:13:49.475000 audit[1467]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffebdf99f10 a2=0 a3=7ffebdf99efc items=0 ppid=1412 pid=1467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.475000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:13:49.476000 audit[1468]: NETFILTER_CFG table=mangle:18 family=2 entries=1 op=nft_register_chain pid=1468 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:49.476000 audit[1468]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff8a2e8910 a2=0 a3=7fff8a2e88fc items=0 ppid=1412 pid=1468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.476000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:13:49.476000 audit[1469]: NETFILTER_CFG table=nat:19 family=10 entries=2 op=nft_register_chain pid=1469 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:13:49.476000 audit[1469]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fffdf230500 a2=0 a3=7fffdf2304ec items=0 ppid=1412 pid=1469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.476000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Oct 2 19:13:49.477000 audit[1470]: NETFILTER_CFG table=nat:20 family=2 entries=1 op=nft_register_chain pid=1470 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:49.477000 audit[1470]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe22078c60 a2=0 a3=7ffe22078c4c items=0 ppid=1412 pid=1470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.477000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:13:49.477000 audit[1472]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_chain pid=1472 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:49.477000 audit[1472]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc18f34fe0 a2=0 a3=7ffc18f34fcc items=0 ppid=1412 pid=1472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.477000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:13:49.478000 audit[1473]: NETFILTER_CFG table=nat:22 family=10 entries=1 op=nft_register_rule pid=1473 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:13:49.478000 audit[1473]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe2430efc0 a2=0 a3=7ffe2430efac items=0 ppid=1412 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.478000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Oct 2 19:13:49.479000 audit[1474]: NETFILTER_CFG table=filter:23 family=10 entries=2 op=nft_register_chain pid=1474 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:13:49.479000 audit[1474]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffd45096c10 a2=0 a3=7ffd45096bfc items=0 ppid=1412 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.479000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:13:49.480000 audit[1476]: NETFILTER_CFG table=filter:24 family=10 entries=1 op=nft_register_rule pid=1476 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:13:49.480000 audit[1476]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffc9e0eac40 a2=0 a3=7ffc9e0eac2c items=0 ppid=1412 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.480000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Oct 2 19:13:49.481000 audit[1477]: NETFILTER_CFG table=nat:25 family=10 entries=1 op=nft_register_chain pid=1477 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:13:49.481000 audit[1477]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff9a1ba650 a2=0 a3=7fff9a1ba63c items=0 ppid=1412 pid=1477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.481000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Oct 2 19:13:49.482000 audit[1478]: NETFILTER_CFG table=nat:26 family=10 entries=1 op=nft_register_chain pid=1478 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:13:49.482000 audit[1478]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc48ebb60 a2=0 a3=7ffdc48ebb4c items=0 ppid=1412 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.482000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:13:49.484000 audit[1480]: NETFILTER_CFG table=nat:27 family=10 entries=1 op=nft_register_rule pid=1480 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:13:49.484000 audit[1480]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fffae670d40 a2=0 a3=7fffae670d2c items=0 ppid=1412 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.484000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Oct 2 19:13:49.485000 audit[1482]: NETFILTER_CFG table=nat:28 family=10 entries=2 op=nft_register_chain pid=1482 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:13:49.485000 audit[1482]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcf9473040 a2=0 a3=7ffcf947302c items=0 ppid=1412 pid=1482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.485000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:13:49.487000 audit[1484]: NETFILTER_CFG table=nat:29 family=10 entries=1 op=nft_register_rule pid=1484 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:13:49.487000 audit[1484]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffc6d80a3d0 a2=0 a3=7ffc6d80a3bc items=0 ppid=1412 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.487000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Oct 2 19:13:49.489000 audit[1486]: NETFILTER_CFG table=nat:30 family=10 entries=1 op=nft_register_rule pid=1486 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:13:49.489000 audit[1486]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffeb66efae0 a2=0 a3=7ffeb66efacc items=0 ppid=1412 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.489000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Oct 2 19:13:49.492000 audit[1488]: NETFILTER_CFG table=nat:31 family=10 entries=1 op=nft_register_rule pid=1488 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:13:49.492000 audit[1488]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffc080bea20 a2=0 a3=7ffc080bea0c items=0 ppid=1412 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.492000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Oct 2 19:13:49.493440 kubelet[1412]: I1002 19:13:49.493394 1412 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 19:13:49.493440 kubelet[1412]: I1002 19:13:49.493415 1412 status_manager.go:161] "Starting to sync pod status with apiserver" Oct 2 19:13:49.493440 kubelet[1412]: I1002 19:13:49.493431 1412 kubelet.go:2010] "Starting kubelet main sync loop" Oct 2 19:13:49.493554 kubelet[1412]: E1002 19:13:49.493488 1412 kubelet.go:2034] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Oct 2 19:13:49.493000 audit[1489]: NETFILTER_CFG table=mangle:32 family=10 entries=1 op=nft_register_chain pid=1489 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:13:49.493000 audit[1489]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff1995bea0 a2=0 a3=7fff1995be8c items=0 ppid=1412 pid=1489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.493000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:13:49.494000 audit[1490]: NETFILTER_CFG table=nat:33 family=10 entries=1 op=nft_register_chain pid=1490 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:13:49.494000 audit[1490]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd9905500 a2=0 a3=7ffcd99054ec items=0 ppid=1412 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.494000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:13:49.495207 kubelet[1412]: W1002 19:13:49.495089 1412 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 19:13:49.495207 kubelet[1412]: E1002 19:13:49.495114 1412 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 19:13:49.495000 audit[1491]: NETFILTER_CFG table=filter:34 family=10 entries=1 op=nft_register_chain pid=1491 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:13:49.495000 audit[1491]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd93cdb510 a2=0 a3=7ffd93cdb4fc items=0 ppid=1412 pid=1491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:49.495000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:13:49.538186 kubelet[1412]: E1002 19:13:49.538124 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:49.547684 kubelet[1412]: E1002 19:13:49.547644 1412 controller.go:144] failed to ensure lease exists, will retry in 400ms, error: leases.coordination.k8s.io "10.0.0.100" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Oct 2 19:13:49.639269 kubelet[1412]: E1002 19:13:49.639138 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:49.641950 kubelet[1412]: I1002 19:13:49.641922 1412 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.100" Oct 2 19:13:49.643222 kubelet[1412]: E1002 19:13:49.643134 1412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100.178a603e118cfe6c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.100", UID:"10.0.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.100 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 357104748, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 641884844, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.100.178a603e118cfe6c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:13:49.643347 kubelet[1412]: E1002 19:13:49.643323 1412 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.100" Oct 2 19:13:49.644157 kubelet[1412]: E1002 19:13:49.644115 1412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100.178a603e118d169b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.100", UID:"10.0.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.100 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 357110939, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 641898319, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.100.178a603e118d169b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:13:49.738031 kubelet[1412]: E1002 19:13:49.737910 1412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100.178a603e118d2353", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.100", UID:"10.0.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.100 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 357114195, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 641901505, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.100.178a603e118d2353" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:13:49.740080 kubelet[1412]: E1002 19:13:49.740050 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:49.841001 kubelet[1412]: E1002 19:13:49.840942 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:49.941554 kubelet[1412]: E1002 19:13:49.941429 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:49.949792 kubelet[1412]: E1002 19:13:49.949769 1412 controller.go:144] failed to ensure lease exists, will retry in 800ms, error: leases.coordination.k8s.io "10.0.0.100" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Oct 2 19:13:50.042462 kubelet[1412]: E1002 19:13:50.042267 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:50.044214 kubelet[1412]: I1002 19:13:50.044202 1412 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.100" Oct 2 19:13:50.045404 kubelet[1412]: E1002 19:13:50.045381 1412 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.100" Oct 2 19:13:50.045458 kubelet[1412]: E1002 19:13:50.045365 1412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100.178a603e118cfe6c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.100", UID:"10.0.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.100 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 357104748, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 13, 50, 44164796, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.100.178a603e118cfe6c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:13:50.138050 kubelet[1412]: E1002 19:13:50.137928 1412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100.178a603e118d169b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.100", UID:"10.0.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.100 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 357110939, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 13, 50, 44177941, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.100.178a603e118d169b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:13:50.143109 kubelet[1412]: E1002 19:13:50.143084 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:50.243660 kubelet[1412]: E1002 19:13:50.243523 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:50.335232 kubelet[1412]: E1002 19:13:50.335164 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:13:50.338522 kubelet[1412]: E1002 19:13:50.338409 1412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100.178a603e118d2353", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.100", UID:"10.0.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.100 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 357114195, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 13, 50, 44180485, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.100.178a603e118d2353" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:13:50.342860 kubelet[1412]: W1002 19:13:50.342835 1412 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 19:13:50.342931 kubelet[1412]: E1002 19:13:50.342869 1412 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 19:13:50.343865 kubelet[1412]: E1002 19:13:50.343816 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:50.444717 kubelet[1412]: E1002 19:13:50.444629 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:50.447033 kubelet[1412]: W1002 19:13:50.447009 1412 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:13:50.447033 kubelet[1412]: E1002 19:13:50.447035 1412 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:13:50.545599 kubelet[1412]: E1002 19:13:50.545455 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:50.623126 kubelet[1412]: W1002 19:13:50.623067 1412 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Node: nodes "10.0.0.100" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:13:50.623126 kubelet[1412]: E1002 19:13:50.623104 1412 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.100" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:13:50.646492 kubelet[1412]: E1002 19:13:50.646431 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:50.693021 kubelet[1412]: W1002 19:13:50.692960 1412 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 19:13:50.693021 kubelet[1412]: E1002 19:13:50.693005 1412 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 19:13:50.747476 kubelet[1412]: E1002 19:13:50.747421 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:50.751665 kubelet[1412]: E1002 19:13:50.751636 1412 controller.go:144] failed to ensure lease exists, will retry in 1.6s, error: leases.coordination.k8s.io "10.0.0.100" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Oct 2 19:13:50.847537 kubelet[1412]: I1002 19:13:50.847418 1412 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.100" Oct 2 19:13:50.847537 kubelet[1412]: E1002 19:13:50.847488 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:50.848648 kubelet[1412]: E1002 19:13:50.848626 1412 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.100" Oct 2 19:13:50.849544 kubelet[1412]: E1002 19:13:50.849443 1412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100.178a603e118cfe6c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.100", UID:"10.0.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.100 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 357104748, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 13, 50, 847367725, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.100.178a603e118cfe6c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:13:50.850479 kubelet[1412]: E1002 19:13:50.850421 1412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100.178a603e118d169b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.100", UID:"10.0.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.100 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 357110939, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 13, 50, 847384667, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.100.178a603e118d169b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:13:50.938051 kubelet[1412]: E1002 19:13:50.937937 1412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100.178a603e118d2353", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.100", UID:"10.0.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.100 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 357114195, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 13, 50, 847387552, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.100.178a603e118d2353" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:13:50.948102 kubelet[1412]: E1002 19:13:50.948068 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:51.048609 kubelet[1412]: E1002 19:13:51.048555 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:51.149171 kubelet[1412]: E1002 19:13:51.149042 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:51.249565 kubelet[1412]: E1002 19:13:51.249496 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:51.336128 kubelet[1412]: E1002 19:13:51.336058 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:13:51.350060 kubelet[1412]: E1002 19:13:51.350014 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:51.450736 kubelet[1412]: E1002 19:13:51.450610 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:51.551024 kubelet[1412]: E1002 19:13:51.550984 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:51.657334 kubelet[1412]: E1002 19:13:51.657299 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:51.757866 kubelet[1412]: E1002 19:13:51.757743 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:51.858539 kubelet[1412]: E1002 19:13:51.858470 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:51.958981 kubelet[1412]: E1002 19:13:51.958924 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:52.059485 kubelet[1412]: E1002 19:13:52.059339 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:52.159834 kubelet[1412]: E1002 19:13:52.159774 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:52.260397 kubelet[1412]: E1002 19:13:52.260324 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:52.336989 kubelet[1412]: E1002 19:13:52.336812 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:13:52.352877 kubelet[1412]: E1002 19:13:52.352827 1412 controller.go:144] failed to ensure lease exists, will retry in 3.2s, error: leases.coordination.k8s.io "10.0.0.100" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Oct 2 19:13:52.361082 kubelet[1412]: E1002 19:13:52.361012 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:52.441485 kubelet[1412]: W1002 19:13:52.441449 1412 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Node: nodes "10.0.0.100" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:13:52.441485 kubelet[1412]: E1002 19:13:52.441480 1412 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.100" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:13:52.450094 kubelet[1412]: I1002 19:13:52.450077 1412 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.100" Oct 2 19:13:52.451080 kubelet[1412]: E1002 19:13:52.450998 1412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100.178a603e118cfe6c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.100", UID:"10.0.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.100 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 357104748, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 13, 52, 450043336, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.100.178a603e118cfe6c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:13:52.451080 kubelet[1412]: E1002 19:13:52.451066 1412 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.100" Oct 2 19:13:52.451788 kubelet[1412]: E1002 19:13:52.451725 1412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100.178a603e118d169b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.100", UID:"10.0.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.100 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 357110939, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 13, 52, 450051782, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.100.178a603e118d169b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:13:52.452479 kubelet[1412]: E1002 19:13:52.452427 1412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100.178a603e118d2353", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.100", UID:"10.0.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.100 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 357114195, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 13, 52, 450054357, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.100.178a603e118d2353" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:13:52.461619 kubelet[1412]: E1002 19:13:52.461576 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:52.562763 kubelet[1412]: E1002 19:13:52.562611 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:52.593478 kubelet[1412]: W1002 19:13:52.593317 1412 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 19:13:52.593478 kubelet[1412]: E1002 19:13:52.593362 1412 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 19:13:52.662853 kubelet[1412]: E1002 19:13:52.662753 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:52.763124 kubelet[1412]: E1002 19:13:52.763078 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:52.863668 kubelet[1412]: E1002 19:13:52.863584 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:52.964018 kubelet[1412]: E1002 19:13:52.963979 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:53.064383 kubelet[1412]: E1002 19:13:53.064349 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:53.164805 kubelet[1412]: E1002 19:13:53.164733 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:53.265132 kubelet[1412]: E1002 19:13:53.265092 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:53.337547 kubelet[1412]: E1002 19:13:53.337516 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:13:53.366041 kubelet[1412]: E1002 19:13:53.366003 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:53.457809 kubelet[1412]: W1002 19:13:53.457712 1412 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:13:53.457809 kubelet[1412]: E1002 19:13:53.457741 1412 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:13:53.466784 kubelet[1412]: E1002 19:13:53.466755 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:53.567141 kubelet[1412]: E1002 19:13:53.567089 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:53.584718 kubelet[1412]: W1002 19:13:53.584668 1412 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 19:13:53.584831 kubelet[1412]: E1002 19:13:53.584722 1412 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Oct 2 19:13:53.668060 kubelet[1412]: E1002 19:13:53.667998 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:53.768687 kubelet[1412]: E1002 19:13:53.768550 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:53.869117 kubelet[1412]: E1002 19:13:53.869067 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:53.969714 kubelet[1412]: E1002 19:13:53.969645 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:54.070170 kubelet[1412]: E1002 19:13:54.070023 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:54.170822 kubelet[1412]: E1002 19:13:54.170756 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:54.271245 kubelet[1412]: E1002 19:13:54.271190 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:54.337729 kubelet[1412]: E1002 19:13:54.337584 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:13:54.372151 kubelet[1412]: E1002 19:13:54.372121 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:54.412917 kubelet[1412]: E1002 19:13:54.412882 1412 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:13:54.472591 kubelet[1412]: E1002 19:13:54.472535 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:54.573253 kubelet[1412]: E1002 19:13:54.573213 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:54.673868 kubelet[1412]: E1002 19:13:54.673715 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:54.774305 kubelet[1412]: E1002 19:13:54.774248 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:54.875031 kubelet[1412]: E1002 19:13:54.874949 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:54.975667 kubelet[1412]: E1002 19:13:54.975477 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:55.075992 kubelet[1412]: E1002 19:13:55.075917 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:55.176607 kubelet[1412]: E1002 19:13:55.176540 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:55.277108 kubelet[1412]: E1002 19:13:55.276970 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:55.338615 kubelet[1412]: E1002 19:13:55.338547 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:13:55.377134 kubelet[1412]: E1002 19:13:55.377071 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:55.477871 kubelet[1412]: E1002 19:13:55.477821 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:55.554813 kubelet[1412]: E1002 19:13:55.554662 1412 controller.go:144] failed to ensure lease exists, will retry in 6.4s, error: leases.coordination.k8s.io "10.0.0.100" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Oct 2 19:13:55.578965 kubelet[1412]: E1002 19:13:55.578887 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:55.651837 kubelet[1412]: I1002 19:13:55.651798 1412 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.100" Oct 2 19:13:55.653077 kubelet[1412]: E1002 19:13:55.652998 1412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100.178a603e118cfe6c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.100", UID:"10.0.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.100 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 357104748, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 13, 55, 651755603, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.100.178a603e118cfe6c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:13:55.653204 kubelet[1412]: E1002 19:13:55.653077 1412 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.100" Oct 2 19:13:55.653926 kubelet[1412]: E1002 19:13:55.653869 1412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100.178a603e118d169b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.100", UID:"10.0.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.100 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 357110939, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 13, 55, 651761795, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.100.178a603e118d169b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:13:55.654654 kubelet[1412]: E1002 19:13:55.654598 1412 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100.178a603e118d2353", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.100", UID:"10.0.0.100", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.100 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.100"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 13, 49, 357114195, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 13, 55, 651764450, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.100.178a603e118d2353" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Oct 2 19:13:55.679868 kubelet[1412]: E1002 19:13:55.679798 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:55.780313 kubelet[1412]: E1002 19:13:55.780253 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:55.880974 kubelet[1412]: E1002 19:13:55.880842 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:55.981426 kubelet[1412]: E1002 19:13:55.981368 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:56.082487 kubelet[1412]: E1002 19:13:56.082425 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:56.183133 kubelet[1412]: E1002 19:13:56.182995 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:56.283795 kubelet[1412]: E1002 19:13:56.283723 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:56.339538 kubelet[1412]: E1002 19:13:56.339469 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:13:56.384259 kubelet[1412]: E1002 19:13:56.384168 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:56.484964 kubelet[1412]: E1002 19:13:56.484822 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:56.586002 kubelet[1412]: E1002 19:13:56.585943 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:56.686448 kubelet[1412]: E1002 19:13:56.686376 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:56.786896 kubelet[1412]: E1002 19:13:56.786773 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:56.887627 kubelet[1412]: E1002 19:13:56.887555 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:56.988066 kubelet[1412]: E1002 19:13:56.987996 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:57.088632 kubelet[1412]: E1002 19:13:57.088486 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:57.154255 kubelet[1412]: W1002 19:13:57.154196 1412 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 19:13:57.154255 kubelet[1412]: E1002 19:13:57.154235 1412 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Oct 2 19:13:57.189496 kubelet[1412]: E1002 19:13:57.189422 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:57.224264 kubelet[1412]: W1002 19:13:57.224157 1412 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:13:57.224264 kubelet[1412]: E1002 19:13:57.224239 1412 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Oct 2 19:13:57.290501 kubelet[1412]: E1002 19:13:57.290412 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:57.340081 kubelet[1412]: E1002 19:13:57.339936 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:13:57.391606 kubelet[1412]: E1002 19:13:57.391545 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:57.492392 kubelet[1412]: E1002 19:13:57.492317 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:57.593052 kubelet[1412]: E1002 19:13:57.592917 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:57.693593 kubelet[1412]: E1002 19:13:57.693533 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:57.794075 kubelet[1412]: E1002 19:13:57.794016 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:57.894683 kubelet[1412]: E1002 19:13:57.894556 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:57.995035 kubelet[1412]: E1002 19:13:57.994971 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:58.095483 kubelet[1412]: E1002 19:13:58.095419 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:58.195986 kubelet[1412]: E1002 19:13:58.195844 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:58.296483 kubelet[1412]: E1002 19:13:58.296414 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:58.341116 kubelet[1412]: E1002 19:13:58.341049 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:13:58.396610 kubelet[1412]: E1002 19:13:58.396515 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:58.497775 kubelet[1412]: E1002 19:13:58.497557 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:58.597811 kubelet[1412]: E1002 19:13:58.597732 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:58.698308 kubelet[1412]: E1002 19:13:58.698262 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:58.798788 kubelet[1412]: E1002 19:13:58.798657 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:58.808028 kubelet[1412]: W1002 19:13:58.807986 1412 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Node: nodes "10.0.0.100" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:13:58.808101 kubelet[1412]: E1002 19:13:58.808043 1412 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.100" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Oct 2 19:13:58.899560 kubelet[1412]: E1002 19:13:58.899505 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:59.000024 kubelet[1412]: E1002 19:13:58.999966 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:59.100931 kubelet[1412]: E1002 19:13:59.100757 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:59.201477 kubelet[1412]: E1002 19:13:59.201391 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:59.302172 kubelet[1412]: E1002 19:13:59.302094 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:59.323311 kubelet[1412]: I1002 19:13:59.323256 1412 transport.go:135] "Certificate rotation detected, shutting down client connections to start using new credentials" Oct 2 19:13:59.341997 kubelet[1412]: E1002 19:13:59.341953 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:13:59.402806 kubelet[1412]: E1002 19:13:59.402673 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:59.412979 kubelet[1412]: E1002 19:13:59.412958 1412 eviction_manager.go:256] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.100\" not found" Oct 2 19:13:59.413299 kubelet[1412]: E1002 19:13:59.413277 1412 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:13:59.503712 kubelet[1412]: E1002 19:13:59.503660 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:59.604790 kubelet[1412]: E1002 19:13:59.604670 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:59.691953 kubelet[1412]: E1002 19:13:59.691813 1412 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.0.0.100" not found Oct 2 19:13:59.705139 kubelet[1412]: E1002 19:13:59.705070 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:59.805549 kubelet[1412]: E1002 19:13:59.805488 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:13:59.906258 kubelet[1412]: E1002 19:13:59.906191 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:00.006536 kubelet[1412]: E1002 19:14:00.006390 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:00.106833 kubelet[1412]: E1002 19:14:00.106779 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:00.207132 kubelet[1412]: E1002 19:14:00.207078 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:00.307726 kubelet[1412]: E1002 19:14:00.307586 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:00.342430 kubelet[1412]: E1002 19:14:00.342365 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:00.408320 kubelet[1412]: E1002 19:14:00.408267 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:00.509051 kubelet[1412]: E1002 19:14:00.509018 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:00.610050 kubelet[1412]: E1002 19:14:00.609930 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:00.710641 kubelet[1412]: E1002 19:14:00.710577 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:00.811607 kubelet[1412]: E1002 19:14:00.811547 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:00.911990 kubelet[1412]: E1002 19:14:00.911832 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:00.948895 kubelet[1412]: E1002 19:14:00.948858 1412 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.0.0.100" not found Oct 2 19:14:01.012173 kubelet[1412]: E1002 19:14:01.012123 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:01.113024 kubelet[1412]: E1002 19:14:01.112970 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:01.213496 kubelet[1412]: E1002 19:14:01.213351 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:01.313828 kubelet[1412]: E1002 19:14:01.313778 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:01.343218 kubelet[1412]: E1002 19:14:01.343159 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:01.414755 kubelet[1412]: E1002 19:14:01.414668 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:01.515739 kubelet[1412]: E1002 19:14:01.515612 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:01.616067 kubelet[1412]: E1002 19:14:01.615929 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:01.716685 kubelet[1412]: E1002 19:14:01.716577 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:01.817488 kubelet[1412]: E1002 19:14:01.817331 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:01.917985 kubelet[1412]: E1002 19:14:01.917921 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:01.958876 kubelet[1412]: E1002 19:14:01.958830 1412 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.100\" not found" node="10.0.0.100" Oct 2 19:14:02.019107 kubelet[1412]: E1002 19:14:02.019043 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:02.054119 kubelet[1412]: I1002 19:14:02.054086 1412 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.100" Oct 2 19:14:02.119607 kubelet[1412]: E1002 19:14:02.119468 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:02.220605 kubelet[1412]: E1002 19:14:02.220547 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:02.321115 kubelet[1412]: E1002 19:14:02.321062 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:02.343843 kubelet[1412]: E1002 19:14:02.343793 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:02.351752 kubelet[1412]: I1002 19:14:02.351726 1412 kubelet_node_status.go:73] "Successfully registered node" node="10.0.0.100" Oct 2 19:14:02.421603 kubelet[1412]: E1002 19:14:02.421473 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:02.521595 kubelet[1412]: E1002 19:14:02.521558 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:02.602000 audit[1232]: USER_END pid=1232 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:14:02.603618 sudo[1232]: pam_unix(sudo:session): session closed for user root Oct 2 19:14:02.605293 sshd[1229]: pam_unix(sshd:session): session closed for user core Oct 2 19:14:02.606976 kernel: kauditd_printk_skb: 474 callbacks suppressed Oct 2 19:14:02.607111 kernel: audit: type=1106 audit(1696274042.602:568): pid=1232 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:14:02.607151 kernel: audit: type=1104 audit(1696274042.602:569): pid=1232 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:14:02.602000 audit[1232]: CRED_DISP pid=1232 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:14:02.609196 systemd[1]: sshd@6-10.0.0.100:22-10.0.0.1:49142.service: Deactivated successfully. Oct 2 19:14:02.609561 kernel: audit: type=1106 audit(1696274042.606:570): pid=1229 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:14:02.606000 audit[1229]: USER_END pid=1229 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:14:02.610204 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 19:14:02.610928 systemd-logind[1094]: Session 7 logged out. Waiting for processes to exit. Oct 2 19:14:02.611974 systemd-logind[1094]: Removed session 7. Oct 2 19:14:02.606000 audit[1229]: CRED_DISP pid=1229 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:14:02.615107 kernel: audit: type=1104 audit(1696274042.606:571): pid=1229 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:14:02.615177 kernel: audit: type=1131 audit(1696274042.608:572): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.100:22-10.0.0.1:49142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:02.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.100:22-10.0.0.1:49142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:02.622444 kubelet[1412]: E1002 19:14:02.622406 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:02.723308 kubelet[1412]: E1002 19:14:02.723129 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:02.823794 kubelet[1412]: E1002 19:14:02.823745 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:02.924364 kubelet[1412]: E1002 19:14:02.924318 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:03.025390 kubelet[1412]: E1002 19:14:03.025251 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:03.125915 kubelet[1412]: E1002 19:14:03.125848 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:03.226503 kubelet[1412]: E1002 19:14:03.226443 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:03.327269 kubelet[1412]: E1002 19:14:03.327132 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:03.344605 kubelet[1412]: E1002 19:14:03.344568 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:03.427739 kubelet[1412]: E1002 19:14:03.427659 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:03.528326 kubelet[1412]: E1002 19:14:03.528283 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:03.629002 kubelet[1412]: E1002 19:14:03.628842 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:03.729515 kubelet[1412]: E1002 19:14:03.729450 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:03.830415 kubelet[1412]: E1002 19:14:03.830332 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:03.931257 kubelet[1412]: E1002 19:14:03.931100 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:04.031912 kubelet[1412]: E1002 19:14:04.031837 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:04.132684 kubelet[1412]: E1002 19:14:04.132619 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:04.233227 kubelet[1412]: E1002 19:14:04.233082 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:04.333855 kubelet[1412]: E1002 19:14:04.333807 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:04.345344 kubelet[1412]: E1002 19:14:04.345298 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:04.413921 kubelet[1412]: E1002 19:14:04.413880 1412 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:14:04.434645 kubelet[1412]: E1002 19:14:04.434587 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:04.535258 kubelet[1412]: E1002 19:14:04.535122 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:04.635664 kubelet[1412]: E1002 19:14:04.635617 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:04.736140 kubelet[1412]: E1002 19:14:04.736058 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:04.837208 kubelet[1412]: E1002 19:14:04.837062 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:04.937556 kubelet[1412]: E1002 19:14:04.937504 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:05.038518 kubelet[1412]: E1002 19:14:05.038455 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:05.139018 kubelet[1412]: E1002 19:14:05.138876 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:05.239338 kubelet[1412]: E1002 19:14:05.239281 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:05.339865 kubelet[1412]: E1002 19:14:05.339802 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:05.346114 kubelet[1412]: E1002 19:14:05.346084 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:05.440721 kubelet[1412]: E1002 19:14:05.440597 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:05.540893 kubelet[1412]: E1002 19:14:05.540863 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:05.641368 kubelet[1412]: E1002 19:14:05.641316 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:05.742031 kubelet[1412]: E1002 19:14:05.741903 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:05.842840 kubelet[1412]: E1002 19:14:05.842773 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:05.943255 kubelet[1412]: E1002 19:14:05.943193 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:06.043758 kubelet[1412]: E1002 19:14:06.043618 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:06.144411 kubelet[1412]: E1002 19:14:06.144326 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:06.244900 kubelet[1412]: E1002 19:14:06.244838 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:06.346351 kubelet[1412]: E1002 19:14:06.345597 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:06.346589 kubelet[1412]: E1002 19:14:06.346506 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:06.446614 kubelet[1412]: E1002 19:14:06.446543 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:06.547106 kubelet[1412]: E1002 19:14:06.547046 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:06.647664 kubelet[1412]: E1002 19:14:06.647533 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:06.747983 kubelet[1412]: E1002 19:14:06.747917 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:06.848707 kubelet[1412]: E1002 19:14:06.848631 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:06.949274 kubelet[1412]: E1002 19:14:06.949137 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:07.049829 kubelet[1412]: E1002 19:14:07.049753 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:07.150397 kubelet[1412]: E1002 19:14:07.150321 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:07.251129 kubelet[1412]: E1002 19:14:07.250968 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:07.346706 kubelet[1412]: E1002 19:14:07.346620 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:07.351767 kubelet[1412]: E1002 19:14:07.351735 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:07.452432 kubelet[1412]: E1002 19:14:07.452349 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:07.553008 kubelet[1412]: E1002 19:14:07.552867 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:07.653422 kubelet[1412]: E1002 19:14:07.653368 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:07.753964 kubelet[1412]: E1002 19:14:07.753912 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:07.854457 kubelet[1412]: E1002 19:14:07.854273 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:07.954849 kubelet[1412]: E1002 19:14:07.954784 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:08.055290 kubelet[1412]: E1002 19:14:08.055235 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:08.155953 kubelet[1412]: E1002 19:14:08.155812 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:08.256364 kubelet[1412]: E1002 19:14:08.256304 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:08.347181 kubelet[1412]: E1002 19:14:08.347117 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:08.356670 kubelet[1412]: E1002 19:14:08.356611 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:08.457499 kubelet[1412]: E1002 19:14:08.457337 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:08.558297 kubelet[1412]: E1002 19:14:08.558238 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:08.659093 kubelet[1412]: E1002 19:14:08.659025 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:08.759843 kubelet[1412]: E1002 19:14:08.759669 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:08.860328 kubelet[1412]: E1002 19:14:08.860260 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:08.961010 kubelet[1412]: E1002 19:14:08.960927 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:09.061530 kubelet[1412]: E1002 19:14:09.061397 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:09.162374 kubelet[1412]: E1002 19:14:09.162307 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:09.262936 kubelet[1412]: E1002 19:14:09.262868 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:09.335584 kubelet[1412]: E1002 19:14:09.335457 1412 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:09.347892 kubelet[1412]: E1002 19:14:09.347856 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:09.363069 kubelet[1412]: E1002 19:14:09.363023 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:09.414301 kubelet[1412]: E1002 19:14:09.414251 1412 eviction_manager.go:256] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.100\" not found" Oct 2 19:14:09.414742 kubelet[1412]: E1002 19:14:09.414721 1412 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:14:09.463297 kubelet[1412]: E1002 19:14:09.463235 1412 kubelet.go:2448] "Error getting node" err="node \"10.0.0.100\" not found" Oct 2 19:14:09.563656 kubelet[1412]: I1002 19:14:09.563609 1412 kuberuntime_manager.go:1050] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Oct 2 19:14:09.563998 env[1103]: time="2023-10-02T19:14:09.563952789Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 19:14:09.564333 kubelet[1412]: I1002 19:14:09.564119 1412 kubelet_network.go:60] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Oct 2 19:14:09.564402 kubelet[1412]: E1002 19:14:09.564387 1412 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:14:10.348136 kubelet[1412]: I1002 19:14:10.348085 1412 apiserver.go:52] "Watching apiserver" Oct 2 19:14:10.348540 kubelet[1412]: E1002 19:14:10.348147 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:10.351456 kubelet[1412]: I1002 19:14:10.351428 1412 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:14:10.351565 kubelet[1412]: I1002 19:14:10.351516 1412 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:14:10.351565 kubelet[1412]: I1002 19:14:10.351549 1412 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:14:10.356948 systemd[1]: Created slice kubepods-besteffort-podc675897f_63b8_48bd_bb35_c7161ea0e20b.slice. Oct 2 19:14:10.370483 systemd[1]: Created slice kubepods-besteffort-pod391be0e6_b57b_411c_93e6_5db9eda95b0f.slice. Oct 2 19:14:10.381770 systemd[1]: Created slice kubepods-besteffort-pod911b20c1_da42_4b51_ae3f_cc2431f42771.slice. Oct 2 19:14:10.467555 kubelet[1412]: I1002 19:14:10.467508 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/c675897f-63b8-48bd-bb35-c7161ea0e20b-var-lib-calico\") pod \"tigera-operator-64db64cb98-lbmkz\" (UID: \"c675897f-63b8-48bd-bb35-c7161ea0e20b\") " pod="tigera-operator/tigera-operator-64db64cb98-lbmkz" Oct 2 19:14:10.467555 kubelet[1412]: I1002 19:14:10.467545 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/391be0e6-b57b-411c-93e6-5db9eda95b0f-lib-modules\") pod \"calico-node-smjt6\" (UID: \"391be0e6-b57b-411c-93e6-5db9eda95b0f\") " pod="calico-system/calico-node-smjt6" Oct 2 19:14:10.467555 kubelet[1412]: I1002 19:14:10.467565 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/391be0e6-b57b-411c-93e6-5db9eda95b0f-node-certs\") pod \"calico-node-smjt6\" (UID: \"391be0e6-b57b-411c-93e6-5db9eda95b0f\") " pod="calico-system/calico-node-smjt6" Oct 2 19:14:10.467788 kubelet[1412]: I1002 19:14:10.467582 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/391be0e6-b57b-411c-93e6-5db9eda95b0f-cni-bin-dir\") pod \"calico-node-smjt6\" (UID: \"391be0e6-b57b-411c-93e6-5db9eda95b0f\") " pod="calico-system/calico-node-smjt6" Oct 2 19:14:10.467788 kubelet[1412]: I1002 19:14:10.467655 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/911b20c1-da42-4b51-ae3f-cc2431f42771-xtables-lock\") pod \"kube-proxy-59t94\" (UID: \"911b20c1-da42-4b51-ae3f-cc2431f42771\") " pod="kube-system/kube-proxy-59t94" Oct 2 19:14:10.467788 kubelet[1412]: I1002 19:14:10.467725 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/911b20c1-da42-4b51-ae3f-cc2431f42771-lib-modules\") pod \"kube-proxy-59t94\" (UID: \"911b20c1-da42-4b51-ae3f-cc2431f42771\") " pod="kube-system/kube-proxy-59t94" Oct 2 19:14:10.467893 kubelet[1412]: I1002 19:14:10.467785 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wgqcm\" (UniqueName: \"kubernetes.io/projected/c675897f-63b8-48bd-bb35-c7161ea0e20b-kube-api-access-wgqcm\") pod \"tigera-operator-64db64cb98-lbmkz\" (UID: \"c675897f-63b8-48bd-bb35-c7161ea0e20b\") " pod="tigera-operator/tigera-operator-64db64cb98-lbmkz" Oct 2 19:14:10.467893 kubelet[1412]: I1002 19:14:10.467829 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/391be0e6-b57b-411c-93e6-5db9eda95b0f-var-run-calico\") pod \"calico-node-smjt6\" (UID: \"391be0e6-b57b-411c-93e6-5db9eda95b0f\") " pod="calico-system/calico-node-smjt6" Oct 2 19:14:10.467893 kubelet[1412]: I1002 19:14:10.467875 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/391be0e6-b57b-411c-93e6-5db9eda95b0f-cni-net-dir\") pod \"calico-node-smjt6\" (UID: \"391be0e6-b57b-411c-93e6-5db9eda95b0f\") " pod="calico-system/calico-node-smjt6" Oct 2 19:14:10.467988 kubelet[1412]: I1002 19:14:10.467894 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qpc56\" (UniqueName: \"kubernetes.io/projected/391be0e6-b57b-411c-93e6-5db9eda95b0f-kube-api-access-qpc56\") pod \"calico-node-smjt6\" (UID: \"391be0e6-b57b-411c-93e6-5db9eda95b0f\") " pod="calico-system/calico-node-smjt6" Oct 2 19:14:10.467988 kubelet[1412]: I1002 19:14:10.467920 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/391be0e6-b57b-411c-93e6-5db9eda95b0f-tigera-ca-bundle\") pod \"calico-node-smjt6\" (UID: \"391be0e6-b57b-411c-93e6-5db9eda95b0f\") " pod="calico-system/calico-node-smjt6" Oct 2 19:14:10.467988 kubelet[1412]: I1002 19:14:10.467937 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/391be0e6-b57b-411c-93e6-5db9eda95b0f-var-lib-calico\") pod \"calico-node-smjt6\" (UID: \"391be0e6-b57b-411c-93e6-5db9eda95b0f\") " pod="calico-system/calico-node-smjt6" Oct 2 19:14:10.467988 kubelet[1412]: I1002 19:14:10.467973 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/391be0e6-b57b-411c-93e6-5db9eda95b0f-cni-log-dir\") pod \"calico-node-smjt6\" (UID: \"391be0e6-b57b-411c-93e6-5db9eda95b0f\") " pod="calico-system/calico-node-smjt6" Oct 2 19:14:10.468119 kubelet[1412]: I1002 19:14:10.467995 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/391be0e6-b57b-411c-93e6-5db9eda95b0f-xtables-lock\") pod \"calico-node-smjt6\" (UID: \"391be0e6-b57b-411c-93e6-5db9eda95b0f\") " pod="calico-system/calico-node-smjt6" Oct 2 19:14:10.468119 kubelet[1412]: I1002 19:14:10.468054 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/391be0e6-b57b-411c-93e6-5db9eda95b0f-policysync\") pod \"calico-node-smjt6\" (UID: \"391be0e6-b57b-411c-93e6-5db9eda95b0f\") " pod="calico-system/calico-node-smjt6" Oct 2 19:14:10.468119 kubelet[1412]: I1002 19:14:10.468106 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/391be0e6-b57b-411c-93e6-5db9eda95b0f-flexvol-driver-host\") pod \"calico-node-smjt6\" (UID: \"391be0e6-b57b-411c-93e6-5db9eda95b0f\") " pod="calico-system/calico-node-smjt6" Oct 2 19:14:10.468212 kubelet[1412]: I1002 19:14:10.468138 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/911b20c1-da42-4b51-ae3f-cc2431f42771-kube-proxy\") pod \"kube-proxy-59t94\" (UID: \"911b20c1-da42-4b51-ae3f-cc2431f42771\") " pod="kube-system/kube-proxy-59t94" Oct 2 19:14:10.468212 kubelet[1412]: I1002 19:14:10.468167 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tsh8n\" (UniqueName: \"kubernetes.io/projected/911b20c1-da42-4b51-ae3f-cc2431f42771-kube-api-access-tsh8n\") pod \"kube-proxy-59t94\" (UID: \"911b20c1-da42-4b51-ae3f-cc2431f42771\") " pod="kube-system/kube-proxy-59t94" Oct 2 19:14:10.468212 kubelet[1412]: I1002 19:14:10.468179 1412 reconciler.go:169] "Reconciler: start to sync state" Oct 2 19:14:10.569423 kubelet[1412]: E1002 19:14:10.569384 1412 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:10.569423 kubelet[1412]: W1002 19:14:10.569416 1412 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:10.569634 kubelet[1412]: E1002 19:14:10.569453 1412 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:10.569710 kubelet[1412]: E1002 19:14:10.569673 1412 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:10.569710 kubelet[1412]: W1002 19:14:10.569706 1412 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:10.569796 kubelet[1412]: E1002 19:14:10.569728 1412 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:10.569934 kubelet[1412]: E1002 19:14:10.569905 1412 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:10.569934 kubelet[1412]: W1002 19:14:10.569918 1412 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:10.569934 kubelet[1412]: E1002 19:14:10.569935 1412 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:10.570163 kubelet[1412]: E1002 19:14:10.570148 1412 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:10.570163 kubelet[1412]: W1002 19:14:10.570162 1412 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:10.570266 kubelet[1412]: E1002 19:14:10.570179 1412 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:10.570368 kubelet[1412]: E1002 19:14:10.570356 1412 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:10.570368 kubelet[1412]: W1002 19:14:10.570368 1412 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:10.570460 kubelet[1412]: E1002 19:14:10.570390 1412 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:10.571650 kubelet[1412]: E1002 19:14:10.571634 1412 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:10.571650 kubelet[1412]: W1002 19:14:10.571648 1412 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:10.571770 kubelet[1412]: E1002 19:14:10.571662 1412 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:10.669484 kubelet[1412]: E1002 19:14:10.669366 1412 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:10.669484 kubelet[1412]: W1002 19:14:10.669389 1412 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:10.669484 kubelet[1412]: E1002 19:14:10.669410 1412 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:10.669670 kubelet[1412]: E1002 19:14:10.669609 1412 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:10.669670 kubelet[1412]: W1002 19:14:10.669620 1412 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:10.669670 kubelet[1412]: E1002 19:14:10.669635 1412 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:10.669907 kubelet[1412]: E1002 19:14:10.669881 1412 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:10.670109 kubelet[1412]: W1002 19:14:10.669933 1412 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:10.670109 kubelet[1412]: E1002 19:14:10.669945 1412 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:10.771040 kubelet[1412]: E1002 19:14:10.770997 1412 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:10.771040 kubelet[1412]: W1002 19:14:10.771023 1412 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:10.771040 kubelet[1412]: E1002 19:14:10.771040 1412 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:10.771251 kubelet[1412]: E1002 19:14:10.771218 1412 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:10.771251 kubelet[1412]: W1002 19:14:10.771227 1412 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:10.771251 kubelet[1412]: E1002 19:14:10.771239 1412 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:10.771444 kubelet[1412]: E1002 19:14:10.771430 1412 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:10.771444 kubelet[1412]: W1002 19:14:10.771441 1412 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:10.771512 kubelet[1412]: E1002 19:14:10.771454 1412 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:10.872473 kubelet[1412]: E1002 19:14:10.872434 1412 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:10.872473 kubelet[1412]: W1002 19:14:10.872458 1412 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:10.872473 kubelet[1412]: E1002 19:14:10.872478 1412 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:10.872768 kubelet[1412]: E1002 19:14:10.872684 1412 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:10.872768 kubelet[1412]: W1002 19:14:10.872714 1412 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:10.872768 kubelet[1412]: E1002 19:14:10.872731 1412 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:10.872940 kubelet[1412]: E1002 19:14:10.872917 1412 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:10.872940 kubelet[1412]: W1002 19:14:10.872929 1412 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:10.872940 kubelet[1412]: E1002 19:14:10.872941 1412 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:10.958369 kubelet[1412]: E1002 19:14:10.958259 1412 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:10.958369 kubelet[1412]: W1002 19:14:10.958281 1412 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:10.958369 kubelet[1412]: E1002 19:14:10.958300 1412 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:10.972546 kubelet[1412]: E1002 19:14:10.972521 1412 dns.go:157] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:14:10.973318 env[1103]: time="2023-10-02T19:14:10.973231202Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-smjt6,Uid:391be0e6-b57b-411c-93e6-5db9eda95b0f,Namespace:calico-system,Attempt:0,}" Oct 2 19:14:10.974118 kubelet[1412]: E1002 19:14:10.973462 1412 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:10.974118 kubelet[1412]: W1002 19:14:10.973474 1412 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:10.974118 kubelet[1412]: E1002 19:14:10.973505 1412 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:10.974118 kubelet[1412]: E1002 19:14:10.973726 1412 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:10.974118 kubelet[1412]: W1002 19:14:10.973738 1412 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:10.974118 kubelet[1412]: E1002 19:14:10.973754 1412 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:11.075186 kubelet[1412]: E1002 19:14:11.075133 1412 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:11.075186 kubelet[1412]: W1002 19:14:11.075160 1412 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:11.075186 kubelet[1412]: E1002 19:14:11.075179 1412 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:11.075618 kubelet[1412]: E1002 19:14:11.075356 1412 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:11.075618 kubelet[1412]: W1002 19:14:11.075365 1412 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:11.075618 kubelet[1412]: E1002 19:14:11.075388 1412 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:11.161474 kubelet[1412]: E1002 19:14:11.161439 1412 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:11.161474 kubelet[1412]: W1002 19:14:11.161462 1412 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:11.161474 kubelet[1412]: E1002 19:14:11.161481 1412 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:11.176937 kubelet[1412]: E1002 19:14:11.176887 1412 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:11.176937 kubelet[1412]: W1002 19:14:11.176916 1412 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:11.176937 kubelet[1412]: E1002 19:14:11.176946 1412 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:11.277808 kubelet[1412]: E1002 19:14:11.277645 1412 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:11.277808 kubelet[1412]: W1002 19:14:11.277668 1412 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:11.277808 kubelet[1412]: E1002 19:14:11.277688 1412 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:11.283778 kubelet[1412]: E1002 19:14:11.283738 1412 dns.go:157] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:14:11.284368 env[1103]: time="2023-10-02T19:14:11.284322691Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-59t94,Uid:911b20c1-da42-4b51-ae3f-cc2431f42771,Namespace:kube-system,Attempt:0,}" Oct 2 19:14:11.349106 kubelet[1412]: E1002 19:14:11.349039 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:11.359359 kubelet[1412]: E1002 19:14:11.359328 1412 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:11.359359 kubelet[1412]: W1002 19:14:11.359349 1412 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:11.359522 kubelet[1412]: E1002 19:14:11.359372 1412 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:11.570082 env[1103]: time="2023-10-02T19:14:11.569939657Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-64db64cb98-lbmkz,Uid:c675897f-63b8-48bd-bb35-c7161ea0e20b,Namespace:tigera-operator,Attempt:0,}" Oct 2 19:14:11.861965 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3865161042.mount: Deactivated successfully. Oct 2 19:14:11.876100 env[1103]: time="2023-10-02T19:14:11.876022110Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:11.879283 env[1103]: time="2023-10-02T19:14:11.879231089Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:11.880488 env[1103]: time="2023-10-02T19:14:11.880460766Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:11.881208 env[1103]: time="2023-10-02T19:14:11.881170587Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:11.881793 env[1103]: time="2023-10-02T19:14:11.881765803Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:11.884416 env[1103]: time="2023-10-02T19:14:11.884358066Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:11.885823 env[1103]: time="2023-10-02T19:14:11.885793558Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:11.887026 env[1103]: time="2023-10-02T19:14:11.886984402Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:11.890317 env[1103]: time="2023-10-02T19:14:11.890249697Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:11.892000 env[1103]: time="2023-10-02T19:14:11.891959013Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:11.893285 env[1103]: time="2023-10-02T19:14:11.893250415Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:11.894784 env[1103]: time="2023-10-02T19:14:11.894757472Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:11.906737 env[1103]: time="2023-10-02T19:14:11.906660519Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:14:11.906737 env[1103]: time="2023-10-02T19:14:11.906728917Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:14:11.906938 env[1103]: time="2023-10-02T19:14:11.906750999Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:14:11.906978 env[1103]: time="2023-10-02T19:14:11.906921649Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8b8ed27c757a448168908aa001db09716349703b093d7db42a672696c55ac57b pid=1531 runtime=io.containerd.runc.v2 Oct 2 19:14:11.920886 systemd[1]: Started cri-containerd-8b8ed27c757a448168908aa001db09716349703b093d7db42a672696c55ac57b.scope. Oct 2 19:14:11.927506 env[1103]: time="2023-10-02T19:14:11.927397105Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:14:11.928239 env[1103]: time="2023-10-02T19:14:11.927470603Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:14:11.928239 env[1103]: time="2023-10-02T19:14:11.928149576Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:14:11.928342 env[1103]: time="2023-10-02T19:14:11.928314706Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a4699aca3ac7e112a95bbba1c046f44f3b036503bf9016a857478e360e775b09 pid=1562 runtime=io.containerd.runc.v2 Oct 2 19:14:11.931729 env[1103]: time="2023-10-02T19:14:11.931535828Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:14:11.931729 env[1103]: time="2023-10-02T19:14:11.931583227Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:14:11.931729 env[1103]: time="2023-10-02T19:14:11.931597794Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:14:11.932071 env[1103]: time="2023-10-02T19:14:11.932004848Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/44fb18dea99806f1257dc230bb53772c03691a47dc4365432e700aef1b0d45c7 pid=1584 runtime=io.containerd.runc.v2 Oct 2 19:14:11.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.940506 kernel: audit: type=1400 audit(1696274051.935:573): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.940571 kernel: audit: type=1400 audit(1696274051.935:574): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.940596 kernel: audit: type=1400 audit(1696274051.935:575): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.944875 kernel: audit: type=1400 audit(1696274051.935:576): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.944939 kernel: audit: type=1400 audit(1696274051.935:577): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.944940 systemd[1]: Started cri-containerd-a4699aca3ac7e112a95bbba1c046f44f3b036503bf9016a857478e360e775b09.scope. Oct 2 19:14:11.949544 kernel: audit: type=1400 audit(1696274051.935:578): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.953577 kernel: audit: type=1400 audit(1696274051.935:579): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.953705 kernel: audit: type=1400 audit(1696274051.935:580): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.958122 kernel: audit: type=1400 audit(1696274051.935:581): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.958173 kernel: audit: type=1400 audit(1696274051.940:582): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.957267 systemd[1]: Started cri-containerd-44fb18dea99806f1257dc230bb53772c03691a47dc4365432e700aef1b0d45c7.scope. Oct 2 19:14:11.940000 audit: BPF prog-id=64 op=LOAD Oct 2 19:14:11.940000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.940000 audit[1542]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000151c48 a2=10 a3=1c items=0 ppid=1531 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:11.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862386564323763373537613434383136383930386161303031646230 Oct 2 19:14:11.940000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.940000 audit[1542]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001516b0 a2=3c a3=c items=0 ppid=1531 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:11.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862386564323763373537613434383136383930386161303031646230 Oct 2 19:14:11.940000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.940000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.940000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.940000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.940000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.940000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.940000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.940000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.940000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.940000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.940000 audit: BPF prog-id=65 op=LOAD Oct 2 19:14:11.940000 audit[1542]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001519d8 a2=78 a3=c000388340 items=0 ppid=1531 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:11.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862386564323763373537613434383136383930386161303031646230 Oct 2 19:14:11.944000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.944000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.944000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.944000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.944000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.944000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.944000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.944000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.944000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.944000 audit: BPF prog-id=66 op=LOAD Oct 2 19:14:11.944000 audit[1542]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000151770 a2=78 a3=c000388388 items=0 ppid=1531 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:11.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862386564323763373537613434383136383930386161303031646230 Oct 2 19:14:11.949000 audit: BPF prog-id=66 op=UNLOAD Oct 2 19:14:11.949000 audit: BPF prog-id=65 op=UNLOAD Oct 2 19:14:11.949000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.949000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.949000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.949000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.949000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.949000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.949000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.949000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.949000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.949000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.949000 audit: BPF prog-id=67 op=LOAD Oct 2 19:14:11.949000 audit[1542]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000151c30 a2=78 a3=c000388798 items=0 ppid=1531 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:11.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862386564323763373537613434383136383930386161303031646230 Oct 2 19:14:11.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.962000 audit: BPF prog-id=68 op=LOAD Oct 2 19:14:11.963000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.963000 audit[1587]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1562 pid=1587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:11.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134363939616361336163376531313261393562626261316330343666 Oct 2 19:14:11.963000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.963000 audit[1587]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1562 pid=1587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:11.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134363939616361336163376531313261393562626261316330343666 Oct 2 19:14:11.963000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.963000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.963000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.963000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.963000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.963000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.963000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.963000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.963000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.963000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.963000 audit: BPF prog-id=69 op=LOAD Oct 2 19:14:11.963000 audit[1587]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000249e0 items=0 ppid=1562 pid=1587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:11.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134363939616361336163376531313261393562626261316330343666 Oct 2 19:14:11.963000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.963000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.963000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.963000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.963000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.963000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.963000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.963000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.963000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.963000 audit: BPF prog-id=70 op=LOAD Oct 2 19:14:11.963000 audit[1587]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000024a28 items=0 ppid=1562 pid=1587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:11.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134363939616361336163376531313261393562626261316330343666 Oct 2 19:14:11.963000 audit: BPF prog-id=70 op=UNLOAD Oct 2 19:14:11.963000 audit: BPF prog-id=69 op=UNLOAD Oct 2 19:14:11.963000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.963000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.963000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.963000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.963000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.963000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.963000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.963000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.963000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.963000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.963000 audit: BPF prog-id=71 op=LOAD Oct 2 19:14:11.963000 audit[1587]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000024e38 items=0 ppid=1562 pid=1587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:11.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134363939616361336163376531313261393562626261316330343666 Oct 2 19:14:11.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit: BPF prog-id=72 op=LOAD Oct 2 19:14:11.972000 audit[1600]: AVC avc: denied { bpf } for pid=1600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit[1600]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1584 pid=1600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:11.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434666231386465613939383036663132353764633233306262353337 Oct 2 19:14:11.972000 audit[1600]: AVC avc: denied { perfmon } for pid=1600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit[1600]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=1584 pid=1600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:11.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434666231386465613939383036663132353764633233306262353337 Oct 2 19:14:11.972000 audit[1600]: AVC avc: denied { bpf } for pid=1600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit[1600]: AVC avc: denied { bpf } for pid=1600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit[1600]: AVC avc: denied { bpf } for pid=1600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit[1600]: AVC avc: denied { perfmon } for pid=1600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit[1600]: AVC avc: denied { perfmon } for pid=1600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit[1600]: AVC avc: denied { perfmon } for pid=1600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit[1600]: AVC avc: denied { perfmon } for pid=1600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit[1600]: AVC avc: denied { perfmon } for pid=1600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit[1600]: AVC avc: denied { bpf } for pid=1600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit[1600]: AVC avc: denied { bpf } for pid=1600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit: BPF prog-id=73 op=LOAD Oct 2 19:14:11.972000 audit[1600]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00018d200 items=0 ppid=1584 pid=1600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:11.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434666231386465613939383036663132353764633233306262353337 Oct 2 19:14:11.972000 audit[1600]: AVC avc: denied { bpf } for pid=1600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit[1600]: AVC avc: denied { bpf } for pid=1600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit[1600]: AVC avc: denied { perfmon } for pid=1600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit[1600]: AVC avc: denied { perfmon } for pid=1600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit[1600]: AVC avc: denied { perfmon } for pid=1600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit[1600]: AVC avc: denied { perfmon } for pid=1600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit[1600]: AVC avc: denied { perfmon } for pid=1600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit[1600]: AVC avc: denied { bpf } for pid=1600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit[1600]: AVC avc: denied { bpf } for pid=1600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit: BPF prog-id=74 op=LOAD Oct 2 19:14:11.972000 audit[1600]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00018d248 items=0 ppid=1584 pid=1600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:11.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434666231386465613939383036663132353764633233306262353337 Oct 2 19:14:11.972000 audit: BPF prog-id=74 op=UNLOAD Oct 2 19:14:11.972000 audit: BPF prog-id=73 op=UNLOAD Oct 2 19:14:11.972000 audit[1600]: AVC avc: denied { bpf } for pid=1600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit[1600]: AVC avc: denied { bpf } for pid=1600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit[1600]: AVC avc: denied { bpf } for pid=1600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit[1600]: AVC avc: denied { perfmon } for pid=1600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit[1600]: AVC avc: denied { perfmon } for pid=1600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit[1600]: AVC avc: denied { perfmon } for pid=1600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit[1600]: AVC avc: denied { perfmon } for pid=1600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit[1600]: AVC avc: denied { perfmon } for pid=1600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit[1600]: AVC avc: denied { bpf } for pid=1600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit[1600]: AVC avc: denied { bpf } for pid=1600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:11.972000 audit: BPF prog-id=75 op=LOAD Oct 2 19:14:11.972000 audit[1600]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00018d658 items=0 ppid=1584 pid=1600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:11.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434666231386465613939383036663132353764633233306262353337 Oct 2 19:14:11.975068 env[1103]: time="2023-10-02T19:14:11.975030922Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-smjt6,Uid:391be0e6-b57b-411c-93e6-5db9eda95b0f,Namespace:calico-system,Attempt:0,} returns sandbox id \"8b8ed27c757a448168908aa001db09716349703b093d7db42a672696c55ac57b\"" Oct 2 19:14:11.976302 kubelet[1412]: E1002 19:14:11.976287 1412 dns.go:157] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:14:11.977479 env[1103]: time="2023-10-02T19:14:11.977449729Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\"" Oct 2 19:14:11.989989 env[1103]: time="2023-10-02T19:14:11.989930229Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-59t94,Uid:911b20c1-da42-4b51-ae3f-cc2431f42771,Namespace:kube-system,Attempt:0,} returns sandbox id \"44fb18dea99806f1257dc230bb53772c03691a47dc4365432e700aef1b0d45c7\"" Oct 2 19:14:11.990811 kubelet[1412]: E1002 19:14:11.990758 1412 dns.go:157] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:14:11.991215 env[1103]: time="2023-10-02T19:14:11.991188058Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-64db64cb98-lbmkz,Uid:c675897f-63b8-48bd-bb35-c7161ea0e20b,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"a4699aca3ac7e112a95bbba1c046f44f3b036503bf9016a857478e360e775b09\"" Oct 2 19:14:12.350054 kubelet[1412]: E1002 19:14:12.349896 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:13.350856 kubelet[1412]: E1002 19:14:13.350787 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:14.351180 kubelet[1412]: E1002 19:14:14.351129 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:14.416187 kubelet[1412]: E1002 19:14:14.416153 1412 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:14:15.351353 kubelet[1412]: E1002 19:14:15.351285 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:15.866753 env[1103]: time="2023-10-02T19:14:15.866661854Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:15.868601 env[1103]: time="2023-10-02T19:14:15.868534709Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:15.870723 env[1103]: time="2023-10-02T19:14:15.870687393Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:15.872625 env[1103]: time="2023-10-02T19:14:15.872577050Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:15.873763 env[1103]: time="2023-10-02T19:14:15.873707256Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72\"" Oct 2 19:14:15.874610 env[1103]: time="2023-10-02T19:14:15.874569636Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.25.14\"" Oct 2 19:14:15.875900 env[1103]: time="2023-10-02T19:14:15.875862125Z" level=info msg="CreateContainer within sandbox \"8b8ed27c757a448168908aa001db09716349703b093d7db42a672696c55ac57b\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 2 19:14:15.888450 env[1103]: time="2023-10-02T19:14:15.888396803Z" level=info msg="CreateContainer within sandbox \"8b8ed27c757a448168908aa001db09716349703b093d7db42a672696c55ac57b\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"bb298575eba81d658ced4a3ebbf6e680aaaf93a7ff5747d81cdc9217aee719d0\"" Oct 2 19:14:15.889069 env[1103]: time="2023-10-02T19:14:15.889036956Z" level=info msg="StartContainer for \"bb298575eba81d658ced4a3ebbf6e680aaaf93a7ff5747d81cdc9217aee719d0\"" Oct 2 19:14:15.909360 systemd[1]: Started cri-containerd-bb298575eba81d658ced4a3ebbf6e680aaaf93a7ff5747d81cdc9217aee719d0.scope. Oct 2 19:14:15.925000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:15.925000 audit[1652]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=1531 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:15.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262323938353735656261383164363538636564346133656262663665 Oct 2 19:14:15.926000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:15.926000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:15.926000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:15.926000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:15.926000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:15.926000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:15.926000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:15.926000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:15.926000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:15.926000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:15.926000 audit: BPF prog-id=76 op=LOAD Oct 2 19:14:15.926000 audit[1652]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c0000a0670 items=0 ppid=1531 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:15.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262323938353735656261383164363538636564346133656262663665 Oct 2 19:14:15.926000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:15.926000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:15.926000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:15.926000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:15.926000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:15.926000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:15.926000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:15.926000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:15.926000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:15.926000 audit: BPF prog-id=77 op=LOAD Oct 2 19:14:15.926000 audit[1652]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c0000a06b8 items=0 ppid=1531 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:15.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262323938353735656261383164363538636564346133656262663665 Oct 2 19:14:15.926000 audit: BPF prog-id=77 op=UNLOAD Oct 2 19:14:15.926000 audit: BPF prog-id=76 op=UNLOAD Oct 2 19:14:15.926000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:15.926000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:15.926000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:15.926000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:15.926000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:15.926000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:15.926000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:15.926000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:15.926000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:15.926000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:15.926000 audit: BPF prog-id=78 op=LOAD Oct 2 19:14:15.926000 audit[1652]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c0000a0748 items=0 ppid=1531 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:15.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262323938353735656261383164363538636564346133656262663665 Oct 2 19:14:15.942774 env[1103]: time="2023-10-02T19:14:15.942717228Z" level=info msg="StartContainer for \"bb298575eba81d658ced4a3ebbf6e680aaaf93a7ff5747d81cdc9217aee719d0\" returns successfully" Oct 2 19:14:15.948502 systemd[1]: cri-containerd-bb298575eba81d658ced4a3ebbf6e680aaaf93a7ff5747d81cdc9217aee719d0.scope: Deactivated successfully. Oct 2 19:14:15.952000 audit: BPF prog-id=78 op=UNLOAD Oct 2 19:14:15.968917 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-bb298575eba81d658ced4a3ebbf6e680aaaf93a7ff5747d81cdc9217aee719d0-rootfs.mount: Deactivated successfully. Oct 2 19:14:16.023264 env[1103]: time="2023-10-02T19:14:16.023213546Z" level=info msg="shim disconnected" id=bb298575eba81d658ced4a3ebbf6e680aaaf93a7ff5747d81cdc9217aee719d0 Oct 2 19:14:16.023264 env[1103]: time="2023-10-02T19:14:16.023259234Z" level=warning msg="cleaning up after shim disconnected" id=bb298575eba81d658ced4a3ebbf6e680aaaf93a7ff5747d81cdc9217aee719d0 namespace=k8s.io Oct 2 19:14:16.023264 env[1103]: time="2023-10-02T19:14:16.023267681Z" level=info msg="cleaning up dead shim" Oct 2 19:14:16.030745 env[1103]: time="2023-10-02T19:14:16.030708661Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:14:16Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1692 runtime=io.containerd.runc.v2\n" Oct 2 19:14:16.352108 kubelet[1412]: E1002 19:14:16.352036 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:16.532803 kubelet[1412]: E1002 19:14:16.532772 1412 dns.go:157] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:14:17.261770 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3570891182.mount: Deactivated successfully. Oct 2 19:14:17.352928 kubelet[1412]: E1002 19:14:17.352863 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:17.973375 env[1103]: time="2023-10-02T19:14:17.973315297Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:18.081590 env[1103]: time="2023-10-02T19:14:18.081522930Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b2d7e01cd611a8a377680226224d6d7f70eea58e8e603b1874585a279866f6a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:18.175518 env[1103]: time="2023-10-02T19:14:18.175458308Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:18.213715 env[1103]: time="2023-10-02T19:14:18.213659213Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:4a23f328943342be6a3eeda75cc7a01d175bcf8b096611c97d2aa14c843cf326,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:18.214177 env[1103]: time="2023-10-02T19:14:18.214144573Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.25.14\" returns image reference \"sha256:b2d7e01cd611a8a377680226224d6d7f70eea58e8e603b1874585a279866f6a2\"" Oct 2 19:14:18.214682 env[1103]: time="2023-10-02T19:14:18.214652265Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\"" Oct 2 19:14:18.215756 env[1103]: time="2023-10-02T19:14:18.215706696Z" level=info msg="CreateContainer within sandbox \"44fb18dea99806f1257dc230bb53772c03691a47dc4365432e700aef1b0d45c7\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 19:14:18.353659 kubelet[1412]: E1002 19:14:18.353529 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:18.443171 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2060821277.mount: Deactivated successfully. Oct 2 19:14:18.445096 env[1103]: time="2023-10-02T19:14:18.445051470Z" level=info msg="CreateContainer within sandbox \"44fb18dea99806f1257dc230bb53772c03691a47dc4365432e700aef1b0d45c7\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"e13fe1d85c04c0ce4619519f02e476f81b3415a8c117ff761271006949cdb045\"" Oct 2 19:14:18.445553 env[1103]: time="2023-10-02T19:14:18.445529627Z" level=info msg="StartContainer for \"e13fe1d85c04c0ce4619519f02e476f81b3415a8c117ff761271006949cdb045\"" Oct 2 19:14:18.462119 systemd[1]: Started cri-containerd-e13fe1d85c04c0ce4619519f02e476f81b3415a8c117ff761271006949cdb045.scope. Oct 2 19:14:18.471000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.473261 kernel: kauditd_printk_skb: 205 callbacks suppressed Oct 2 19:14:18.473326 kernel: audit: type=1400 audit(1696274058.471:634): avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.471000 audit[1716]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=8 items=0 ppid=1584 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.478640 kernel: audit: type=1300 audit(1696274058.471:634): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=8 items=0 ppid=1584 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.478686 kernel: audit: type=1327 audit(1696274058.471:634): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531336665316438356330346330636534363139353139663032653437 Oct 2 19:14:18.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531336665316438356330346330636534363139353139663032653437 Oct 2 19:14:18.471000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.483371 kernel: audit: type=1400 audit(1696274058.471:635): avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.471000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.485717 kernel: audit: type=1400 audit(1696274058.471:635): avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.485752 kernel: audit: type=1400 audit(1696274058.471:635): avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.471000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.490521 kernel: audit: type=1400 audit(1696274058.471:635): avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.471000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.471000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.492885 kernel: audit: type=1400 audit(1696274058.471:635): avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.471000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.495584 kernel: audit: type=1400 audit(1696274058.471:635): avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.471000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.498095 kernel: audit: type=1400 audit(1696274058.471:635): avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.471000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.471000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.471000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.471000 audit: BPF prog-id=79 op=LOAD Oct 2 19:14:18.471000 audit[1716]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c000265350 items=0 ppid=1584 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531336665316438356330346330636534363139353139663032653437 Oct 2 19:14:18.474000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.474000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.474000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.474000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.474000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.474000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.474000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.474000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.474000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.474000 audit: BPF prog-id=80 op=LOAD Oct 2 19:14:18.474000 audit[1716]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c000265398 items=0 ppid=1584 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531336665316438356330346330636534363139353139663032653437 Oct 2 19:14:18.477000 audit: BPF prog-id=80 op=UNLOAD Oct 2 19:14:18.477000 audit: BPF prog-id=79 op=UNLOAD Oct 2 19:14:18.477000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.477000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.477000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.477000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.477000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.477000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.477000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.477000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.477000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.477000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:18.477000 audit: BPF prog-id=81 op=LOAD Oct 2 19:14:18.477000 audit[1716]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c000265428 items=0 ppid=1584 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531336665316438356330346330636534363139353139663032653437 Oct 2 19:14:18.520968 env[1103]: time="2023-10-02T19:14:18.520899178Z" level=info msg="StartContainer for \"e13fe1d85c04c0ce4619519f02e476f81b3415a8c117ff761271006949cdb045\" returns successfully" Oct 2 19:14:18.535721 kubelet[1412]: E1002 19:14:18.535656 1412 dns.go:157] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:14:18.544016 kernel: IPVS: Registered protocols (TCP, UDP, SCTP, AH, ESP) Oct 2 19:14:18.544118 kernel: IPVS: Connection hash table configured (size=4096, memory=32Kbytes) Oct 2 19:14:18.544146 kernel: IPVS: ipvs loaded. Oct 2 19:14:18.550720 kernel: IPVS: [rr] scheduler registered. Oct 2 19:14:18.556723 kernel: IPVS: [wrr] scheduler registered. Oct 2 19:14:18.560711 kernel: IPVS: [sh] scheduler registered. Oct 2 19:14:18.595000 audit[1775]: NETFILTER_CFG table=mangle:35 family=2 entries=1 op=nft_register_chain pid=1775 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:18.595000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe63b13fa0 a2=0 a3=7ffe63b13f8c items=0 ppid=1726 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.595000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:14:18.595000 audit[1777]: NETFILTER_CFG table=mangle:36 family=10 entries=1 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:18.595000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc50e3f710 a2=0 a3=7ffc50e3f6fc items=0 ppid=1726 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.595000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:14:18.596000 audit[1779]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1779 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:18.596000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf20f0020 a2=0 a3=7ffcf20f000c items=0 ppid=1726 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.596000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:14:18.597000 audit[1780]: NETFILTER_CFG table=nat:38 family=10 entries=1 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:18.597000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff198ace90 a2=0 a3=7fff198ace7c items=0 ppid=1726 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.597000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:14:18.597000 audit[1781]: NETFILTER_CFG table=filter:39 family=2 entries=1 op=nft_register_chain pid=1781 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:18.597000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe404c4ad0 a2=0 a3=7ffe404c4abc items=0 ppid=1726 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.597000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:14:18.600000 audit[1782]: NETFILTER_CFG table=filter:40 family=10 entries=1 op=nft_register_chain pid=1782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:18.600000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc2d7869c0 a2=0 a3=7ffc2d7869ac items=0 ppid=1726 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.600000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:14:18.701000 audit[1783]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=1783 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:18.701000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffffc7cc740 a2=0 a3=7ffffc7cc72c items=0 ppid=1726 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.701000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:14:18.704000 audit[1785]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_rule pid=1785 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:18.704000 audit[1785]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffa4aab650 a2=0 a3=7fffa4aab63c items=0 ppid=1726 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.704000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 19:14:18.707000 audit[1788]: NETFILTER_CFG table=filter:43 family=2 entries=2 op=nft_register_chain pid=1788 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:18.707000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff6f4ab4e0 a2=0 a3=7fff6f4ab4cc items=0 ppid=1726 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.707000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 19:14:18.708000 audit[1789]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=1789 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:18.708000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd196c73f0 a2=0 a3=7ffd196c73dc items=0 ppid=1726 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.708000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:14:18.710000 audit[1791]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=1791 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:18.710000 audit[1791]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffed64389a0 a2=0 a3=7ffed643898c items=0 ppid=1726 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.710000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:14:18.711000 audit[1792]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_chain pid=1792 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:18.711000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd21e2efa0 a2=0 a3=7ffd21e2ef8c items=0 ppid=1726 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.711000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:14:18.714000 audit[1794]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_rule pid=1794 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:18.714000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff33a27760 a2=0 a3=7fff33a2774c items=0 ppid=1726 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.714000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:14:18.717000 audit[1797]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=1797 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:18.717000 audit[1797]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe6475a5f0 a2=0 a3=7ffe6475a5dc items=0 ppid=1726 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.717000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 19:14:18.718000 audit[1798]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=1798 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:18.718000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdbe744ec0 a2=0 a3=7ffdbe744eac items=0 ppid=1726 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.718000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:14:18.720000 audit[1800]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=1800 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:18.720000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc1006a770 a2=0 a3=7ffc1006a75c items=0 ppid=1726 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.720000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:14:18.721000 audit[1801]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_chain pid=1801 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:18.721000 audit[1801]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf126f7b0 a2=0 a3=7ffdf126f79c items=0 ppid=1726 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.721000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:14:18.724000 audit[1803]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_rule pid=1803 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:18.724000 audit[1803]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc1d103500 a2=0 a3=7ffc1d1034ec items=0 ppid=1726 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.724000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:14:18.727000 audit[1806]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=1806 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:18.727000 audit[1806]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd207ae480 a2=0 a3=7ffd207ae46c items=0 ppid=1726 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.727000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:14:18.731000 audit[1809]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=1809 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:18.731000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc2babc6a0 a2=0 a3=7ffc2babc68c items=0 ppid=1726 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.731000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:14:18.732000 audit[1810]: NETFILTER_CFG table=nat:55 family=2 entries=1 op=nft_register_chain pid=1810 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:18.732000 audit[1810]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc46994b90 a2=0 a3=7ffc46994b7c items=0 ppid=1726 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.732000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:14:18.734000 audit[1812]: NETFILTER_CFG table=nat:56 family=2 entries=2 op=nft_register_chain pid=1812 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:18.734000 audit[1812]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd88563e70 a2=0 a3=7ffd88563e5c items=0 ppid=1726 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.734000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:14:18.736000 audit[1815]: NETFILTER_CFG table=nat:57 family=2 entries=2 op=nft_register_chain pid=1815 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:18.736000 audit[1815]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffc1bea480 a2=0 a3=7fffc1bea46c items=0 ppid=1726 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.736000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:14:18.745000 audit[1819]: NETFILTER_CFG table=filter:58 family=2 entries=6 op=nft_register_rule pid=1819 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:14:18.745000 audit[1819]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffff67c7f40 a2=0 a3=7ffff67c7f2c items=0 ppid=1726 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.745000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:14:18.753000 audit[1819]: NETFILTER_CFG table=nat:59 family=2 entries=24 op=nft_register_chain pid=1819 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:14:18.753000 audit[1819]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffff67c7f40 a2=0 a3=7ffff67c7f2c items=0 ppid=1726 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.753000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:14:18.764000 audit[1823]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1823 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:18.764000 audit[1823]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe2ea15340 a2=0 a3=7ffe2ea1532c items=0 ppid=1726 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.764000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:14:18.766000 audit[1825]: NETFILTER_CFG table=filter:61 family=10 entries=2 op=nft_register_chain pid=1825 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:18.766000 audit[1825]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc47ef0bd0 a2=0 a3=7ffc47ef0bbc items=0 ppid=1726 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.766000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 19:14:18.769000 audit[1828]: NETFILTER_CFG table=filter:62 family=10 entries=2 op=nft_register_chain pid=1828 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:18.769000 audit[1828]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcdcefcfd0 a2=0 a3=7ffcdcefcfbc items=0 ppid=1726 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.769000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 19:14:18.770000 audit[1829]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=1829 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:18.770000 audit[1829]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1a9ebf90 a2=0 a3=7ffe1a9ebf7c items=0 ppid=1726 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.770000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:14:18.772000 audit[1831]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=1831 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:18.772000 audit[1831]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc6886f0f0 a2=0 a3=7ffc6886f0dc items=0 ppid=1726 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.772000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:14:18.773000 audit[1832]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=1832 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:18.773000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdccc042f0 a2=0 a3=7ffdccc042dc items=0 ppid=1726 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.773000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:14:18.775000 audit[1834]: NETFILTER_CFG table=filter:66 family=10 entries=1 op=nft_register_rule pid=1834 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:18.775000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe845d15e0 a2=0 a3=7ffe845d15cc items=0 ppid=1726 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.775000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 19:14:18.778000 audit[1837]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=1837 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:18.778000 audit[1837]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffeeb847600 a2=0 a3=7ffeeb8475ec items=0 ppid=1726 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.778000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:14:18.779000 audit[1838]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=1838 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:18.779000 audit[1838]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc16cc6b00 a2=0 a3=7ffc16cc6aec items=0 ppid=1726 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.779000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:14:18.781000 audit[1840]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=1840 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:18.781000 audit[1840]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd06d5ce10 a2=0 a3=7ffd06d5cdfc items=0 ppid=1726 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.781000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:14:18.782000 audit[1841]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=1841 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:18.782000 audit[1841]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffefb09db0 a2=0 a3=7fffefb09d9c items=0 ppid=1726 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.782000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:14:18.784000 audit[1843]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=1843 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:18.784000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff7b083970 a2=0 a3=7fff7b08395c items=0 ppid=1726 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.784000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:14:18.787000 audit[1846]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=1846 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:18.787000 audit[1846]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc8d42f5f0 a2=0 a3=7ffc8d42f5dc items=0 ppid=1726 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.787000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:14:18.790000 audit[1849]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_rule pid=1849 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:18.790000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeb222bb30 a2=0 a3=7ffeb222bb1c items=0 ppid=1726 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.790000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 19:14:18.791000 audit[1850]: NETFILTER_CFG table=nat:74 family=10 entries=1 op=nft_register_chain pid=1850 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:18.791000 audit[1850]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffeccabf980 a2=0 a3=7ffeccabf96c items=0 ppid=1726 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.791000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:14:18.794000 audit[1852]: NETFILTER_CFG table=nat:75 family=10 entries=2 op=nft_register_chain pid=1852 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:18.794000 audit[1852]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc30919160 a2=0 a3=7ffc3091914c items=0 ppid=1726 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.794000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:14:18.796000 audit[1855]: NETFILTER_CFG table=nat:76 family=10 entries=2 op=nft_register_chain pid=1855 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:18.796000 audit[1855]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcf87f7940 a2=0 a3=7ffcf87f792c items=0 ppid=1726 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.796000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:14:18.801000 audit[1859]: NETFILTER_CFG table=filter:77 family=10 entries=3 op=nft_register_rule pid=1859 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:14:18.801000 audit[1859]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fff7a047970 a2=0 a3=7fff7a04795c items=0 ppid=1726 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.801000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:14:18.801000 audit[1859]: NETFILTER_CFG table=nat:78 family=10 entries=10 op=nft_register_chain pid=1859 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:14:18.801000 audit[1859]: SYSCALL arch=c000003e syscall=46 success=yes exit=1860 a0=3 a1=7fff7a047970 a2=0 a3=7fff7a04795c items=0 ppid=1726 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.801000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:14:19.354044 kubelet[1412]: E1002 19:14:19.353993 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:19.417493 kubelet[1412]: E1002 19:14:19.417448 1412 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:14:19.537575 kubelet[1412]: E1002 19:14:19.537529 1412 dns.go:157] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:14:20.354367 kubelet[1412]: E1002 19:14:20.354295 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:20.919106 env[1103]: time="2023-10-02T19:14:20.919020601Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:20.921651 env[1103]: time="2023-10-02T19:14:20.921597627Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:20.923570 env[1103]: time="2023-10-02T19:14:20.923529880Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:20.925272 env[1103]: time="2023-10-02T19:14:20.925229569Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:89eef35e1bbe8c88792ce69c3f3f38fb9838e58602c570524350b5f3ab127582,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:20.925924 env[1103]: time="2023-10-02T19:14:20.925892957Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\" returns image reference \"sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1\"" Oct 2 19:14:20.926772 env[1103]: time="2023-10-02T19:14:20.926746098Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\"" Oct 2 19:14:20.927660 env[1103]: time="2023-10-02T19:14:20.927627603Z" level=info msg="CreateContainer within sandbox \"a4699aca3ac7e112a95bbba1c046f44f3b036503bf9016a857478e360e775b09\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Oct 2 19:14:20.940631 env[1103]: time="2023-10-02T19:14:20.940581262Z" level=info msg="CreateContainer within sandbox \"a4699aca3ac7e112a95bbba1c046f44f3b036503bf9016a857478e360e775b09\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"a700640b4f7eccef053acfb40a5f3f04e403bd5f4eef43a4d5b12ffe9df6b12e\"" Oct 2 19:14:20.941063 env[1103]: time="2023-10-02T19:14:20.941042053Z" level=info msg="StartContainer for \"a700640b4f7eccef053acfb40a5f3f04e403bd5f4eef43a4d5b12ffe9df6b12e\"" Oct 2 19:14:21.059058 systemd[1]: Started cri-containerd-a700640b4f7eccef053acfb40a5f3f04e403bd5f4eef43a4d5b12ffe9df6b12e.scope. Oct 2 19:14:21.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.083000 audit: BPF prog-id=82 op=LOAD Oct 2 19:14:21.084000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.084000 audit[1867]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1562 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:21.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137303036343062346637656363656630353361636662343061356633 Oct 2 19:14:21.084000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.084000 audit[1867]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1562 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:21.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137303036343062346637656363656630353361636662343061356633 Oct 2 19:14:21.084000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.084000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.084000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.084000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.084000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.084000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.084000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.084000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.084000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.084000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.084000 audit: BPF prog-id=83 op=LOAD Oct 2 19:14:21.084000 audit[1867]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003b2d00 items=0 ppid=1562 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:21.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137303036343062346637656363656630353361636662343061356633 Oct 2 19:14:21.084000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.084000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.084000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.084000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.084000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.084000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.084000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.084000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.084000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.084000 audit: BPF prog-id=84 op=LOAD Oct 2 19:14:21.084000 audit[1867]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003b2d48 items=0 ppid=1562 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:21.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137303036343062346637656363656630353361636662343061356633 Oct 2 19:14:21.084000 audit: BPF prog-id=84 op=UNLOAD Oct 2 19:14:21.084000 audit: BPF prog-id=83 op=UNLOAD Oct 2 19:14:21.084000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.084000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.084000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.084000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.084000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.084000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.084000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.084000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.084000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.084000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.084000 audit: BPF prog-id=85 op=LOAD Oct 2 19:14:21.084000 audit[1867]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003b3158 items=0 ppid=1562 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:21.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137303036343062346637656363656630353361636662343061356633 Oct 2 19:14:21.213257 env[1103]: time="2023-10-02T19:14:21.213089860Z" level=info msg="StartContainer for \"a700640b4f7eccef053acfb40a5f3f04e403bd5f4eef43a4d5b12ffe9df6b12e\" returns successfully" Oct 2 19:14:21.355415 kubelet[1412]: E1002 19:14:21.355343 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:22.356119 kubelet[1412]: E1002 19:14:22.356057 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:22.467524 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2165931381.mount: Deactivated successfully. Oct 2 19:14:23.356457 kubelet[1412]: E1002 19:14:23.356404 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:24.356920 kubelet[1412]: E1002 19:14:24.356846 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:24.418704 kubelet[1412]: E1002 19:14:24.418645 1412 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:14:25.357384 kubelet[1412]: E1002 19:14:25.357308 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:26.065670 env[1103]: time="2023-10-02T19:14:26.065606065Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:26.067255 env[1103]: time="2023-10-02T19:14:26.067222305Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:26.070540 env[1103]: time="2023-10-02T19:14:26.070504852Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:26.073465 env[1103]: time="2023-10-02T19:14:26.073418046Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:26.074051 env[1103]: time="2023-10-02T19:14:26.074017536Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7\"" Oct 2 19:14:26.075712 env[1103]: time="2023-10-02T19:14:26.075660447Z" level=info msg="CreateContainer within sandbox \"8b8ed27c757a448168908aa001db09716349703b093d7db42a672696c55ac57b\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 2 19:14:26.088464 env[1103]: time="2023-10-02T19:14:26.088423867Z" level=info msg="CreateContainer within sandbox \"8b8ed27c757a448168908aa001db09716349703b093d7db42a672696c55ac57b\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"78b85f4583c0ee8053552355350d3c720195ddf930a11d3227a3ea89f04df9b8\"" Oct 2 19:14:26.088890 env[1103]: time="2023-10-02T19:14:26.088856268Z" level=info msg="StartContainer for \"78b85f4583c0ee8053552355350d3c720195ddf930a11d3227a3ea89f04df9b8\"" Oct 2 19:14:26.106464 systemd[1]: Started cri-containerd-78b85f4583c0ee8053552355350d3c720195ddf930a11d3227a3ea89f04df9b8.scope. Oct 2 19:14:26.114000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.117223 kernel: kauditd_printk_skb: 222 callbacks suppressed Oct 2 19:14:26.117324 kernel: audit: type=1400 audit(1696274066.114:702): avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.114000 audit[1905]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1531 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:26.121835 kernel: audit: type=1300 audit(1696274066.114:702): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1531 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:26.121894 kernel: audit: type=1327 audit(1696274066.114:702): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738623835663435383363306565383035333535323335353335306433 Oct 2 19:14:26.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738623835663435383363306565383035333535323335353335306433 Oct 2 19:14:26.114000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.126231 kernel: audit: type=1400 audit(1696274066.114:703): avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.126270 kernel: audit: type=1400 audit(1696274066.114:703): avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.114000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.114000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.129909 kernel: audit: type=1400 audit(1696274066.114:703): avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.129946 kernel: audit: type=1400 audit(1696274066.114:703): avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.114000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.114000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.114000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.136063 kernel: audit: type=1400 audit(1696274066.114:703): avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.136099 kernel: audit: type=1400 audit(1696274066.114:703): avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.136115 kernel: audit: type=1400 audit(1696274066.114:703): avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.114000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.114000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.114000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.114000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.114000 audit: BPF prog-id=86 op=LOAD Oct 2 19:14:26.114000 audit[1905]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002184a0 items=0 ppid=1531 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:26.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738623835663435383363306565383035333535323335353335306433 Oct 2 19:14:26.118000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.118000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.118000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.118000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.118000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.118000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.118000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.118000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.118000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.118000 audit: BPF prog-id=87 op=LOAD Oct 2 19:14:26.118000 audit[1905]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002184e8 items=0 ppid=1531 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:26.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738623835663435383363306565383035333535323335353335306433 Oct 2 19:14:26.123000 audit: BPF prog-id=87 op=UNLOAD Oct 2 19:14:26.123000 audit: BPF prog-id=86 op=UNLOAD Oct 2 19:14:26.123000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.123000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.123000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.123000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.123000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.123000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.123000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.123000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.123000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.123000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:26.123000 audit: BPF prog-id=88 op=LOAD Oct 2 19:14:26.123000 audit[1905]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000218578 items=0 ppid=1531 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:26.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738623835663435383363306565383035333535323335353335306433 Oct 2 19:14:26.144121 env[1103]: time="2023-10-02T19:14:26.144072997Z" level=info msg="StartContainer for \"78b85f4583c0ee8053552355350d3c720195ddf930a11d3227a3ea89f04df9b8\" returns successfully" Oct 2 19:14:26.357962 kubelet[1412]: E1002 19:14:26.357822 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:26.556197 kubelet[1412]: E1002 19:14:26.556166 1412 dns.go:157] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:14:26.957154 systemd[1]: cri-containerd-78b85f4583c0ee8053552355350d3c720195ddf930a11d3227a3ea89f04df9b8.scope: Deactivated successfully. Oct 2 19:14:26.962000 audit: BPF prog-id=88 op=UNLOAD Oct 2 19:14:26.971241 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-78b85f4583c0ee8053552355350d3c720195ddf930a11d3227a3ea89f04df9b8-rootfs.mount: Deactivated successfully. Oct 2 19:14:27.358028 kubelet[1412]: E1002 19:14:27.357955 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:27.436003 env[1103]: time="2023-10-02T19:14:27.435956070Z" level=info msg="shim disconnected" id=78b85f4583c0ee8053552355350d3c720195ddf930a11d3227a3ea89f04df9b8 Oct 2 19:14:27.436487 env[1103]: time="2023-10-02T19:14:27.436436653Z" level=warning msg="cleaning up after shim disconnected" id=78b85f4583c0ee8053552355350d3c720195ddf930a11d3227a3ea89f04df9b8 namespace=k8s.io Oct 2 19:14:27.436487 env[1103]: time="2023-10-02T19:14:27.436458334Z" level=info msg="cleaning up dead shim" Oct 2 19:14:27.442920 env[1103]: time="2023-10-02T19:14:27.442876067Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:14:27Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1953 runtime=io.containerd.runc.v2\n" Oct 2 19:14:27.559704 kubelet[1412]: E1002 19:14:27.559656 1412 dns.go:157] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:14:27.560330 env[1103]: time="2023-10-02T19:14:27.560298876Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\"" Oct 2 19:14:28.221420 update_engine[1096]: I1002 19:14:28.221349 1096 update_attempter.cc:505] Updating boot flags... Oct 2 19:14:28.358908 kubelet[1412]: E1002 19:14:28.358857 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:29.335780 kubelet[1412]: E1002 19:14:29.335720 1412 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:29.359101 kubelet[1412]: E1002 19:14:29.359059 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:30.359805 kubelet[1412]: E1002 19:14:30.359728 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:31.359903 kubelet[1412]: E1002 19:14:31.359848 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:31.915591 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1950333595.mount: Deactivated successfully. Oct 2 19:14:32.197404 env[1103]: time="2023-10-02T19:14:32.197290567Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:32.199089 env[1103]: time="2023-10-02T19:14:32.199060857Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:32.200525 env[1103]: time="2023-10-02T19:14:32.200481105Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:32.201899 env[1103]: time="2023-10-02T19:14:32.201866296Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:32.202286 env[1103]: time="2023-10-02T19:14:32.202251514Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e\"" Oct 2 19:14:32.204130 env[1103]: time="2023-10-02T19:14:32.204103358Z" level=info msg="CreateContainer within sandbox \"8b8ed27c757a448168908aa001db09716349703b093d7db42a672696c55ac57b\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 2 19:14:32.215918 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2468907242.mount: Deactivated successfully. Oct 2 19:14:32.218579 env[1103]: time="2023-10-02T19:14:32.218542158Z" level=info msg="CreateContainer within sandbox \"8b8ed27c757a448168908aa001db09716349703b093d7db42a672696c55ac57b\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"67225d0e12de72d62460055386ce5ae104a4aa4870c11024840b011bf13ca7b7\"" Oct 2 19:14:32.219113 env[1103]: time="2023-10-02T19:14:32.219090526Z" level=info msg="StartContainer for \"67225d0e12de72d62460055386ce5ae104a4aa4870c11024840b011bf13ca7b7\"" Oct 2 19:14:32.235622 systemd[1]: Started cri-containerd-67225d0e12de72d62460055386ce5ae104a4aa4870c11024840b011bf13ca7b7.scope. Oct 2 19:14:32.247000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.251467 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 2 19:14:32.251531 kernel: audit: type=1400 audit(1696274072.247:709): avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.251568 kernel: audit: type=1300 audit(1696274072.247:709): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1531 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:32.247000 audit[1987]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1531 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:32.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637323235643065313264653732643632343630303535333836636535 Oct 2 19:14:32.257047 kernel: audit: type=1327 audit(1696274072.247:709): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637323235643065313264653732643632343630303535333836636535 Oct 2 19:14:32.257098 kernel: audit: type=1400 audit(1696274072.247:710): avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.247000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.247000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.260579 kernel: audit: type=1400 audit(1696274072.247:710): avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.260631 kernel: audit: type=1400 audit(1696274072.247:710): avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.247000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.247000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.264450 kernel: audit: type=1400 audit(1696274072.247:710): avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.264500 kernel: audit: type=1400 audit(1696274072.247:710): avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.247000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.266393 kernel: audit: type=1400 audit(1696274072.247:710): avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.247000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.268280 kernel: audit: type=1400 audit(1696274072.247:710): avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.247000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.247000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.247000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.247000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.247000 audit: BPF prog-id=89 op=LOAD Oct 2 19:14:32.247000 audit[1987]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000090d40 items=0 ppid=1531 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:32.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637323235643065313264653732643632343630303535333836636535 Oct 2 19:14:32.249000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.249000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.249000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.249000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.249000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.249000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.249000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.249000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.249000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.249000 audit: BPF prog-id=90 op=LOAD Oct 2 19:14:32.249000 audit[1987]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000090d88 items=0 ppid=1531 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:32.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637323235643065313264653732643632343630303535333836636535 Oct 2 19:14:32.252000 audit: BPF prog-id=90 op=UNLOAD Oct 2 19:14:32.252000 audit: BPF prog-id=89 op=UNLOAD Oct 2 19:14:32.252000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.252000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.252000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.252000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.252000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.252000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.252000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.252000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.252000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.252000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:32.252000 audit: BPF prog-id=91 op=LOAD Oct 2 19:14:32.252000 audit[1987]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000090e18 items=0 ppid=1531 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:32.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637323235643065313264653732643632343630303535333836636535 Oct 2 19:14:32.274855 env[1103]: time="2023-10-02T19:14:32.274794276Z" level=info msg="StartContainer for \"67225d0e12de72d62460055386ce5ae104a4aa4870c11024840b011bf13ca7b7\" returns successfully" Oct 2 19:14:32.332948 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 2 19:14:32.333063 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 2 19:14:32.360195 kubelet[1412]: E1002 19:14:32.360155 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:32.569106 kubelet[1412]: E1002 19:14:32.569076 1412 dns.go:157] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:14:32.800086 kubelet[1412]: I1002 19:14:32.800033 1412 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:14:32.801517 kubelet[1412]: I1002 19:14:32.801374 1412 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:14:32.801767 kubelet[1412]: I1002 19:14:32.801711 1412 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:14:32.805449 systemd[1]: Created slice kubepods-burstable-pod3d25f9e3_c180_4ae7_a463_57a1d11ba70c.slice. Oct 2 19:14:32.810963 kubelet[1412]: I1002 19:14:32.810909 1412 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:14:32.819259 systemd[1]: Created slice kubepods-burstable-pode9558486_4c30_4157_8de7_ef6b9b541c8c.slice. Oct 2 19:14:32.831089 systemd[1]: Created slice kubepods-besteffort-pod11b9e623_9a6c_4a5d_9be8_3a6c37fbc391.slice. Oct 2 19:14:32.835196 systemd[1]: Created slice kubepods-besteffort-pod01427fab_57bb_45ce_83e1_41165d656dfc.slice. Oct 2 19:14:32.892161 kubelet[1412]: I1002 19:14:32.892117 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-47jvp\" (UniqueName: \"kubernetes.io/projected/11b9e623-9a6c-4a5d-9be8-3a6c37fbc391-kube-api-access-47jvp\") pod \"calico-kube-controllers-69d9c784fb-6z9dr\" (UID: \"11b9e623-9a6c-4a5d-9be8-3a6c37fbc391\") " pod="calico-system/calico-kube-controllers-69d9c784fb-6z9dr" Oct 2 19:14:32.892353 kubelet[1412]: I1002 19:14:32.892189 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5tr4q\" (UniqueName: \"kubernetes.io/projected/01427fab-57bb-45ce-83e1-41165d656dfc-kube-api-access-5tr4q\") pod \"csi-node-driver-7t6zx\" (UID: \"01427fab-57bb-45ce-83e1-41165d656dfc\") " pod="calico-system/csi-node-driver-7t6zx" Oct 2 19:14:32.892353 kubelet[1412]: I1002 19:14:32.892281 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/3d25f9e3-c180-4ae7-a463-57a1d11ba70c-config-volume\") pod \"coredns-565d847f94-hpt8h\" (UID: \"3d25f9e3-c180-4ae7-a463-57a1d11ba70c\") " pod="kube-system/coredns-565d847f94-hpt8h" Oct 2 19:14:32.892353 kubelet[1412]: I1002 19:14:32.892344 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/01427fab-57bb-45ce-83e1-41165d656dfc-socket-dir\") pod \"csi-node-driver-7t6zx\" (UID: \"01427fab-57bb-45ce-83e1-41165d656dfc\") " pod="calico-system/csi-node-driver-7t6zx" Oct 2 19:14:32.892448 kubelet[1412]: I1002 19:14:32.892414 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/01427fab-57bb-45ce-83e1-41165d656dfc-varrun\") pod \"csi-node-driver-7t6zx\" (UID: \"01427fab-57bb-45ce-83e1-41165d656dfc\") " pod="calico-system/csi-node-driver-7t6zx" Oct 2 19:14:32.892485 kubelet[1412]: I1002 19:14:32.892474 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/01427fab-57bb-45ce-83e1-41165d656dfc-kubelet-dir\") pod \"csi-node-driver-7t6zx\" (UID: \"01427fab-57bb-45ce-83e1-41165d656dfc\") " pod="calico-system/csi-node-driver-7t6zx" Oct 2 19:14:32.892521 kubelet[1412]: I1002 19:14:32.892504 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/01427fab-57bb-45ce-83e1-41165d656dfc-registration-dir\") pod \"csi-node-driver-7t6zx\" (UID: \"01427fab-57bb-45ce-83e1-41165d656dfc\") " pod="calico-system/csi-node-driver-7t6zx" Oct 2 19:14:32.892554 kubelet[1412]: I1002 19:14:32.892536 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lh622\" (UniqueName: \"kubernetes.io/projected/3d25f9e3-c180-4ae7-a463-57a1d11ba70c-kube-api-access-lh622\") pod \"coredns-565d847f94-hpt8h\" (UID: \"3d25f9e3-c180-4ae7-a463-57a1d11ba70c\") " pod="kube-system/coredns-565d847f94-hpt8h" Oct 2 19:14:32.892620 kubelet[1412]: I1002 19:14:32.892558 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/e9558486-4c30-4157-8de7-ef6b9b541c8c-config-volume\") pod \"coredns-565d847f94-9vgjj\" (UID: \"e9558486-4c30-4157-8de7-ef6b9b541c8c\") " pod="kube-system/coredns-565d847f94-9vgjj" Oct 2 19:14:32.892620 kubelet[1412]: I1002 19:14:32.892585 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/01427fab-57bb-45ce-83e1-41165d656dfc-etccalico\") pod \"csi-node-driver-7t6zx\" (UID: \"01427fab-57bb-45ce-83e1-41165d656dfc\") " pod="calico-system/csi-node-driver-7t6zx" Oct 2 19:14:32.892620 kubelet[1412]: I1002 19:14:32.892618 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jt72v\" (UniqueName: \"kubernetes.io/projected/e9558486-4c30-4157-8de7-ef6b9b541c8c-kube-api-access-jt72v\") pod \"coredns-565d847f94-9vgjj\" (UID: \"e9558486-4c30-4157-8de7-ef6b9b541c8c\") " pod="kube-system/coredns-565d847f94-9vgjj" Oct 2 19:14:32.916065 systemd[1]: run-containerd-runc-k8s.io-67225d0e12de72d62460055386ce5ae104a4aa4870c11024840b011bf13ca7b7-runc.NP815c.mount: Deactivated successfully. Oct 2 19:14:33.133883 env[1103]: time="2023-10-02T19:14:33.133758566Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69d9c784fb-6z9dr,Uid:11b9e623-9a6c-4a5d-9be8-3a6c37fbc391,Namespace:calico-system,Attempt:0,}" Oct 2 19:14:33.266912 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:14:33.267040 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali863bbbc534d: link becomes ready Oct 2 19:14:33.274651 systemd-networkd[1008]: cali863bbbc534d: Link UP Oct 2 19:14:33.274661 systemd-networkd[1008]: cali863bbbc534d: Gained carrier Oct 2 19:14:33.282741 env[1103]: 2023-10-02 19:14:33.195 [INFO][2075] utils.go 108: File /var/lib/calico/mtu does not exist Oct 2 19:14:33.282741 env[1103]: 2023-10-02 19:14:33.206 [INFO][2075] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.100-k8s-calico--kube--controllers--69d9c784fb--6z9dr-eth0 calico-kube-controllers-69d9c784fb- calico-system 11b9e623-9a6c-4a5d-9be8-3a6c37fbc391 843 0 2023-10-02 19:13:43 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:69d9c784fb projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s 10.0.0.100 calico-kube-controllers-69d9c784fb-6z9dr eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali863bbbc534d [] []}} ContainerID="ccb056116d3f62ccf7f4808f114a49cc1e1e299ff9e19d43536349167594e37a" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-6z9dr" WorkloadEndpoint="10.0.0.100-k8s-calico--kube--controllers--69d9c784fb--6z9dr-" Oct 2 19:14:33.282741 env[1103]: 2023-10-02 19:14:33.206 [INFO][2075] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="ccb056116d3f62ccf7f4808f114a49cc1e1e299ff9e19d43536349167594e37a" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-6z9dr" WorkloadEndpoint="10.0.0.100-k8s-calico--kube--controllers--69d9c784fb--6z9dr-eth0" Oct 2 19:14:33.282741 env[1103]: 2023-10-02 19:14:33.228 [INFO][2090] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ccb056116d3f62ccf7f4808f114a49cc1e1e299ff9e19d43536349167594e37a" HandleID="k8s-pod-network.ccb056116d3f62ccf7f4808f114a49cc1e1e299ff9e19d43536349167594e37a" Workload="10.0.0.100-k8s-calico--kube--controllers--69d9c784fb--6z9dr-eth0" Oct 2 19:14:33.282741 env[1103]: 2023-10-02 19:14:33.238 [INFO][2090] ipam_plugin.go 269: Auto assigning IP ContainerID="ccb056116d3f62ccf7f4808f114a49cc1e1e299ff9e19d43536349167594e37a" HandleID="k8s-pod-network.ccb056116d3f62ccf7f4808f114a49cc1e1e299ff9e19d43536349167594e37a" Workload="10.0.0.100-k8s-calico--kube--controllers--69d9c784fb--6z9dr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000191010), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.100", "pod":"calico-kube-controllers-69d9c784fb-6z9dr", "timestamp":"2023-10-02 19:14:33.228837692 +0000 UTC"}, Hostname:"10.0.0.100", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:14:33.282741 env[1103]: time="2023-10-02T19:14:33Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:14:33.282741 env[1103]: time="2023-10-02T19:14:33Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:14:33.282741 env[1103]: 2023-10-02 19:14:33.238 [INFO][2090] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.100' Oct 2 19:14:33.282741 env[1103]: 2023-10-02 19:14:33.239 [INFO][2090] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ccb056116d3f62ccf7f4808f114a49cc1e1e299ff9e19d43536349167594e37a" host="10.0.0.100" Oct 2 19:14:33.282741 env[1103]: 2023-10-02 19:14:33.242 [INFO][2090] ipam.go 372: Looking up existing affinities for host host="10.0.0.100" Oct 2 19:14:33.282741 env[1103]: 2023-10-02 19:14:33.245 [INFO][2090] ipam.go 489: Trying affinity for 192.168.100.64/26 host="10.0.0.100" Oct 2 19:14:33.282741 env[1103]: 2023-10-02 19:14:33.246 [INFO][2090] ipam.go 155: Attempting to load block cidr=192.168.100.64/26 host="10.0.0.100" Oct 2 19:14:33.282741 env[1103]: 2023-10-02 19:14:33.248 [INFO][2090] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.100.64/26 host="10.0.0.100" Oct 2 19:14:33.282741 env[1103]: 2023-10-02 19:14:33.248 [INFO][2090] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.100.64/26 handle="k8s-pod-network.ccb056116d3f62ccf7f4808f114a49cc1e1e299ff9e19d43536349167594e37a" host="10.0.0.100" Oct 2 19:14:33.282741 env[1103]: 2023-10-02 19:14:33.250 [INFO][2090] ipam.go 1682: Creating new handle: k8s-pod-network.ccb056116d3f62ccf7f4808f114a49cc1e1e299ff9e19d43536349167594e37a Oct 2 19:14:33.282741 env[1103]: 2023-10-02 19:14:33.253 [INFO][2090] ipam.go 1203: Writing block in order to claim IPs block=192.168.100.64/26 handle="k8s-pod-network.ccb056116d3f62ccf7f4808f114a49cc1e1e299ff9e19d43536349167594e37a" host="10.0.0.100" Oct 2 19:14:33.282741 env[1103]: 2023-10-02 19:14:33.258 [INFO][2090] ipam.go 1216: Successfully claimed IPs: [192.168.100.65/26] block=192.168.100.64/26 handle="k8s-pod-network.ccb056116d3f62ccf7f4808f114a49cc1e1e299ff9e19d43536349167594e37a" host="10.0.0.100" Oct 2 19:14:33.282741 env[1103]: 2023-10-02 19:14:33.258 [INFO][2090] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.100.65/26] handle="k8s-pod-network.ccb056116d3f62ccf7f4808f114a49cc1e1e299ff9e19d43536349167594e37a" host="10.0.0.100" Oct 2 19:14:33.282741 env[1103]: time="2023-10-02T19:14:33Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:14:33.282741 env[1103]: 2023-10-02 19:14:33.258 [INFO][2090] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.100.65/26] IPv6=[] ContainerID="ccb056116d3f62ccf7f4808f114a49cc1e1e299ff9e19d43536349167594e37a" HandleID="k8s-pod-network.ccb056116d3f62ccf7f4808f114a49cc1e1e299ff9e19d43536349167594e37a" Workload="10.0.0.100-k8s-calico--kube--controllers--69d9c784fb--6z9dr-eth0" Oct 2 19:14:33.283595 env[1103]: 2023-10-02 19:14:33.260 [INFO][2075] k8s.go 383: Populated endpoint ContainerID="ccb056116d3f62ccf7f4808f114a49cc1e1e299ff9e19d43536349167594e37a" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-6z9dr" WorkloadEndpoint="10.0.0.100-k8s-calico--kube--controllers--69d9c784fb--6z9dr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100-k8s-calico--kube--controllers--69d9c784fb--6z9dr-eth0", GenerateName:"calico-kube-controllers-69d9c784fb-", Namespace:"calico-system", SelfLink:"", UID:"11b9e623-9a6c-4a5d-9be8-3a6c37fbc391", ResourceVersion:"843", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 13, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69d9c784fb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.100", ContainerID:"", Pod:"calico-kube-controllers-69d9c784fb-6z9dr", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.100.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali863bbbc534d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:14:33.283595 env[1103]: 2023-10-02 19:14:33.260 [INFO][2075] k8s.go 384: Calico CNI using IPs: [192.168.100.65/32] ContainerID="ccb056116d3f62ccf7f4808f114a49cc1e1e299ff9e19d43536349167594e37a" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-6z9dr" WorkloadEndpoint="10.0.0.100-k8s-calico--kube--controllers--69d9c784fb--6z9dr-eth0" Oct 2 19:14:33.283595 env[1103]: 2023-10-02 19:14:33.260 [INFO][2075] dataplane_linux.go 68: Setting the host side veth name to cali863bbbc534d ContainerID="ccb056116d3f62ccf7f4808f114a49cc1e1e299ff9e19d43536349167594e37a" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-6z9dr" WorkloadEndpoint="10.0.0.100-k8s-calico--kube--controllers--69d9c784fb--6z9dr-eth0" Oct 2 19:14:33.283595 env[1103]: 2023-10-02 19:14:33.267 [INFO][2075] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="ccb056116d3f62ccf7f4808f114a49cc1e1e299ff9e19d43536349167594e37a" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-6z9dr" WorkloadEndpoint="10.0.0.100-k8s-calico--kube--controllers--69d9c784fb--6z9dr-eth0" Oct 2 19:14:33.283595 env[1103]: 2023-10-02 19:14:33.274 [INFO][2075] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="ccb056116d3f62ccf7f4808f114a49cc1e1e299ff9e19d43536349167594e37a" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-6z9dr" WorkloadEndpoint="10.0.0.100-k8s-calico--kube--controllers--69d9c784fb--6z9dr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100-k8s-calico--kube--controllers--69d9c784fb--6z9dr-eth0", GenerateName:"calico-kube-controllers-69d9c784fb-", Namespace:"calico-system", SelfLink:"", UID:"11b9e623-9a6c-4a5d-9be8-3a6c37fbc391", ResourceVersion:"843", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 13, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69d9c784fb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.100", ContainerID:"ccb056116d3f62ccf7f4808f114a49cc1e1e299ff9e19d43536349167594e37a", Pod:"calico-kube-controllers-69d9c784fb-6z9dr", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.100.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali863bbbc534d", MAC:"7e:cc:68:7b:c2:2d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:14:33.283595 env[1103]: 2023-10-02 19:14:33.280 [INFO][2075] k8s.go 489: Wrote updated endpoint to datastore ContainerID="ccb056116d3f62ccf7f4808f114a49cc1e1e299ff9e19d43536349167594e37a" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-6z9dr" WorkloadEndpoint="10.0.0.100-k8s-calico--kube--controllers--69d9c784fb--6z9dr-eth0" Oct 2 19:14:33.293915 env[1103]: time="2023-10-02T19:14:33.293842005Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:14:33.294140 env[1103]: time="2023-10-02T19:14:33.293885627Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:14:33.294140 env[1103]: time="2023-10-02T19:14:33.293896016Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:14:33.294140 env[1103]: time="2023-10-02T19:14:33.294059686Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ccb056116d3f62ccf7f4808f114a49cc1e1e299ff9e19d43536349167594e37a pid=2118 runtime=io.containerd.runc.v2 Oct 2 19:14:33.306189 systemd[1]: Started cri-containerd-ccb056116d3f62ccf7f4808f114a49cc1e1e299ff9e19d43536349167594e37a.scope. Oct 2 19:14:33.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.315000 audit: BPF prog-id=92 op=LOAD Oct 2 19:14:33.315000 audit[2128]: AVC avc: denied { bpf } for pid=2128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.315000 audit[2128]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2118 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:33.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363623035363131366433663632636366376634383038663131346134 Oct 2 19:14:33.315000 audit[2128]: AVC avc: denied { perfmon } for pid=2128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.315000 audit[2128]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2118 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:33.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363623035363131366433663632636366376634383038663131346134 Oct 2 19:14:33.315000 audit[2128]: AVC avc: denied { bpf } for pid=2128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.315000 audit[2128]: AVC avc: denied { bpf } for pid=2128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.315000 audit[2128]: AVC avc: denied { bpf } for pid=2128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.315000 audit[2128]: AVC avc: denied { perfmon } for pid=2128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.315000 audit[2128]: AVC avc: denied { perfmon } for pid=2128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.315000 audit[2128]: AVC avc: denied { perfmon } for pid=2128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.315000 audit[2128]: AVC avc: denied { perfmon } for pid=2128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.315000 audit[2128]: AVC avc: denied { perfmon } for pid=2128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.315000 audit[2128]: AVC avc: denied { bpf } for pid=2128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.315000 audit[2128]: AVC avc: denied { bpf } for pid=2128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.315000 audit: BPF prog-id=93 op=LOAD Oct 2 19:14:33.315000 audit[2128]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000094ab0 items=0 ppid=2118 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:33.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363623035363131366433663632636366376634383038663131346134 Oct 2 19:14:33.316000 audit[2128]: AVC avc: denied { bpf } for pid=2128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.316000 audit[2128]: AVC avc: denied { bpf } for pid=2128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.316000 audit[2128]: AVC avc: denied { perfmon } for pid=2128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.316000 audit[2128]: AVC avc: denied { perfmon } for pid=2128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.316000 audit[2128]: AVC avc: denied { perfmon } for pid=2128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.316000 audit[2128]: AVC avc: denied { perfmon } for pid=2128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.316000 audit[2128]: AVC avc: denied { perfmon } for pid=2128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.316000 audit[2128]: AVC avc: denied { bpf } for pid=2128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.316000 audit[2128]: AVC avc: denied { bpf } for pid=2128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.316000 audit: BPF prog-id=94 op=LOAD Oct 2 19:14:33.316000 audit[2128]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000094af8 items=0 ppid=2118 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:33.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363623035363131366433663632636366376634383038663131346134 Oct 2 19:14:33.316000 audit: BPF prog-id=94 op=UNLOAD Oct 2 19:14:33.316000 audit: BPF prog-id=93 op=UNLOAD Oct 2 19:14:33.316000 audit[2128]: AVC avc: denied { bpf } for pid=2128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.316000 audit[2128]: AVC avc: denied { bpf } for pid=2128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.316000 audit[2128]: AVC avc: denied { bpf } for pid=2128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.316000 audit[2128]: AVC avc: denied { perfmon } for pid=2128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.316000 audit[2128]: AVC avc: denied { perfmon } for pid=2128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.316000 audit[2128]: AVC avc: denied { perfmon } for pid=2128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.316000 audit[2128]: AVC avc: denied { perfmon } for pid=2128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.316000 audit[2128]: AVC avc: denied { perfmon } for pid=2128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.316000 audit[2128]: AVC avc: denied { bpf } for pid=2128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.316000 audit[2128]: AVC avc: denied { bpf } for pid=2128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:33.316000 audit: BPF prog-id=95 op=LOAD Oct 2 19:14:33.316000 audit[2128]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000094f08 items=0 ppid=2118 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:33.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363623035363131366433663632636366376634383038663131346134 Oct 2 19:14:33.318486 systemd-resolved[1052]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 2 19:14:33.341245 env[1103]: time="2023-10-02T19:14:33.341187561Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69d9c784fb-6z9dr,Uid:11b9e623-9a6c-4a5d-9be8-3a6c37fbc391,Namespace:calico-system,Attempt:0,} returns sandbox id \"ccb056116d3f62ccf7f4808f114a49cc1e1e299ff9e19d43536349167594e37a\"" Oct 2 19:14:33.342715 env[1103]: time="2023-10-02T19:14:33.342655366Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\"" Oct 2 19:14:33.361087 kubelet[1412]: E1002 19:14:33.361024 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:33.416669 kubelet[1412]: E1002 19:14:33.416520 1412 dns.go:157] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:14:33.417122 env[1103]: time="2023-10-02T19:14:33.417060146Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-565d847f94-hpt8h,Uid:3d25f9e3-c180-4ae7-a463-57a1d11ba70c,Namespace:kube-system,Attempt:0,}" Oct 2 19:14:33.438401 env[1103]: time="2023-10-02T19:14:33.438348885Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7t6zx,Uid:01427fab-57bb-45ce-83e1-41165d656dfc,Namespace:calico-system,Attempt:0,}" Oct 2 19:14:33.522000 audit[2214]: AVC avc: denied { write } for pid=2214 comm="tee" name="fd" dev="proc" ino=19194 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:14:33.527000 audit[2238]: AVC avc: denied { write } for pid=2238 comm="tee" name="fd" dev="proc" ino=19200 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:14:33.529000 audit[2223]: AVC avc: denied { write } for pid=2223 comm="tee" name="fd" dev="proc" ino=19203 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:14:33.522000 audit[2214]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff9bc2697f a2=241 a3=1b6 items=1 ppid=2185 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:33.522000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 2 19:14:33.522000 audit: PATH item=0 name="/dev/fd/63" inode=19184 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:33.522000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:14:33.527000 audit[2238]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffce8f7990 a2=241 a3=1b6 items=1 ppid=2192 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:33.527000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 2 19:14:33.527000 audit: PATH item=0 name="/dev/fd/63" inode=20395 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:33.527000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:14:33.529000 audit[2223]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe8a2fd98e a2=241 a3=1b6 items=1 ppid=2186 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:33.529000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 2 19:14:33.529000 audit: PATH item=0 name="/dev/fd/63" inode=19187 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:33.529000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:14:33.536000 audit[2267]: AVC avc: denied { write } for pid=2267 comm="tee" name="fd" dev="proc" ino=19212 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:14:33.536000 audit[2267]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc2fbdb98e a2=241 a3=1b6 items=1 ppid=2195 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:33.536000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 2 19:14:33.536000 audit: PATH item=0 name="/dev/fd/63" inode=19209 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:33.536000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:14:33.539000 audit[2248]: AVC avc: denied { write } for pid=2248 comm="tee" name="fd" dev="proc" ino=19216 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:14:33.541000 audit[2257]: AVC avc: denied { write } for pid=2257 comm="tee" name="fd" dev="proc" ino=21608 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:14:33.539000 audit[2248]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcf0a8297e a2=241 a3=1b6 items=1 ppid=2189 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:33.539000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 2 19:14:33.539000 audit: PATH item=0 name="/dev/fd/63" inode=19195 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:33.539000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:14:33.541000 audit[2257]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc8fad398e a2=241 a3=1b6 items=1 ppid=2199 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:33.541000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 2 19:14:33.541000 audit: PATH item=0 name="/dev/fd/63" inode=21599 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:33.541000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:14:33.547000 audit[2274]: AVC avc: denied { write } for pid=2274 comm="tee" name="fd" dev="proc" ino=20613 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:14:33.547000 audit[2274]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffea3a0b98f a2=241 a3=1b6 items=1 ppid=2197 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:33.547000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 2 19:14:33.547000 audit: PATH item=0 name="/dev/fd/63" inode=21605 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:33.547000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:14:33.571270 kubelet[1412]: E1002 19:14:33.571233 1412 dns.go:157] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:14:33.906636 kubelet[1412]: E1002 19:14:33.906058 1412 dns.go:157] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:14:33.910151 env[1103]: time="2023-10-02T19:14:33.910120538Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-565d847f94-9vgjj,Uid:e9558486-4c30-4157-8de7-ef6b9b541c8c,Namespace:kube-system,Attempt:0,}" Oct 2 19:14:34.111789 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0b91d78bb01: link becomes ready Oct 2 19:14:34.217741 systemd-networkd[1008]: cali0b91d78bb01: Link UP Oct 2 19:14:34.217748 systemd-networkd[1008]: cali0b91d78bb01: Gained carrier Oct 2 19:14:34.232719 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie5d11032f0f: link becomes ready Oct 2 19:14:34.240217 env[1103]: 2023-10-02 19:14:33.495 [INFO][2152] utils.go 108: File /var/lib/calico/mtu does not exist Oct 2 19:14:34.240217 env[1103]: 2023-10-02 19:14:33.521 [INFO][2152] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.100-k8s-coredns--565d847f94--hpt8h-eth0 coredns-565d847f94- kube-system 3d25f9e3-c180-4ae7-a463-57a1d11ba70c 836 0 2023-10-02 19:13:37 +0000 UTC map[k8s-app:kube-dns pod-template-hash:565d847f94 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s 10.0.0.100 coredns-565d847f94-hpt8h eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali0b91d78bb01 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="63a7c02fa116c53fb1e2bc75a47f6b536d48893b2e5c41e103f6d0e50b6a5824" Namespace="kube-system" Pod="coredns-565d847f94-hpt8h" WorkloadEndpoint="10.0.0.100-k8s-coredns--565d847f94--hpt8h-" Oct 2 19:14:34.240217 env[1103]: 2023-10-02 19:14:33.522 [INFO][2152] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="63a7c02fa116c53fb1e2bc75a47f6b536d48893b2e5c41e103f6d0e50b6a5824" Namespace="kube-system" Pod="coredns-565d847f94-hpt8h" WorkloadEndpoint="10.0.0.100-k8s-coredns--565d847f94--hpt8h-eth0" Oct 2 19:14:34.240217 env[1103]: 2023-10-02 19:14:33.587 [INFO][2254] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="63a7c02fa116c53fb1e2bc75a47f6b536d48893b2e5c41e103f6d0e50b6a5824" HandleID="k8s-pod-network.63a7c02fa116c53fb1e2bc75a47f6b536d48893b2e5c41e103f6d0e50b6a5824" Workload="10.0.0.100-k8s-coredns--565d847f94--hpt8h-eth0" Oct 2 19:14:34.240217 env[1103]: 2023-10-02 19:14:33.614 [INFO][2254] ipam_plugin.go 269: Auto assigning IP ContainerID="63a7c02fa116c53fb1e2bc75a47f6b536d48893b2e5c41e103f6d0e50b6a5824" HandleID="k8s-pod-network.63a7c02fa116c53fb1e2bc75a47f6b536d48893b2e5c41e103f6d0e50b6a5824" Workload="10.0.0.100-k8s-coredns--565d847f94--hpt8h-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004c7030), Attrs:map[string]string{"namespace":"kube-system", "node":"10.0.0.100", "pod":"coredns-565d847f94-hpt8h", "timestamp":"2023-10-02 19:14:33.581084147 +0000 UTC"}, Hostname:"10.0.0.100", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:14:34.240217 env[1103]: time="2023-10-02T19:14:33Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:14:34.240217 env[1103]: time="2023-10-02T19:14:33Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:14:34.240217 env[1103]: 2023-10-02 19:14:33.614 [INFO][2254] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.100' Oct 2 19:14:34.240217 env[1103]: 2023-10-02 19:14:33.619 [INFO][2254] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.63a7c02fa116c53fb1e2bc75a47f6b536d48893b2e5c41e103f6d0e50b6a5824" host="10.0.0.100" Oct 2 19:14:34.240217 env[1103]: 2023-10-02 19:14:33.622 [INFO][2254] ipam.go 372: Looking up existing affinities for host host="10.0.0.100" Oct 2 19:14:34.240217 env[1103]: 2023-10-02 19:14:33.628 [INFO][2254] ipam.go 489: Trying affinity for 192.168.100.64/26 host="10.0.0.100" Oct 2 19:14:34.240217 env[1103]: 2023-10-02 19:14:33.630 [INFO][2254] ipam.go 155: Attempting to load block cidr=192.168.100.64/26 host="10.0.0.100" Oct 2 19:14:34.240217 env[1103]: 2023-10-02 19:14:33.631 [INFO][2254] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.100.64/26 host="10.0.0.100" Oct 2 19:14:34.240217 env[1103]: 2023-10-02 19:14:33.631 [INFO][2254] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.100.64/26 handle="k8s-pod-network.63a7c02fa116c53fb1e2bc75a47f6b536d48893b2e5c41e103f6d0e50b6a5824" host="10.0.0.100" Oct 2 19:14:34.240217 env[1103]: 2023-10-02 19:14:33.633 [INFO][2254] ipam.go 1682: Creating new handle: k8s-pod-network.63a7c02fa116c53fb1e2bc75a47f6b536d48893b2e5c41e103f6d0e50b6a5824 Oct 2 19:14:34.240217 env[1103]: 2023-10-02 19:14:33.637 [INFO][2254] ipam.go 1203: Writing block in order to claim IPs block=192.168.100.64/26 handle="k8s-pod-network.63a7c02fa116c53fb1e2bc75a47f6b536d48893b2e5c41e103f6d0e50b6a5824" host="10.0.0.100" Oct 2 19:14:34.240217 env[1103]: 2023-10-02 19:14:33.641 [INFO][2254] ipam.go 1216: Successfully claimed IPs: [192.168.100.66/26] block=192.168.100.64/26 handle="k8s-pod-network.63a7c02fa116c53fb1e2bc75a47f6b536d48893b2e5c41e103f6d0e50b6a5824" host="10.0.0.100" Oct 2 19:14:34.240217 env[1103]: 2023-10-02 19:14:33.641 [INFO][2254] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.100.66/26] handle="k8s-pod-network.63a7c02fa116c53fb1e2bc75a47f6b536d48893b2e5c41e103f6d0e50b6a5824" host="10.0.0.100" Oct 2 19:14:34.240217 env[1103]: time="2023-10-02T19:14:33Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:14:34.240217 env[1103]: 2023-10-02 19:14:33.642 [INFO][2254] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.100.66/26] IPv6=[] ContainerID="63a7c02fa116c53fb1e2bc75a47f6b536d48893b2e5c41e103f6d0e50b6a5824" HandleID="k8s-pod-network.63a7c02fa116c53fb1e2bc75a47f6b536d48893b2e5c41e103f6d0e50b6a5824" Workload="10.0.0.100-k8s-coredns--565d847f94--hpt8h-eth0" Oct 2 19:14:34.240820 env[1103]: 2023-10-02 19:14:33.910 [INFO][2152] k8s.go 383: Populated endpoint ContainerID="63a7c02fa116c53fb1e2bc75a47f6b536d48893b2e5c41e103f6d0e50b6a5824" Namespace="kube-system" Pod="coredns-565d847f94-hpt8h" WorkloadEndpoint="10.0.0.100-k8s-coredns--565d847f94--hpt8h-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100-k8s-coredns--565d847f94--hpt8h-eth0", GenerateName:"coredns-565d847f94-", Namespace:"kube-system", SelfLink:"", UID:"3d25f9e3-c180-4ae7-a463-57a1d11ba70c", ResourceVersion:"836", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 13, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"565d847f94", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.100", ContainerID:"", Pod:"coredns-565d847f94-hpt8h", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.100.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0b91d78bb01", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:14:34.240820 env[1103]: 2023-10-02 19:14:33.910 [INFO][2152] k8s.go 384: Calico CNI using IPs: [192.168.100.66/32] ContainerID="63a7c02fa116c53fb1e2bc75a47f6b536d48893b2e5c41e103f6d0e50b6a5824" Namespace="kube-system" Pod="coredns-565d847f94-hpt8h" WorkloadEndpoint="10.0.0.100-k8s-coredns--565d847f94--hpt8h-eth0" Oct 2 19:14:34.240820 env[1103]: 2023-10-02 19:14:33.910 [INFO][2152] dataplane_linux.go 68: Setting the host side veth name to cali0b91d78bb01 ContainerID="63a7c02fa116c53fb1e2bc75a47f6b536d48893b2e5c41e103f6d0e50b6a5824" Namespace="kube-system" Pod="coredns-565d847f94-hpt8h" WorkloadEndpoint="10.0.0.100-k8s-coredns--565d847f94--hpt8h-eth0" Oct 2 19:14:34.240820 env[1103]: 2023-10-02 19:14:34.034 [INFO][2152] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="63a7c02fa116c53fb1e2bc75a47f6b536d48893b2e5c41e103f6d0e50b6a5824" Namespace="kube-system" Pod="coredns-565d847f94-hpt8h" WorkloadEndpoint="10.0.0.100-k8s-coredns--565d847f94--hpt8h-eth0" Oct 2 19:14:34.240820 env[1103]: 2023-10-02 19:14:34.222 [INFO][2152] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="63a7c02fa116c53fb1e2bc75a47f6b536d48893b2e5c41e103f6d0e50b6a5824" Namespace="kube-system" Pod="coredns-565d847f94-hpt8h" WorkloadEndpoint="10.0.0.100-k8s-coredns--565d847f94--hpt8h-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100-k8s-coredns--565d847f94--hpt8h-eth0", GenerateName:"coredns-565d847f94-", Namespace:"kube-system", SelfLink:"", UID:"3d25f9e3-c180-4ae7-a463-57a1d11ba70c", ResourceVersion:"836", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 13, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"565d847f94", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.100", ContainerID:"63a7c02fa116c53fb1e2bc75a47f6b536d48893b2e5c41e103f6d0e50b6a5824", Pod:"coredns-565d847f94-hpt8h", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.100.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0b91d78bb01", MAC:"da:b8:76:9d:52:90", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:14:34.240820 env[1103]: 2023-10-02 19:14:34.234 [INFO][2152] k8s.go 489: Wrote updated endpoint to datastore ContainerID="63a7c02fa116c53fb1e2bc75a47f6b536d48893b2e5c41e103f6d0e50b6a5824" Namespace="kube-system" Pod="coredns-565d847f94-hpt8h" WorkloadEndpoint="10.0.0.100-k8s-coredns--565d847f94--hpt8h-eth0" Oct 2 19:14:34.250826 systemd-networkd[1008]: calie5d11032f0f: Link UP Oct 2 19:14:34.250835 systemd-networkd[1008]: calie5d11032f0f: Gained carrier Oct 2 19:14:34.264239 env[1103]: 2023-10-02 19:14:33.517 [INFO][2164] utils.go 108: File /var/lib/calico/mtu does not exist Oct 2 19:14:34.264239 env[1103]: 2023-10-02 19:14:33.535 [INFO][2164] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.100-k8s-csi--node--driver--7t6zx-eth0 csi-node-driver- calico-system 01427fab-57bb-45ce-83e1-41165d656dfc 844 0 2023-10-02 19:14:32 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:fd56fb8dc k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.100 csi-node-driver-7t6zx eth0 default [] [] [kns.calico-system ksa.calico-system.default] calie5d11032f0f [] []}} ContainerID="01b1d29fe1850f0f421ce114d3d292eecc53894ca79ac0d2da0c4de5713d2a7a" Namespace="calico-system" Pod="csi-node-driver-7t6zx" WorkloadEndpoint="10.0.0.100-k8s-csi--node--driver--7t6zx-" Oct 2 19:14:34.264239 env[1103]: 2023-10-02 19:14:33.535 [INFO][2164] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="01b1d29fe1850f0f421ce114d3d292eecc53894ca79ac0d2da0c4de5713d2a7a" Namespace="calico-system" Pod="csi-node-driver-7t6zx" WorkloadEndpoint="10.0.0.100-k8s-csi--node--driver--7t6zx-eth0" Oct 2 19:14:34.264239 env[1103]: 2023-10-02 19:14:33.610 [INFO][2275] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="01b1d29fe1850f0f421ce114d3d292eecc53894ca79ac0d2da0c4de5713d2a7a" HandleID="k8s-pod-network.01b1d29fe1850f0f421ce114d3d292eecc53894ca79ac0d2da0c4de5713d2a7a" Workload="10.0.0.100-k8s-csi--node--driver--7t6zx-eth0" Oct 2 19:14:34.264239 env[1103]: 2023-10-02 19:14:33.627 [INFO][2275] ipam_plugin.go 269: Auto assigning IP ContainerID="01b1d29fe1850f0f421ce114d3d292eecc53894ca79ac0d2da0c4de5713d2a7a" HandleID="k8s-pod-network.01b1d29fe1850f0f421ce114d3d292eecc53894ca79ac0d2da0c4de5713d2a7a" Workload="10.0.0.100-k8s-csi--node--driver--7t6zx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000401610), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.100", "pod":"csi-node-driver-7t6zx", "timestamp":"2023-10-02 19:14:33.610812316 +0000 UTC"}, Hostname:"10.0.0.100", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:14:34.264239 env[1103]: time="2023-10-02T19:14:33Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:14:34.264239 env[1103]: time="2023-10-02T19:14:33Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:14:34.264239 env[1103]: 2023-10-02 19:14:33.642 [INFO][2275] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.100' Oct 2 19:14:34.264239 env[1103]: 2023-10-02 19:14:33.644 [INFO][2275] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.01b1d29fe1850f0f421ce114d3d292eecc53894ca79ac0d2da0c4de5713d2a7a" host="10.0.0.100" Oct 2 19:14:34.264239 env[1103]: 2023-10-02 19:14:33.648 [INFO][2275] ipam.go 372: Looking up existing affinities for host host="10.0.0.100" Oct 2 19:14:34.264239 env[1103]: 2023-10-02 19:14:33.921 [INFO][2275] ipam.go 489: Trying affinity for 192.168.100.64/26 host="10.0.0.100" Oct 2 19:14:34.264239 env[1103]: 2023-10-02 19:14:33.924 [INFO][2275] ipam.go 155: Attempting to load block cidr=192.168.100.64/26 host="10.0.0.100" Oct 2 19:14:34.264239 env[1103]: 2023-10-02 19:14:34.214 [INFO][2275] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.100.64/26 host="10.0.0.100" Oct 2 19:14:34.264239 env[1103]: 2023-10-02 19:14:34.214 [INFO][2275] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.100.64/26 handle="k8s-pod-network.01b1d29fe1850f0f421ce114d3d292eecc53894ca79ac0d2da0c4de5713d2a7a" host="10.0.0.100" Oct 2 19:14:34.264239 env[1103]: 2023-10-02 19:14:34.219 [INFO][2275] ipam.go 1682: Creating new handle: k8s-pod-network.01b1d29fe1850f0f421ce114d3d292eecc53894ca79ac0d2da0c4de5713d2a7a Oct 2 19:14:34.264239 env[1103]: 2023-10-02 19:14:34.223 [INFO][2275] ipam.go 1203: Writing block in order to claim IPs block=192.168.100.64/26 handle="k8s-pod-network.01b1d29fe1850f0f421ce114d3d292eecc53894ca79ac0d2da0c4de5713d2a7a" host="10.0.0.100" Oct 2 19:14:34.264239 env[1103]: 2023-10-02 19:14:34.228 [INFO][2275] ipam.go 1216: Successfully claimed IPs: [192.168.100.67/26] block=192.168.100.64/26 handle="k8s-pod-network.01b1d29fe1850f0f421ce114d3d292eecc53894ca79ac0d2da0c4de5713d2a7a" host="10.0.0.100" Oct 2 19:14:34.264239 env[1103]: 2023-10-02 19:14:34.228 [INFO][2275] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.100.67/26] handle="k8s-pod-network.01b1d29fe1850f0f421ce114d3d292eecc53894ca79ac0d2da0c4de5713d2a7a" host="10.0.0.100" Oct 2 19:14:34.264239 env[1103]: time="2023-10-02T19:14:34Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:14:34.264239 env[1103]: 2023-10-02 19:14:34.228 [INFO][2275] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.100.67/26] IPv6=[] ContainerID="01b1d29fe1850f0f421ce114d3d292eecc53894ca79ac0d2da0c4de5713d2a7a" HandleID="k8s-pod-network.01b1d29fe1850f0f421ce114d3d292eecc53894ca79ac0d2da0c4de5713d2a7a" Workload="10.0.0.100-k8s-csi--node--driver--7t6zx-eth0" Oct 2 19:14:34.264830 env[1103]: 2023-10-02 19:14:34.229 [INFO][2164] k8s.go 383: Populated endpoint ContainerID="01b1d29fe1850f0f421ce114d3d292eecc53894ca79ac0d2da0c4de5713d2a7a" Namespace="calico-system" Pod="csi-node-driver-7t6zx" WorkloadEndpoint="10.0.0.100-k8s-csi--node--driver--7t6zx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100-k8s-csi--node--driver--7t6zx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"01427fab-57bb-45ce-83e1-41165d656dfc", ResourceVersion:"844", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 14, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"fd56fb8dc", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.100", ContainerID:"", Pod:"csi-node-driver-7t6zx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.100.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calie5d11032f0f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:14:34.264830 env[1103]: 2023-10-02 19:14:34.230 [INFO][2164] k8s.go 384: Calico CNI using IPs: [192.168.100.67/32] ContainerID="01b1d29fe1850f0f421ce114d3d292eecc53894ca79ac0d2da0c4de5713d2a7a" Namespace="calico-system" Pod="csi-node-driver-7t6zx" WorkloadEndpoint="10.0.0.100-k8s-csi--node--driver--7t6zx-eth0" Oct 2 19:14:34.264830 env[1103]: 2023-10-02 19:14:34.230 [INFO][2164] dataplane_linux.go 68: Setting the host side veth name to calie5d11032f0f ContainerID="01b1d29fe1850f0f421ce114d3d292eecc53894ca79ac0d2da0c4de5713d2a7a" Namespace="calico-system" Pod="csi-node-driver-7t6zx" WorkloadEndpoint="10.0.0.100-k8s-csi--node--driver--7t6zx-eth0" Oct 2 19:14:34.264830 env[1103]: 2023-10-02 19:14:34.237 [INFO][2164] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="01b1d29fe1850f0f421ce114d3d292eecc53894ca79ac0d2da0c4de5713d2a7a" Namespace="calico-system" Pod="csi-node-driver-7t6zx" WorkloadEndpoint="10.0.0.100-k8s-csi--node--driver--7t6zx-eth0" Oct 2 19:14:34.264830 env[1103]: 2023-10-02 19:14:34.252 [INFO][2164] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="01b1d29fe1850f0f421ce114d3d292eecc53894ca79ac0d2da0c4de5713d2a7a" Namespace="calico-system" Pod="csi-node-driver-7t6zx" WorkloadEndpoint="10.0.0.100-k8s-csi--node--driver--7t6zx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100-k8s-csi--node--driver--7t6zx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"01427fab-57bb-45ce-83e1-41165d656dfc", ResourceVersion:"844", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 14, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"fd56fb8dc", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.100", ContainerID:"01b1d29fe1850f0f421ce114d3d292eecc53894ca79ac0d2da0c4de5713d2a7a", Pod:"csi-node-driver-7t6zx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.100.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calie5d11032f0f", MAC:"66:10:2e:fa:3c:d6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:14:34.264830 env[1103]: 2023-10-02 19:14:34.263 [INFO][2164] k8s.go 489: Wrote updated endpoint to datastore ContainerID="01b1d29fe1850f0f421ce114d3d292eecc53894ca79ac0d2da0c4de5713d2a7a" Namespace="calico-system" Pod="csi-node-driver-7t6zx" WorkloadEndpoint="10.0.0.100-k8s-csi--node--driver--7t6zx-eth0" Oct 2 19:14:34.273067 env[1103]: time="2023-10-02T19:14:34.272839505Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:14:34.273067 env[1103]: time="2023-10-02T19:14:34.272890070Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:14:34.273067 env[1103]: time="2023-10-02T19:14:34.272903656Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:14:34.273258 env[1103]: time="2023-10-02T19:14:34.273108052Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/63a7c02fa116c53fb1e2bc75a47f6b536d48893b2e5c41e103f6d0e50b6a5824 pid=2386 runtime=io.containerd.runc.v2 Oct 2 19:14:34.281782 kernel: Initializing XFRM netlink socket Oct 2 19:14:34.286428 env[1103]: time="2023-10-02T19:14:34.286330414Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:14:34.286428 env[1103]: time="2023-10-02T19:14:34.286382363Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:14:34.286428 env[1103]: time="2023-10-02T19:14:34.286397110Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:14:34.288173 env[1103]: time="2023-10-02T19:14:34.287727776Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/01b1d29fe1850f0f421ce114d3d292eecc53894ca79ac0d2da0c4de5713d2a7a pid=2402 runtime=io.containerd.runc.v2 Oct 2 19:14:34.370060 systemd[1]: Started cri-containerd-63a7c02fa116c53fb1e2bc75a47f6b536d48893b2e5c41e103f6d0e50b6a5824.scope. Oct 2 19:14:34.370864 kubelet[1412]: E1002 19:14:34.370340 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:34.378802 systemd[1]: Started cri-containerd-01b1d29fe1850f0f421ce114d3d292eecc53894ca79ac0d2da0c4de5713d2a7a.scope. Oct 2 19:14:34.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.388000 audit: BPF prog-id=96 op=LOAD Oct 2 19:14:34.389000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.389000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2386 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:34.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633613763303266613131366335336662316532626337356134376636 Oct 2 19:14:34.389000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.389000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2386 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:34.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633613763303266613131366335336662316532626337356134376636 Oct 2 19:14:34.389000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.389000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.389000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.389000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.389000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.389000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.389000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.389000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.389000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.389000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.389000 audit: BPF prog-id=97 op=LOAD Oct 2 19:14:34.389000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000098350 items=0 ppid=2386 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:34.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633613763303266613131366335336662316532626337356134376636 Oct 2 19:14:34.389000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.389000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.389000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.389000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.389000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.389000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.389000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.389000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.389000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.389000 audit: BPF prog-id=98 op=LOAD Oct 2 19:14:34.389000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000098398 items=0 ppid=2386 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:34.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633613763303266613131366335336662316532626337356134376636 Oct 2 19:14:34.389000 audit: BPF prog-id=98 op=UNLOAD Oct 2 19:14:34.389000 audit: BPF prog-id=97 op=UNLOAD Oct 2 19:14:34.389000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.389000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.389000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.389000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.389000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.389000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.389000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.389000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.389000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.389000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.389000 audit: BPF prog-id=99 op=LOAD Oct 2 19:14:34.389000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000987a8 items=0 ppid=2386 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:34.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633613763303266613131366335336662316532626337356134376636 Oct 2 19:14:34.392088 systemd-resolved[1052]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 2 19:14:34.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.405000 audit: BPF prog-id=100 op=LOAD Oct 2 19:14:34.407000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.407000 audit[2422]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2402 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:34.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031623164323966653138353066306634323163653131346433643239 Oct 2 19:14:34.408000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.408000 audit[2422]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2402 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:34.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031623164323966653138353066306634323163653131346433643239 Oct 2 19:14:34.408000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.408000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.408000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.408000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.408000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.408000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.408000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.408000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.408000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.408000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.408000 audit: BPF prog-id=101 op=LOAD Oct 2 19:14:34.408000 audit[2422]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003ac1c0 items=0 ppid=2402 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:34.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031623164323966653138353066306634323163653131346433643239 Oct 2 19:14:34.409000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.409000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.409000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.409000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.409000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.409000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.409000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.409000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.409000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.409000 audit: BPF prog-id=102 op=LOAD Oct 2 19:14:34.409000 audit[2422]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003ac208 items=0 ppid=2402 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:34.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031623164323966653138353066306634323163653131346433643239 Oct 2 19:14:34.410000 audit: BPF prog-id=102 op=UNLOAD Oct 2 19:14:34.410000 audit: BPF prog-id=101 op=UNLOAD Oct 2 19:14:34.411000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.411000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.411000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.411000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.411000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.411000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.411000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.411000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.411000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.411000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.411000 audit: BPF prog-id=103 op=LOAD Oct 2 19:14:34.411000 audit[2422]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ac618 items=0 ppid=2402 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:34.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031623164323966653138353066306634323163653131346433643239 Oct 2 19:14:34.414451 systemd-resolved[1052]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 2 19:14:34.433789 env[1103]: time="2023-10-02T19:14:34.433721749Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-565d847f94-hpt8h,Uid:3d25f9e3-c180-4ae7-a463-57a1d11ba70c,Namespace:kube-system,Attempt:0,} returns sandbox id \"63a7c02fa116c53fb1e2bc75a47f6b536d48893b2e5c41e103f6d0e50b6a5824\"" Oct 2 19:14:34.436167 env[1103]: time="2023-10-02T19:14:34.435234649Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7t6zx,Uid:01427fab-57bb-45ce-83e1-41165d656dfc,Namespace:calico-system,Attempt:0,} returns sandbox id \"01b1d29fe1850f0f421ce114d3d292eecc53894ca79ac0d2da0c4de5713d2a7a\"" Oct 2 19:14:34.436238 kubelet[1412]: E1002 19:14:34.435561 1412 dns.go:157] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:14:34.446730 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib57a5c1ddf5: link becomes ready Oct 2 19:14:34.462179 systemd-networkd[1008]: calib57a5c1ddf5: Link UP Oct 2 19:14:34.462186 systemd-networkd[1008]: calib57a5c1ddf5: Gained carrier Oct 2 19:14:34.473345 env[1103]: 2023-10-02 19:14:34.273 [INFO][2337] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.100-k8s-coredns--565d847f94--9vgjj-eth0 coredns-565d847f94- kube-system e9558486-4c30-4157-8de7-ef6b9b541c8c 842 0 2023-10-02 19:13:37 +0000 UTC map[k8s-app:kube-dns pod-template-hash:565d847f94 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s 10.0.0.100 coredns-565d847f94-9vgjj eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calib57a5c1ddf5 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="738e4d2238659a4e32ba57e6cadf2752a6a151762804d9a86099061564f8de8b" Namespace="kube-system" Pod="coredns-565d847f94-9vgjj" WorkloadEndpoint="10.0.0.100-k8s-coredns--565d847f94--9vgjj-" Oct 2 19:14:34.473345 env[1103]: 2023-10-02 19:14:34.273 [INFO][2337] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="738e4d2238659a4e32ba57e6cadf2752a6a151762804d9a86099061564f8de8b" Namespace="kube-system" Pod="coredns-565d847f94-9vgjj" WorkloadEndpoint="10.0.0.100-k8s-coredns--565d847f94--9vgjj-eth0" Oct 2 19:14:34.473345 env[1103]: 2023-10-02 19:14:34.390 [INFO][2417] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="738e4d2238659a4e32ba57e6cadf2752a6a151762804d9a86099061564f8de8b" HandleID="k8s-pod-network.738e4d2238659a4e32ba57e6cadf2752a6a151762804d9a86099061564f8de8b" Workload="10.0.0.100-k8s-coredns--565d847f94--9vgjj-eth0" Oct 2 19:14:34.473345 env[1103]: 2023-10-02 19:14:34.400 [INFO][2417] ipam_plugin.go 269: Auto assigning IP ContainerID="738e4d2238659a4e32ba57e6cadf2752a6a151762804d9a86099061564f8de8b" HandleID="k8s-pod-network.738e4d2238659a4e32ba57e6cadf2752a6a151762804d9a86099061564f8de8b" Workload="10.0.0.100-k8s-coredns--565d847f94--9vgjj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00018f080), Attrs:map[string]string{"namespace":"kube-system", "node":"10.0.0.100", "pod":"coredns-565d847f94-9vgjj", "timestamp":"2023-10-02 19:14:34.390795752 +0000 UTC"}, Hostname:"10.0.0.100", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:14:34.473345 env[1103]: time="2023-10-02T19:14:34Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:14:34.473345 env[1103]: time="2023-10-02T19:14:34Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:14:34.473345 env[1103]: 2023-10-02 19:14:34.400 [INFO][2417] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.100' Oct 2 19:14:34.473345 env[1103]: 2023-10-02 19:14:34.403 [INFO][2417] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.738e4d2238659a4e32ba57e6cadf2752a6a151762804d9a86099061564f8de8b" host="10.0.0.100" Oct 2 19:14:34.473345 env[1103]: 2023-10-02 19:14:34.420 [INFO][2417] ipam.go 372: Looking up existing affinities for host host="10.0.0.100" Oct 2 19:14:34.473345 env[1103]: 2023-10-02 19:14:34.428 [INFO][2417] ipam.go 489: Trying affinity for 192.168.100.64/26 host="10.0.0.100" Oct 2 19:14:34.473345 env[1103]: 2023-10-02 19:14:34.431 [INFO][2417] ipam.go 155: Attempting to load block cidr=192.168.100.64/26 host="10.0.0.100" Oct 2 19:14:34.473345 env[1103]: 2023-10-02 19:14:34.434 [INFO][2417] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.100.64/26 host="10.0.0.100" Oct 2 19:14:34.473345 env[1103]: 2023-10-02 19:14:34.434 [INFO][2417] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.100.64/26 handle="k8s-pod-network.738e4d2238659a4e32ba57e6cadf2752a6a151762804d9a86099061564f8de8b" host="10.0.0.100" Oct 2 19:14:34.473345 env[1103]: 2023-10-02 19:14:34.436 [INFO][2417] ipam.go 1682: Creating new handle: k8s-pod-network.738e4d2238659a4e32ba57e6cadf2752a6a151762804d9a86099061564f8de8b Oct 2 19:14:34.473345 env[1103]: 2023-10-02 19:14:34.439 [INFO][2417] ipam.go 1203: Writing block in order to claim IPs block=192.168.100.64/26 handle="k8s-pod-network.738e4d2238659a4e32ba57e6cadf2752a6a151762804d9a86099061564f8de8b" host="10.0.0.100" Oct 2 19:14:34.473345 env[1103]: 2023-10-02 19:14:34.443 [INFO][2417] ipam.go 1216: Successfully claimed IPs: [192.168.100.68/26] block=192.168.100.64/26 handle="k8s-pod-network.738e4d2238659a4e32ba57e6cadf2752a6a151762804d9a86099061564f8de8b" host="10.0.0.100" Oct 2 19:14:34.473345 env[1103]: 2023-10-02 19:14:34.443 [INFO][2417] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.100.68/26] handle="k8s-pod-network.738e4d2238659a4e32ba57e6cadf2752a6a151762804d9a86099061564f8de8b" host="10.0.0.100" Oct 2 19:14:34.473345 env[1103]: time="2023-10-02T19:14:34Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:14:34.473345 env[1103]: 2023-10-02 19:14:34.443 [INFO][2417] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.100.68/26] IPv6=[] ContainerID="738e4d2238659a4e32ba57e6cadf2752a6a151762804d9a86099061564f8de8b" HandleID="k8s-pod-network.738e4d2238659a4e32ba57e6cadf2752a6a151762804d9a86099061564f8de8b" Workload="10.0.0.100-k8s-coredns--565d847f94--9vgjj-eth0" Oct 2 19:14:34.474060 env[1103]: 2023-10-02 19:14:34.444 [INFO][2337] k8s.go 383: Populated endpoint ContainerID="738e4d2238659a4e32ba57e6cadf2752a6a151762804d9a86099061564f8de8b" Namespace="kube-system" Pod="coredns-565d847f94-9vgjj" WorkloadEndpoint="10.0.0.100-k8s-coredns--565d847f94--9vgjj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100-k8s-coredns--565d847f94--9vgjj-eth0", GenerateName:"coredns-565d847f94-", Namespace:"kube-system", SelfLink:"", UID:"e9558486-4c30-4157-8de7-ef6b9b541c8c", ResourceVersion:"842", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 13, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"565d847f94", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.100", ContainerID:"", Pod:"coredns-565d847f94-9vgjj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.100.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib57a5c1ddf5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:14:34.474060 env[1103]: 2023-10-02 19:14:34.445 [INFO][2337] k8s.go 384: Calico CNI using IPs: [192.168.100.68/32] ContainerID="738e4d2238659a4e32ba57e6cadf2752a6a151762804d9a86099061564f8de8b" Namespace="kube-system" Pod="coredns-565d847f94-9vgjj" WorkloadEndpoint="10.0.0.100-k8s-coredns--565d847f94--9vgjj-eth0" Oct 2 19:14:34.474060 env[1103]: 2023-10-02 19:14:34.445 [INFO][2337] dataplane_linux.go 68: Setting the host side veth name to calib57a5c1ddf5 ContainerID="738e4d2238659a4e32ba57e6cadf2752a6a151762804d9a86099061564f8de8b" Namespace="kube-system" Pod="coredns-565d847f94-9vgjj" WorkloadEndpoint="10.0.0.100-k8s-coredns--565d847f94--9vgjj-eth0" Oct 2 19:14:34.474060 env[1103]: 2023-10-02 19:14:34.446 [INFO][2337] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="738e4d2238659a4e32ba57e6cadf2752a6a151762804d9a86099061564f8de8b" Namespace="kube-system" Pod="coredns-565d847f94-9vgjj" WorkloadEndpoint="10.0.0.100-k8s-coredns--565d847f94--9vgjj-eth0" Oct 2 19:14:34.474060 env[1103]: 2023-10-02 19:14:34.463 [INFO][2337] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="738e4d2238659a4e32ba57e6cadf2752a6a151762804d9a86099061564f8de8b" Namespace="kube-system" Pod="coredns-565d847f94-9vgjj" WorkloadEndpoint="10.0.0.100-k8s-coredns--565d847f94--9vgjj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100-k8s-coredns--565d847f94--9vgjj-eth0", GenerateName:"coredns-565d847f94-", Namespace:"kube-system", SelfLink:"", UID:"e9558486-4c30-4157-8de7-ef6b9b541c8c", ResourceVersion:"842", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 13, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"565d847f94", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.100", ContainerID:"738e4d2238659a4e32ba57e6cadf2752a6a151762804d9a86099061564f8de8b", Pod:"coredns-565d847f94-9vgjj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.100.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib57a5c1ddf5", MAC:"e6:3b:28:99:9e:2f", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:14:34.474060 env[1103]: 2023-10-02 19:14:34.469 [INFO][2337] k8s.go 489: Wrote updated endpoint to datastore ContainerID="738e4d2238659a4e32ba57e6cadf2752a6a151762804d9a86099061564f8de8b" Namespace="kube-system" Pod="coredns-565d847f94-9vgjj" WorkloadEndpoint="10.0.0.100-k8s-coredns--565d847f94--9vgjj-eth0" Oct 2 19:14:34.484000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.484000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.484000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.484000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.484000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.484000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.484000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.484000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.484000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.484000 audit: BPF prog-id=104 op=LOAD Oct 2 19:14:34.484000 audit[2523]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc5eb8fca0 a2=70 a3=7fda7b7c2000 items=0 ppid=2188 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:34.484000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:14:34.484000 audit: BPF prog-id=104 op=UNLOAD Oct 2 19:14:34.484000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.484000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.484000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.484000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.484000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.484000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.484000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.484000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.484000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.484000 audit: BPF prog-id=105 op=LOAD Oct 2 19:14:34.484000 audit[2523]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc5eb8fca0 a2=70 a3=6e items=0 ppid=2188 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:34.484000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:14:34.484000 audit: BPF prog-id=105 op=UNLOAD Oct 2 19:14:34.484000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.484000 audit[2523]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc5eb8fc50 a2=70 a3=7ffc5eb8fca0 items=0 ppid=2188 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:34.484000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:14:34.484000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.484000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.484000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.484000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.484000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.484000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.484000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.484000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.484000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.484000 audit: BPF prog-id=106 op=LOAD Oct 2 19:14:34.484000 audit[2523]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffc5eb8fc30 a2=70 a3=7ffc5eb8fca0 items=0 ppid=2188 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:34.484000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:14:34.485000 audit: BPF prog-id=106 op=UNLOAD Oct 2 19:14:34.485000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.485000 audit[2523]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc5eb8fd10 a2=70 a3=0 items=0 ppid=2188 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:34.485000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:14:34.485000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.485000 audit[2523]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc5eb8fd00 a2=70 a3=0 items=0 ppid=2188 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:34.485000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:14:34.485000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.485000 audit[2523]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffc5eb8fd40 a2=70 a3=0 items=0 ppid=2188 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:34.485000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:14:34.485000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.485000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.485000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.485000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.485000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.485000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.485000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.485000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.485000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.485000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.485000 audit: BPF prog-id=107 op=LOAD Oct 2 19:14:34.485000 audit[2523]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffc5eb8fc60 a2=70 a3=ffffffff items=0 ppid=2188 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:34.485000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:14:34.491737 env[1103]: time="2023-10-02T19:14:34.491316132Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:14:34.491737 env[1103]: time="2023-10-02T19:14:34.491368090Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:14:34.491737 env[1103]: time="2023-10-02T19:14:34.491385033Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:14:34.491737 env[1103]: time="2023-10-02T19:14:34.491620527Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/738e4d2238659a4e32ba57e6cadf2752a6a151762804d9a86099061564f8de8b pid=2526 runtime=io.containerd.runc.v2 Oct 2 19:14:34.496000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.496000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcaa25df40 a2=70 a3=208 items=0 ppid=2188 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:34.496000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:14:34.496000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.496000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcaa25de10 a2=70 a3=3 items=0 ppid=2188 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:34.496000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:14:34.506000 audit: BPF prog-id=107 op=UNLOAD Oct 2 19:14:34.511856 systemd[1]: Started cri-containerd-738e4d2238659a4e32ba57e6cadf2752a6a151762804d9a86099061564f8de8b.scope. Oct 2 19:14:34.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.521000 audit: BPF prog-id=108 op=LOAD Oct 2 19:14:34.522000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.522000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2526 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:34.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733386534643232333836353961346533326261353765366361646632 Oct 2 19:14:34.522000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.522000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2526 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:34.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733386534643232333836353961346533326261353765366361646632 Oct 2 19:14:34.522000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.522000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.522000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.522000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.522000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.522000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.522000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.522000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.522000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.522000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.522000 audit: BPF prog-id=109 op=LOAD Oct 2 19:14:34.522000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000299640 items=0 ppid=2526 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:34.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733386534643232333836353961346533326261353765366361646632 Oct 2 19:14:34.522000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.522000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.522000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.522000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.522000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.522000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.522000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.522000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.522000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.522000 audit: BPF prog-id=110 op=LOAD Oct 2 19:14:34.522000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000299688 items=0 ppid=2526 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:34.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733386534643232333836353961346533326261353765366361646632 Oct 2 19:14:34.523000 audit: BPF prog-id=110 op=UNLOAD Oct 2 19:14:34.523000 audit: BPF prog-id=109 op=UNLOAD Oct 2 19:14:34.523000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.523000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.523000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.523000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.523000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.523000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.523000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.523000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.523000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.523000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:34.523000 audit: BPF prog-id=111 op=LOAD Oct 2 19:14:34.523000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000299a98 items=0 ppid=2526 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:34.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733386534643232333836353961346533326261353765366361646632 Oct 2 19:14:34.525716 systemd-resolved[1052]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 2 19:14:34.550334 env[1103]: time="2023-10-02T19:14:34.550273922Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-565d847f94-9vgjj,Uid:e9558486-4c30-4157-8de7-ef6b9b541c8c,Namespace:kube-system,Attempt:0,} returns sandbox id \"738e4d2238659a4e32ba57e6cadf2752a6a151762804d9a86099061564f8de8b\"" Oct 2 19:14:34.550931 kubelet[1412]: E1002 19:14:34.550907 1412 dns.go:157] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:14:34.563455 kubelet[1412]: I1002 19:14:34.563007 1412 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:14:34.564922 systemd-networkd[1008]: cali863bbbc534d: Gained IPv6LL Oct 2 19:14:34.567832 systemd[1]: Created slice kubepods-besteffort-pod9fffbbd9_1613_4820_8ebe_0d53d6c66e5a.slice. Oct 2 19:14:34.581000 audit[2592]: NETFILTER_CFG table=nat:79 family=2 entries=16 op=nft_register_chain pid=2592 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:14:34.581000 audit[2592]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffca929dbe0 a2=0 a3=7ffca929dbcc items=0 ppid=2188 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:34.581000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:14:34.581000 audit[2596]: NETFILTER_CFG table=mangle:80 family=2 entries=19 op=nft_register_chain pid=2596 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:14:34.581000 audit[2596]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffe08f41920 a2=0 a3=556dfaecd000 items=0 ppid=2188 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:34.581000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:14:34.584000 audit[2595]: NETFILTER_CFG table=raw:81 family=2 entries=19 op=nft_register_chain pid=2595 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:14:34.584000 audit[2595]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7fff143c0610 a2=0 a3=5607ad32d000 items=0 ppid=2188 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:34.584000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:14:34.586000 audit[2593]: NETFILTER_CFG table=filter:82 family=2 entries=129 op=nft_register_chain pid=2593 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:14:34.586000 audit[2593]: SYSCALL arch=c000003e syscall=46 success=yes exit=70188 a0=3 a1=7ffe0ce42980 a2=0 a3=558d58f81000 items=0 ppid=2188 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:34.586000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:14:34.601000 audit[2603]: NETFILTER_CFG table=filter:83 family=2 entries=38 op=nft_register_chain pid=2603 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:14:34.601000 audit[2603]: SYSCALL arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7ffde69a4280 a2=0 a3=7ffde69a426c items=0 ppid=2188 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:34.601000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:14:34.632666 kubelet[1412]: I1002 19:14:34.632586 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ffgrz\" (UniqueName: \"kubernetes.io/projected/9fffbbd9-1613-4820-8ebe-0d53d6c66e5a-kube-api-access-ffgrz\") pod \"nginx-deployment-5bbcdd876f-rvw8s\" (UID: \"9fffbbd9-1613-4820-8ebe-0d53d6c66e5a\") " pod="default/nginx-deployment-5bbcdd876f-rvw8s" Oct 2 19:14:34.870830 env[1103]: time="2023-10-02T19:14:34.870733614Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-5bbcdd876f-rvw8s,Uid:9fffbbd9-1613-4820-8ebe-0d53d6c66e5a,Namespace:default,Attempt:0,}" Oct 2 19:14:34.981730 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali923ba3430ae: link becomes ready Oct 2 19:14:34.991614 systemd-networkd[1008]: cali923ba3430ae: Link UP Oct 2 19:14:34.991620 systemd-networkd[1008]: cali923ba3430ae: Gained carrier Oct 2 19:14:34.998642 env[1103]: 2023-10-02 19:14:34.918 [INFO][2606] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.100-k8s-nginx--deployment--5bbcdd876f--rvw8s-eth0 nginx-deployment-5bbcdd876f- default 9fffbbd9-1613-4820-8ebe-0d53d6c66e5a 881 0 2023-10-02 19:14:34 +0000 UTC map[app:nginx pod-template-hash:5bbcdd876f projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.100 nginx-deployment-5bbcdd876f-rvw8s eth0 default [] [] [kns.default ksa.default.default] cali923ba3430ae [] []}} ContainerID="7d13e92c80146dac4050b9eb1b320ccae2602e3cde957036dee159a797ab0298" Namespace="default" Pod="nginx-deployment-5bbcdd876f-rvw8s" WorkloadEndpoint="10.0.0.100-k8s-nginx--deployment--5bbcdd876f--rvw8s-" Oct 2 19:14:34.998642 env[1103]: 2023-10-02 19:14:34.918 [INFO][2606] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="7d13e92c80146dac4050b9eb1b320ccae2602e3cde957036dee159a797ab0298" Namespace="default" Pod="nginx-deployment-5bbcdd876f-rvw8s" WorkloadEndpoint="10.0.0.100-k8s-nginx--deployment--5bbcdd876f--rvw8s-eth0" Oct 2 19:14:34.998642 env[1103]: 2023-10-02 19:14:34.944 [INFO][2619] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7d13e92c80146dac4050b9eb1b320ccae2602e3cde957036dee159a797ab0298" HandleID="k8s-pod-network.7d13e92c80146dac4050b9eb1b320ccae2602e3cde957036dee159a797ab0298" Workload="10.0.0.100-k8s-nginx--deployment--5bbcdd876f--rvw8s-eth0" Oct 2 19:14:34.998642 env[1103]: 2023-10-02 19:14:34.954 [INFO][2619] ipam_plugin.go 269: Auto assigning IP ContainerID="7d13e92c80146dac4050b9eb1b320ccae2602e3cde957036dee159a797ab0298" HandleID="k8s-pod-network.7d13e92c80146dac4050b9eb1b320ccae2602e3cde957036dee159a797ab0298" Workload="10.0.0.100-k8s-nginx--deployment--5bbcdd876f--rvw8s-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003f3840), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.100", "pod":"nginx-deployment-5bbcdd876f-rvw8s", "timestamp":"2023-10-02 19:14:34.944832723 +0000 UTC"}, Hostname:"10.0.0.100", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:14:34.998642 env[1103]: time="2023-10-02T19:14:34Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:14:34.998642 env[1103]: time="2023-10-02T19:14:34Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:14:34.998642 env[1103]: 2023-10-02 19:14:34.954 [INFO][2619] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.100' Oct 2 19:14:34.998642 env[1103]: 2023-10-02 19:14:34.956 [INFO][2619] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7d13e92c80146dac4050b9eb1b320ccae2602e3cde957036dee159a797ab0298" host="10.0.0.100" Oct 2 19:14:34.998642 env[1103]: 2023-10-02 19:14:34.959 [INFO][2619] ipam.go 372: Looking up existing affinities for host host="10.0.0.100" Oct 2 19:14:34.998642 env[1103]: 2023-10-02 19:14:34.963 [INFO][2619] ipam.go 489: Trying affinity for 192.168.100.64/26 host="10.0.0.100" Oct 2 19:14:34.998642 env[1103]: 2023-10-02 19:14:34.965 [INFO][2619] ipam.go 155: Attempting to load block cidr=192.168.100.64/26 host="10.0.0.100" Oct 2 19:14:34.998642 env[1103]: 2023-10-02 19:14:34.967 [INFO][2619] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.100.64/26 host="10.0.0.100" Oct 2 19:14:34.998642 env[1103]: 2023-10-02 19:14:34.967 [INFO][2619] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.100.64/26 handle="k8s-pod-network.7d13e92c80146dac4050b9eb1b320ccae2602e3cde957036dee159a797ab0298" host="10.0.0.100" Oct 2 19:14:34.998642 env[1103]: 2023-10-02 19:14:34.969 [INFO][2619] ipam.go 1682: Creating new handle: k8s-pod-network.7d13e92c80146dac4050b9eb1b320ccae2602e3cde957036dee159a797ab0298 Oct 2 19:14:34.998642 env[1103]: 2023-10-02 19:14:34.972 [INFO][2619] ipam.go 1203: Writing block in order to claim IPs block=192.168.100.64/26 handle="k8s-pod-network.7d13e92c80146dac4050b9eb1b320ccae2602e3cde957036dee159a797ab0298" host="10.0.0.100" Oct 2 19:14:34.998642 env[1103]: 2023-10-02 19:14:34.977 [INFO][2619] ipam.go 1216: Successfully claimed IPs: [192.168.100.69/26] block=192.168.100.64/26 handle="k8s-pod-network.7d13e92c80146dac4050b9eb1b320ccae2602e3cde957036dee159a797ab0298" host="10.0.0.100" Oct 2 19:14:34.998642 env[1103]: 2023-10-02 19:14:34.977 [INFO][2619] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.100.69/26] handle="k8s-pod-network.7d13e92c80146dac4050b9eb1b320ccae2602e3cde957036dee159a797ab0298" host="10.0.0.100" Oct 2 19:14:34.998642 env[1103]: time="2023-10-02T19:14:34Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:14:34.998642 env[1103]: 2023-10-02 19:14:34.977 [INFO][2619] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.100.69/26] IPv6=[] ContainerID="7d13e92c80146dac4050b9eb1b320ccae2602e3cde957036dee159a797ab0298" HandleID="k8s-pod-network.7d13e92c80146dac4050b9eb1b320ccae2602e3cde957036dee159a797ab0298" Workload="10.0.0.100-k8s-nginx--deployment--5bbcdd876f--rvw8s-eth0" Oct 2 19:14:34.999167 env[1103]: 2023-10-02 19:14:34.979 [INFO][2606] k8s.go 383: Populated endpoint ContainerID="7d13e92c80146dac4050b9eb1b320ccae2602e3cde957036dee159a797ab0298" Namespace="default" Pod="nginx-deployment-5bbcdd876f-rvw8s" WorkloadEndpoint="10.0.0.100-k8s-nginx--deployment--5bbcdd876f--rvw8s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100-k8s-nginx--deployment--5bbcdd876f--rvw8s-eth0", GenerateName:"nginx-deployment-5bbcdd876f-", Namespace:"default", SelfLink:"", UID:"9fffbbd9-1613-4820-8ebe-0d53d6c66e5a", ResourceVersion:"881", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 14, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"5bbcdd876f", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.100", ContainerID:"", Pod:"nginx-deployment-5bbcdd876f-rvw8s", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.100.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali923ba3430ae", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:14:34.999167 env[1103]: 2023-10-02 19:14:34.979 [INFO][2606] k8s.go 384: Calico CNI using IPs: [192.168.100.69/32] ContainerID="7d13e92c80146dac4050b9eb1b320ccae2602e3cde957036dee159a797ab0298" Namespace="default" Pod="nginx-deployment-5bbcdd876f-rvw8s" WorkloadEndpoint="10.0.0.100-k8s-nginx--deployment--5bbcdd876f--rvw8s-eth0" Oct 2 19:14:34.999167 env[1103]: 2023-10-02 19:14:34.979 [INFO][2606] dataplane_linux.go 68: Setting the host side veth name to cali923ba3430ae ContainerID="7d13e92c80146dac4050b9eb1b320ccae2602e3cde957036dee159a797ab0298" Namespace="default" Pod="nginx-deployment-5bbcdd876f-rvw8s" WorkloadEndpoint="10.0.0.100-k8s-nginx--deployment--5bbcdd876f--rvw8s-eth0" Oct 2 19:14:34.999167 env[1103]: 2023-10-02 19:14:34.981 [INFO][2606] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="7d13e92c80146dac4050b9eb1b320ccae2602e3cde957036dee159a797ab0298" Namespace="default" Pod="nginx-deployment-5bbcdd876f-rvw8s" WorkloadEndpoint="10.0.0.100-k8s-nginx--deployment--5bbcdd876f--rvw8s-eth0" Oct 2 19:14:34.999167 env[1103]: 2023-10-02 19:14:34.992 [INFO][2606] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="7d13e92c80146dac4050b9eb1b320ccae2602e3cde957036dee159a797ab0298" Namespace="default" Pod="nginx-deployment-5bbcdd876f-rvw8s" WorkloadEndpoint="10.0.0.100-k8s-nginx--deployment--5bbcdd876f--rvw8s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100-k8s-nginx--deployment--5bbcdd876f--rvw8s-eth0", GenerateName:"nginx-deployment-5bbcdd876f-", Namespace:"default", SelfLink:"", UID:"9fffbbd9-1613-4820-8ebe-0d53d6c66e5a", ResourceVersion:"881", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 14, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"5bbcdd876f", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.100", ContainerID:"7d13e92c80146dac4050b9eb1b320ccae2602e3cde957036dee159a797ab0298", Pod:"nginx-deployment-5bbcdd876f-rvw8s", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.100.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali923ba3430ae", MAC:"da:2d:20:a4:ed:c1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:14:34.999167 env[1103]: 2023-10-02 19:14:34.996 [INFO][2606] k8s.go 489: Wrote updated endpoint to datastore ContainerID="7d13e92c80146dac4050b9eb1b320ccae2602e3cde957036dee159a797ab0298" Namespace="default" Pod="nginx-deployment-5bbcdd876f-rvw8s" WorkloadEndpoint="10.0.0.100-k8s-nginx--deployment--5bbcdd876f--rvw8s-eth0" Oct 2 19:14:35.011040 env[1103]: time="2023-10-02T19:14:35.010965777Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:14:35.011040 env[1103]: time="2023-10-02T19:14:35.011014019Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:14:35.011040 env[1103]: time="2023-10-02T19:14:35.011024679Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:14:35.011338 env[1103]: time="2023-10-02T19:14:35.011284089Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7d13e92c80146dac4050b9eb1b320ccae2602e3cde957036dee159a797ab0298 pid=2646 runtime=io.containerd.runc.v2 Oct 2 19:14:35.027463 systemd[1]: Started cri-containerd-7d13e92c80146dac4050b9eb1b320ccae2602e3cde957036dee159a797ab0298.scope. Oct 2 19:14:35.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.035000 audit: BPF prog-id=112 op=LOAD Oct 2 19:14:35.036000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.036000 audit[2655]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2646 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:35.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764313365393263383031343664616334303530623965623162333230 Oct 2 19:14:35.036000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.036000 audit[2655]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2646 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:35.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764313365393263383031343664616334303530623965623162333230 Oct 2 19:14:35.036000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.036000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.036000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.036000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.036000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.036000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.036000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.036000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.036000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.036000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.036000 audit: BPF prog-id=113 op=LOAD Oct 2 19:14:35.036000 audit[2655]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000212700 items=0 ppid=2646 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:35.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764313365393263383031343664616334303530623965623162333230 Oct 2 19:14:35.036000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.036000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.036000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.036000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.036000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.036000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.036000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.036000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.036000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.036000 audit: BPF prog-id=114 op=LOAD Oct 2 19:14:35.036000 audit[2655]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000212748 items=0 ppid=2646 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:35.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764313365393263383031343664616334303530623965623162333230 Oct 2 19:14:35.037000 audit: BPF prog-id=114 op=UNLOAD Oct 2 19:14:35.037000 audit: BPF prog-id=113 op=UNLOAD Oct 2 19:14:35.037000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.037000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.037000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.037000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.037000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.037000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.037000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.037000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.037000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.037000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:35.037000 audit: BPF prog-id=115 op=LOAD Oct 2 19:14:35.037000 audit[2655]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000212b58 items=0 ppid=2646 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:35.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764313365393263383031343664616334303530623965623162333230 Oct 2 19:14:35.040513 systemd-resolved[1052]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 2 19:14:35.053000 audit[2676]: NETFILTER_CFG table=filter:84 family=2 entries=52 op=nft_register_chain pid=2676 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:14:35.053000 audit[2676]: SYSCALL arch=c000003e syscall=46 success=yes exit=24628 a0=3 a1=7ffda33a4360 a2=0 a3=7ffda33a434c items=0 ppid=2188 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:35.053000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:14:35.061739 env[1103]: time="2023-10-02T19:14:35.061665744Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-5bbcdd876f-rvw8s,Uid:9fffbbd9-1613-4820-8ebe-0d53d6c66e5a,Namespace:default,Attempt:0,} returns sandbox id \"7d13e92c80146dac4050b9eb1b320ccae2602e3cde957036dee159a797ab0298\"" Oct 2 19:14:35.101965 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount667605238.mount: Deactivated successfully. Oct 2 19:14:35.295590 systemd-networkd[1008]: vxlan.calico: Link UP Oct 2 19:14:35.295605 systemd-networkd[1008]: vxlan.calico: Gained carrier Oct 2 19:14:35.371589 kubelet[1412]: E1002 19:14:35.371528 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:35.972909 systemd-networkd[1008]: cali0b91d78bb01: Gained IPv6LL Oct 2 19:14:36.100988 systemd-networkd[1008]: calie5d11032f0f: Gained IPv6LL Oct 2 19:14:36.164879 systemd-networkd[1008]: calib57a5c1ddf5: Gained IPv6LL Oct 2 19:14:36.165232 systemd-networkd[1008]: cali923ba3430ae: Gained IPv6LL Oct 2 19:14:36.372759 kubelet[1412]: E1002 19:14:36.372611 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:37.043712 env[1103]: time="2023-10-02T19:14:37.043631085Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:37.045597 env[1103]: time="2023-10-02T19:14:37.045540981Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:37.047578 env[1103]: time="2023-10-02T19:14:37.047548159Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:37.049148 env[1103]: time="2023-10-02T19:14:37.049122942Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:b764feb1777655aabce5988324b69b412d23e087436ee2414dff893a158fcdef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:37.049842 env[1103]: time="2023-10-02T19:14:37.049798637Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\" returns image reference \"sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78\"" Oct 2 19:14:37.050462 env[1103]: time="2023-10-02T19:14:37.050368322Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Oct 2 19:14:37.051362 env[1103]: time="2023-10-02T19:14:37.051335178Z" level=info msg="CreateContainer within sandbox \"ccb056116d3f62ccf7f4808f114a49cc1e1e299ff9e19d43536349167594e37a\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Oct 2 19:14:37.061963 env[1103]: time="2023-10-02T19:14:37.061921481Z" level=info msg="CreateContainer within sandbox \"ccb056116d3f62ccf7f4808f114a49cc1e1e299ff9e19d43536349167594e37a\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"cee826077e4751e44bab5b5d086f6c168ed010b4d5ac5d368cae7851d4f5e1b1\"" Oct 2 19:14:37.062326 env[1103]: time="2023-10-02T19:14:37.062298984Z" level=info msg="StartContainer for \"cee826077e4751e44bab5b5d086f6c168ed010b4d5ac5d368cae7851d4f5e1b1\"" Oct 2 19:14:37.081848 systemd[1]: run-containerd-runc-k8s.io-cee826077e4751e44bab5b5d086f6c168ed010b4d5ac5d368cae7851d4f5e1b1-runc.LdoiVS.mount: Deactivated successfully. Oct 2 19:14:37.083072 systemd[1]: Started cri-containerd-cee826077e4751e44bab5b5d086f6c168ed010b4d5ac5d368cae7851d4f5e1b1.scope. Oct 2 19:14:37.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.098000 audit: BPF prog-id=116 op=LOAD Oct 2 19:14:37.098000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.098000 audit[2713]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2118 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:37.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365653832363037376534373531653434626162356235643038366636 Oct 2 19:14:37.098000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.098000 audit[2713]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2118 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:37.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365653832363037376534373531653434626162356235643038366636 Oct 2 19:14:37.098000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.098000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.098000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.098000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.098000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.098000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.098000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.098000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.098000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.098000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.098000 audit: BPF prog-id=117 op=LOAD Oct 2 19:14:37.098000 audit[2713]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003b6260 items=0 ppid=2118 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:37.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365653832363037376534373531653434626162356235643038366636 Oct 2 19:14:37.099000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.099000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.099000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.099000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.099000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.099000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.099000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.099000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.099000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.099000 audit: BPF prog-id=118 op=LOAD Oct 2 19:14:37.099000 audit[2713]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003b62a8 items=0 ppid=2118 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:37.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365653832363037376534373531653434626162356235643038366636 Oct 2 19:14:37.099000 audit: BPF prog-id=118 op=UNLOAD Oct 2 19:14:37.099000 audit: BPF prog-id=117 op=UNLOAD Oct 2 19:14:37.099000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.099000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.099000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.099000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.099000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.099000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.099000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.099000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.099000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.099000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:37.099000 audit: BPF prog-id=119 op=LOAD Oct 2 19:14:37.099000 audit[2713]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003b66b8 items=0 ppid=2118 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:37.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365653832363037376534373531653434626162356235643038366636 Oct 2 19:14:37.114911 env[1103]: time="2023-10-02T19:14:37.114859458Z" level=info msg="StartContainer for \"cee826077e4751e44bab5b5d086f6c168ed010b4d5ac5d368cae7851d4f5e1b1\" returns successfully" Oct 2 19:14:37.316944 systemd-networkd[1008]: vxlan.calico: Gained IPv6LL Oct 2 19:14:37.373426 kubelet[1412]: E1002 19:14:37.373380 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:38.374443 kubelet[1412]: E1002 19:14:38.374390 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:38.792031 env[1103]: time="2023-10-02T19:14:38.791958208Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:38.796012 env[1103]: time="2023-10-02T19:14:38.795954209Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:38.800856 env[1103]: time="2023-10-02T19:14:38.800784042Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:38.802720 env[1103]: time="2023-10-02T19:14:38.802647457Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:38.803192 env[1103]: time="2023-10-02T19:14:38.803148834Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a\"" Oct 2 19:14:38.804213 env[1103]: time="2023-10-02T19:14:38.804168868Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:14:38.805178 env[1103]: time="2023-10-02T19:14:38.805141403Z" level=info msg="CreateContainer within sandbox \"63a7c02fa116c53fb1e2bc75a47f6b536d48893b2e5c41e103f6d0e50b6a5824\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:14:38.822379 env[1103]: time="2023-10-02T19:14:38.822298446Z" level=info msg="CreateContainer within sandbox \"63a7c02fa116c53fb1e2bc75a47f6b536d48893b2e5c41e103f6d0e50b6a5824\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"3f5569dd9dbef73556dfdb7fc46ceba555b7375d946c1a41cf2a8b0815b4134e\"" Oct 2 19:14:38.822932 env[1103]: time="2023-10-02T19:14:38.822903869Z" level=info msg="StartContainer for \"3f5569dd9dbef73556dfdb7fc46ceba555b7375d946c1a41cf2a8b0815b4134e\"" Oct 2 19:14:38.842503 systemd[1]: Started cri-containerd-3f5569dd9dbef73556dfdb7fc46ceba555b7375d946c1a41cf2a8b0815b4134e.scope. Oct 2 19:14:38.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.855085 kernel: kauditd_printk_skb: 499 callbacks suppressed Oct 2 19:14:38.855158 kernel: audit: type=1400 audit(1696274078.853:850): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.858969 kernel: audit: type=1400 audit(1696274078.853:851): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.859035 kernel: audit: type=1400 audit(1696274078.853:852): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.860940 kernel: audit: type=1400 audit(1696274078.853:853): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.863127 kernel: audit: type=1400 audit(1696274078.853:854): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.865145 kernel: audit: type=1400 audit(1696274078.853:855): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.869803 kernel: audit: type=1400 audit(1696274078.853:856): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.869925 kernel: audit: type=1400 audit(1696274078.853:857): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.874127 kernel: audit: type=1400 audit(1696274078.853:858): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.874184 kernel: audit: type=1400 audit(1696274078.856:859): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.856000 audit: BPF prog-id=120 op=LOAD Oct 2 19:14:38.858000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.858000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2386 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:38.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366353536396464396462656637333535366466646237666334366365 Oct 2 19:14:38.858000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.858000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2386 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:38.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366353536396464396462656637333535366466646237666334366365 Oct 2 19:14:38.858000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.858000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.858000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.858000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.858000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.858000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.858000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.858000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.858000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.858000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.858000 audit: BPF prog-id=121 op=LOAD Oct 2 19:14:38.858000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000932d0 items=0 ppid=2386 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:38.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366353536396464396462656637333535366466646237666334366365 Oct 2 19:14:38.862000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.862000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.862000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.862000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.862000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.862000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.862000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.862000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.862000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.862000 audit: BPF prog-id=122 op=LOAD Oct 2 19:14:38.862000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000093318 items=0 ppid=2386 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:38.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366353536396464396462656637333535366466646237666334366365 Oct 2 19:14:38.867000 audit: BPF prog-id=122 op=UNLOAD Oct 2 19:14:38.867000 audit: BPF prog-id=121 op=UNLOAD Oct 2 19:14:38.867000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.867000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.867000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.867000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.867000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.867000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.867000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.867000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.867000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.867000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:38.867000 audit: BPF prog-id=123 op=LOAD Oct 2 19:14:38.867000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000093728 items=0 ppid=2386 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:38.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366353536396464396462656637333535366466646237666334366365 Oct 2 19:14:38.890923 env[1103]: time="2023-10-02T19:14:38.890614360Z" level=info msg="StartContainer for \"3f5569dd9dbef73556dfdb7fc46ceba555b7375d946c1a41cf2a8b0815b4134e\" returns successfully" Oct 2 19:14:39.067669 env[1103]: time="2023-10-02T19:14:39.067433743Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:14:39.068892 env[1103]: time="2023-10-02T19:14:39.068786324Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:14:39.069146 kubelet[1412]: E1002 19:14:39.069108 1412 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:14:39.069238 kubelet[1412]: E1002 19:14:39.069167 1412 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:14:39.069422 kubelet[1412]: E1002 19:14:39.069376 1412 kuberuntime_manager.go:862] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-5tr4q,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-7t6zx_calico-system(01427fab-57bb-45ce-83e1-41165d656dfc): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:14:39.070391 env[1103]: time="2023-10-02T19:14:39.070346436Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Oct 2 19:14:39.241808 env[1103]: time="2023-10-02T19:14:39.241637603Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:39.247979 env[1103]: time="2023-10-02T19:14:39.245490782Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:39.250119 env[1103]: time="2023-10-02T19:14:39.250072894Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:39.254152 env[1103]: time="2023-10-02T19:14:39.254110009Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:39.254545 env[1103]: time="2023-10-02T19:14:39.254503861Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a\"" Oct 2 19:14:39.255204 env[1103]: time="2023-10-02T19:14:39.255163095Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Oct 2 19:14:39.256186 env[1103]: time="2023-10-02T19:14:39.256162329Z" level=info msg="CreateContainer within sandbox \"738e4d2238659a4e32ba57e6cadf2752a6a151762804d9a86099061564f8de8b\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:14:39.271111 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1337101448.mount: Deactivated successfully. Oct 2 19:14:39.273096 env[1103]: time="2023-10-02T19:14:39.273025737Z" level=info msg="CreateContainer within sandbox \"738e4d2238659a4e32ba57e6cadf2752a6a151762804d9a86099061564f8de8b\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"46aeff0afb877ebebca877195d07451626741ad4b45379055dfb1a6445c133c4\"" Oct 2 19:14:39.273738 env[1103]: time="2023-10-02T19:14:39.273676274Z" level=info msg="StartContainer for \"46aeff0afb877ebebca877195d07451626741ad4b45379055dfb1a6445c133c4\"" Oct 2 19:14:39.310513 systemd[1]: Started cri-containerd-46aeff0afb877ebebca877195d07451626741ad4b45379055dfb1a6445c133c4.scope. Oct 2 19:14:39.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.321000 audit: BPF prog-id=124 op=LOAD Oct 2 19:14:39.321000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.321000 audit[2818]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2526 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:39.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436616566663061666238373765626562636138373731393564303734 Oct 2 19:14:39.321000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.321000 audit[2818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2526 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:39.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436616566663061666238373765626562636138373731393564303734 Oct 2 19:14:39.321000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.321000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.321000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.321000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.321000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.321000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.321000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.321000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.321000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.321000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.321000 audit: BPF prog-id=125 op=LOAD Oct 2 19:14:39.321000 audit[2818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025310 items=0 ppid=2526 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:39.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436616566663061666238373765626562636138373731393564303734 Oct 2 19:14:39.322000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.322000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.322000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.322000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.322000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.322000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.322000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.322000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.322000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.322000 audit: BPF prog-id=126 op=LOAD Oct 2 19:14:39.322000 audit[2818]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025358 items=0 ppid=2526 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:39.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436616566663061666238373765626562636138373731393564303734 Oct 2 19:14:39.322000 audit: BPF prog-id=126 op=UNLOAD Oct 2 19:14:39.322000 audit: BPF prog-id=125 op=UNLOAD Oct 2 19:14:39.322000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.322000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.322000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.322000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.322000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.322000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.322000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.322000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.322000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.322000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:39.322000 audit: BPF prog-id=127 op=LOAD Oct 2 19:14:39.322000 audit[2818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025768 items=0 ppid=2526 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:39.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436616566663061666238373765626562636138373731393564303734 Oct 2 19:14:39.337213 env[1103]: time="2023-10-02T19:14:39.337151420Z" level=info msg="StartContainer for \"46aeff0afb877ebebca877195d07451626741ad4b45379055dfb1a6445c133c4\" returns successfully" Oct 2 19:14:39.374958 kubelet[1412]: E1002 19:14:39.374887 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:39.585830 kubelet[1412]: E1002 19:14:39.585718 1412 dns.go:157] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:14:39.588903 kubelet[1412]: E1002 19:14:39.588849 1412 dns.go:157] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:14:39.635000 audit[2875]: NETFILTER_CFG table=filter:85 family=2 entries=12 op=nft_register_rule pid=2875 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:14:39.635000 audit[2875]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7fffd72139a0 a2=0 a3=7fffd721398c items=0 ppid=1726 pid=2875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:39.635000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:14:39.636000 audit[2875]: NETFILTER_CFG table=nat:86 family=2 entries=30 op=nft_register_rule pid=2875 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:14:39.636000 audit[2875]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7fffd72139a0 a2=0 a3=7fffd721398c items=0 ppid=1726 pid=2875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:39.636000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:14:39.668000 audit[2901]: NETFILTER_CFG table=filter:87 family=2 entries=9 op=nft_register_rule pid=2901 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:14:39.668000 audit[2901]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffe4003b0c0 a2=0 a3=7ffe4003b0ac items=0 ppid=1726 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:39.668000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:14:39.674000 audit[2901]: NETFILTER_CFG table=nat:88 family=2 entries=63 op=nft_register_chain pid=2901 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:14:39.674000 audit[2901]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe4003b0c0 a2=0 a3=7ffe4003b0ac items=0 ppid=1726 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:39.674000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:14:40.375757 kubelet[1412]: E1002 19:14:40.375715 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:40.590596 kubelet[1412]: E1002 19:14:40.590537 1412 dns.go:157] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:14:40.590596 kubelet[1412]: E1002 19:14:40.590574 1412 dns.go:157] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:14:40.991646 systemd[1]: run-containerd-runc-k8s.io-67225d0e12de72d62460055386ce5ae104a4aa4870c11024840b011bf13ca7b7-runc.b78GpN.mount: Deactivated successfully. Oct 2 19:14:41.042343 kubelet[1412]: E1002 19:14:41.042296 1412 dns.go:157] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:14:41.376684 kubelet[1412]: E1002 19:14:41.376562 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:41.592194 kubelet[1412]: E1002 19:14:41.592146 1412 dns.go:157] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:14:41.592449 kubelet[1412]: E1002 19:14:41.592225 1412 dns.go:157] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:14:42.377540 kubelet[1412]: E1002 19:14:42.377417 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:42.685997 kubelet[1412]: I1002 19:14:42.683539 1412 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:14:42.690668 systemd[1]: Created slice kubepods-besteffort-pod4dd8d91d_5ffc_4ccc_ac78_cdaf5c3f12f6.slice. Oct 2 19:14:42.697216 kubelet[1412]: I1002 19:14:42.696582 1412 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:14:42.702036 systemd[1]: Created slice kubepods-besteffort-pod85a21605_21ea_48e9_9197_e110ceda2cb6.slice. Oct 2 19:14:42.702000 audit[2963]: NETFILTER_CFG table=filter:89 family=2 entries=7 op=nft_register_rule pid=2963 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:14:42.702000 audit[2963]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffe10951bb0 a2=0 a3=7ffe10951b9c items=0 ppid=1726 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:42.702000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:14:42.704000 audit[2963]: NETFILTER_CFG table=nat:90 family=2 entries=78 op=nft_register_rule pid=2963 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:14:42.704000 audit[2963]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe10951bb0 a2=0 a3=7ffe10951b9c items=0 ppid=1726 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:42.704000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:14:42.746000 audit[2989]: NETFILTER_CFG table=filter:91 family=2 entries=8 op=nft_register_rule pid=2989 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:14:42.746000 audit[2989]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffcd62fb600 a2=0 a3=7ffcd62fb5ec items=0 ppid=1726 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:42.746000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:14:42.748000 audit[2989]: NETFILTER_CFG table=nat:92 family=2 entries=78 op=nft_register_rule pid=2989 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:14:42.748000 audit[2989]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffcd62fb600 a2=0 a3=7ffcd62fb5ec items=0 ppid=1726 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:42.748000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:14:42.782038 kubelet[1412]: I1002 19:14:42.781979 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/85a21605-21ea-48e9-9197-e110ceda2cb6-calico-apiserver-certs\") pod \"calico-apiserver-659fccb45d-8qztb\" (UID: \"85a21605-21ea-48e9-9197-e110ceda2cb6\") " pod="calico-apiserver/calico-apiserver-659fccb45d-8qztb" Oct 2 19:14:42.782038 kubelet[1412]: I1002 19:14:42.782031 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q4jmt\" (UniqueName: \"kubernetes.io/projected/4dd8d91d-5ffc-4ccc-ac78-cdaf5c3f12f6-kube-api-access-q4jmt\") pod \"calico-apiserver-659fccb45d-t75zf\" (UID: \"4dd8d91d-5ffc-4ccc-ac78-cdaf5c3f12f6\") " pod="calico-apiserver/calico-apiserver-659fccb45d-t75zf" Oct 2 19:14:42.782313 kubelet[1412]: I1002 19:14:42.782062 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ltd58\" (UniqueName: \"kubernetes.io/projected/85a21605-21ea-48e9-9197-e110ceda2cb6-kube-api-access-ltd58\") pod \"calico-apiserver-659fccb45d-8qztb\" (UID: \"85a21605-21ea-48e9-9197-e110ceda2cb6\") " pod="calico-apiserver/calico-apiserver-659fccb45d-8qztb" Oct 2 19:14:42.782313 kubelet[1412]: I1002 19:14:42.782246 1412 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/4dd8d91d-5ffc-4ccc-ac78-cdaf5c3f12f6-calico-apiserver-certs\") pod \"calico-apiserver-659fccb45d-t75zf\" (UID: \"4dd8d91d-5ffc-4ccc-ac78-cdaf5c3f12f6\") " pod="calico-apiserver/calico-apiserver-659fccb45d-t75zf" Oct 2 19:14:42.994447 env[1103]: time="2023-10-02T19:14:42.994388799Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-659fccb45d-t75zf,Uid:4dd8d91d-5ffc-4ccc-ac78-cdaf5c3f12f6,Namespace:calico-apiserver,Attempt:0,}" Oct 2 19:14:43.006298 env[1103]: time="2023-10-02T19:14:43.006239156Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-659fccb45d-8qztb,Uid:85a21605-21ea-48e9-9197-e110ceda2cb6,Namespace:calico-apiserver,Attempt:0,}" Oct 2 19:14:43.010334 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3905541372.mount: Deactivated successfully. Oct 2 19:14:43.329424 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:14:43.329679 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0e32f3177b7: link becomes ready Oct 2 19:14:43.338821 systemd-networkd[1008]: cali0e32f3177b7: Link UP Oct 2 19:14:43.338830 systemd-networkd[1008]: cali0e32f3177b7: Gained carrier Oct 2 19:14:43.356764 env[1103]: 2023-10-02 19:14:43.244 [INFO][3024] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.100-k8s-calico--apiserver--659fccb45d--8qztb-eth0 calico-apiserver-659fccb45d- calico-apiserver 85a21605-21ea-48e9-9197-e110ceda2cb6 1002 0 2023-10-02 19:14:42 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:659fccb45d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 10.0.0.100 calico-apiserver-659fccb45d-8qztb eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali0e32f3177b7 [] []}} ContainerID="23c97436b1f4214a04dc290b4268084aac0655d34d9cc053b843d4e4ad7d43d9" Namespace="calico-apiserver" Pod="calico-apiserver-659fccb45d-8qztb" WorkloadEndpoint="10.0.0.100-k8s-calico--apiserver--659fccb45d--8qztb-" Oct 2 19:14:43.356764 env[1103]: 2023-10-02 19:14:43.244 [INFO][3024] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="23c97436b1f4214a04dc290b4268084aac0655d34d9cc053b843d4e4ad7d43d9" Namespace="calico-apiserver" Pod="calico-apiserver-659fccb45d-8qztb" WorkloadEndpoint="10.0.0.100-k8s-calico--apiserver--659fccb45d--8qztb-eth0" Oct 2 19:14:43.356764 env[1103]: 2023-10-02 19:14:43.283 [INFO][3050] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="23c97436b1f4214a04dc290b4268084aac0655d34d9cc053b843d4e4ad7d43d9" HandleID="k8s-pod-network.23c97436b1f4214a04dc290b4268084aac0655d34d9cc053b843d4e4ad7d43d9" Workload="10.0.0.100-k8s-calico--apiserver--659fccb45d--8qztb-eth0" Oct 2 19:14:43.356764 env[1103]: 2023-10-02 19:14:43.298 [INFO][3050] ipam_plugin.go 269: Auto assigning IP ContainerID="23c97436b1f4214a04dc290b4268084aac0655d34d9cc053b843d4e4ad7d43d9" HandleID="k8s-pod-network.23c97436b1f4214a04dc290b4268084aac0655d34d9cc053b843d4e4ad7d43d9" Workload="10.0.0.100-k8s-calico--apiserver--659fccb45d--8qztb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002a41f0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"10.0.0.100", "pod":"calico-apiserver-659fccb45d-8qztb", "timestamp":"2023-10-02 19:14:43.283852574 +0000 UTC"}, Hostname:"10.0.0.100", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:14:43.356764 env[1103]: time="2023-10-02T19:14:43Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:14:43.356764 env[1103]: time="2023-10-02T19:14:43Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:14:43.356764 env[1103]: 2023-10-02 19:14:43.299 [INFO][3050] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.100' Oct 2 19:14:43.356764 env[1103]: 2023-10-02 19:14:43.300 [INFO][3050] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.23c97436b1f4214a04dc290b4268084aac0655d34d9cc053b843d4e4ad7d43d9" host="10.0.0.100" Oct 2 19:14:43.356764 env[1103]: 2023-10-02 19:14:43.304 [INFO][3050] ipam.go 372: Looking up existing affinities for host host="10.0.0.100" Oct 2 19:14:43.356764 env[1103]: 2023-10-02 19:14:43.310 [INFO][3050] ipam.go 489: Trying affinity for 192.168.100.64/26 host="10.0.0.100" Oct 2 19:14:43.356764 env[1103]: 2023-10-02 19:14:43.312 [INFO][3050] ipam.go 155: Attempting to load block cidr=192.168.100.64/26 host="10.0.0.100" Oct 2 19:14:43.356764 env[1103]: 2023-10-02 19:14:43.314 [INFO][3050] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.100.64/26 host="10.0.0.100" Oct 2 19:14:43.356764 env[1103]: 2023-10-02 19:14:43.314 [INFO][3050] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.100.64/26 handle="k8s-pod-network.23c97436b1f4214a04dc290b4268084aac0655d34d9cc053b843d4e4ad7d43d9" host="10.0.0.100" Oct 2 19:14:43.356764 env[1103]: 2023-10-02 19:14:43.316 [INFO][3050] ipam.go 1682: Creating new handle: k8s-pod-network.23c97436b1f4214a04dc290b4268084aac0655d34d9cc053b843d4e4ad7d43d9 Oct 2 19:14:43.356764 env[1103]: 2023-10-02 19:14:43.318 [INFO][3050] ipam.go 1203: Writing block in order to claim IPs block=192.168.100.64/26 handle="k8s-pod-network.23c97436b1f4214a04dc290b4268084aac0655d34d9cc053b843d4e4ad7d43d9" host="10.0.0.100" Oct 2 19:14:43.356764 env[1103]: 2023-10-02 19:14:43.324 [INFO][3050] ipam.go 1216: Successfully claimed IPs: [192.168.100.70/26] block=192.168.100.64/26 handle="k8s-pod-network.23c97436b1f4214a04dc290b4268084aac0655d34d9cc053b843d4e4ad7d43d9" host="10.0.0.100" Oct 2 19:14:43.356764 env[1103]: 2023-10-02 19:14:43.324 [INFO][3050] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.100.70/26] handle="k8s-pod-network.23c97436b1f4214a04dc290b4268084aac0655d34d9cc053b843d4e4ad7d43d9" host="10.0.0.100" Oct 2 19:14:43.356764 env[1103]: time="2023-10-02T19:14:43Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:14:43.356764 env[1103]: 2023-10-02 19:14:43.324 [INFO][3050] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.100.70/26] IPv6=[] ContainerID="23c97436b1f4214a04dc290b4268084aac0655d34d9cc053b843d4e4ad7d43d9" HandleID="k8s-pod-network.23c97436b1f4214a04dc290b4268084aac0655d34d9cc053b843d4e4ad7d43d9" Workload="10.0.0.100-k8s-calico--apiserver--659fccb45d--8qztb-eth0" Oct 2 19:14:43.357625 env[1103]: 2023-10-02 19:14:43.326 [INFO][3024] k8s.go 383: Populated endpoint ContainerID="23c97436b1f4214a04dc290b4268084aac0655d34d9cc053b843d4e4ad7d43d9" Namespace="calico-apiserver" Pod="calico-apiserver-659fccb45d-8qztb" WorkloadEndpoint="10.0.0.100-k8s-calico--apiserver--659fccb45d--8qztb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100-k8s-calico--apiserver--659fccb45d--8qztb-eth0", GenerateName:"calico-apiserver-659fccb45d-", Namespace:"calico-apiserver", SelfLink:"", UID:"85a21605-21ea-48e9-9197-e110ceda2cb6", ResourceVersion:"1002", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 14, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"659fccb45d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.100", ContainerID:"", Pod:"calico-apiserver-659fccb45d-8qztb", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.100.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0e32f3177b7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:14:43.357625 env[1103]: 2023-10-02 19:14:43.326 [INFO][3024] k8s.go 384: Calico CNI using IPs: [192.168.100.70/32] ContainerID="23c97436b1f4214a04dc290b4268084aac0655d34d9cc053b843d4e4ad7d43d9" Namespace="calico-apiserver" Pod="calico-apiserver-659fccb45d-8qztb" WorkloadEndpoint="10.0.0.100-k8s-calico--apiserver--659fccb45d--8qztb-eth0" Oct 2 19:14:43.357625 env[1103]: 2023-10-02 19:14:43.326 [INFO][3024] dataplane_linux.go 68: Setting the host side veth name to cali0e32f3177b7 ContainerID="23c97436b1f4214a04dc290b4268084aac0655d34d9cc053b843d4e4ad7d43d9" Namespace="calico-apiserver" Pod="calico-apiserver-659fccb45d-8qztb" WorkloadEndpoint="10.0.0.100-k8s-calico--apiserver--659fccb45d--8qztb-eth0" Oct 2 19:14:43.357625 env[1103]: 2023-10-02 19:14:43.329 [INFO][3024] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="23c97436b1f4214a04dc290b4268084aac0655d34d9cc053b843d4e4ad7d43d9" Namespace="calico-apiserver" Pod="calico-apiserver-659fccb45d-8qztb" WorkloadEndpoint="10.0.0.100-k8s-calico--apiserver--659fccb45d--8qztb-eth0" Oct 2 19:14:43.357625 env[1103]: 2023-10-02 19:14:43.337 [INFO][3024] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="23c97436b1f4214a04dc290b4268084aac0655d34d9cc053b843d4e4ad7d43d9" Namespace="calico-apiserver" Pod="calico-apiserver-659fccb45d-8qztb" WorkloadEndpoint="10.0.0.100-k8s-calico--apiserver--659fccb45d--8qztb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100-k8s-calico--apiserver--659fccb45d--8qztb-eth0", GenerateName:"calico-apiserver-659fccb45d-", Namespace:"calico-apiserver", SelfLink:"", UID:"85a21605-21ea-48e9-9197-e110ceda2cb6", ResourceVersion:"1002", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 14, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"659fccb45d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.100", ContainerID:"23c97436b1f4214a04dc290b4268084aac0655d34d9cc053b843d4e4ad7d43d9", Pod:"calico-apiserver-659fccb45d-8qztb", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.100.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0e32f3177b7", MAC:"2e:e7:a8:55:af:b7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:14:43.357625 env[1103]: 2023-10-02 19:14:43.344 [INFO][3024] k8s.go 489: Wrote updated endpoint to datastore ContainerID="23c97436b1f4214a04dc290b4268084aac0655d34d9cc053b843d4e4ad7d43d9" Namespace="calico-apiserver" Pod="calico-apiserver-659fccb45d-8qztb" WorkloadEndpoint="10.0.0.100-k8s-calico--apiserver--659fccb45d--8qztb-eth0" Oct 2 19:14:43.363797 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie551dd70dea: link becomes ready Oct 2 19:14:43.371019 systemd-networkd[1008]: calie551dd70dea: Link UP Oct 2 19:14:43.371024 systemd-networkd[1008]: calie551dd70dea: Gained carrier Oct 2 19:14:43.370000 audit[3078]: NETFILTER_CFG table=filter:93 family=2 entries=69 op=nft_register_chain pid=3078 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:14:43.370000 audit[3078]: SYSCALL arch=c000003e syscall=46 success=yes exit=33332 a0=3 a1=7fff90523440 a2=0 a3=7fff9052342c items=0 ppid=2188 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:43.370000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:14:43.378380 kubelet[1412]: E1002 19:14:43.378335 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:43.382782 env[1103]: 2023-10-02 19:14:43.259 [INFO][3019] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.100-k8s-calico--apiserver--659fccb45d--t75zf-eth0 calico-apiserver-659fccb45d- calico-apiserver 4dd8d91d-5ffc-4ccc-ac78-cdaf5c3f12f6 1000 0 2023-10-02 19:14:42 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:659fccb45d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 10.0.0.100 calico-apiserver-659fccb45d-t75zf eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calie551dd70dea [] []}} ContainerID="4704c746fd4cbb7f566fec5bacd6192a975189eea8ece087b374b4a5b1db97db" Namespace="calico-apiserver" Pod="calico-apiserver-659fccb45d-t75zf" WorkloadEndpoint="10.0.0.100-k8s-calico--apiserver--659fccb45d--t75zf-" Oct 2 19:14:43.382782 env[1103]: 2023-10-02 19:14:43.259 [INFO][3019] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="4704c746fd4cbb7f566fec5bacd6192a975189eea8ece087b374b4a5b1db97db" Namespace="calico-apiserver" Pod="calico-apiserver-659fccb45d-t75zf" WorkloadEndpoint="10.0.0.100-k8s-calico--apiserver--659fccb45d--t75zf-eth0" Oct 2 19:14:43.382782 env[1103]: 2023-10-02 19:14:43.297 [INFO][3056] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4704c746fd4cbb7f566fec5bacd6192a975189eea8ece087b374b4a5b1db97db" HandleID="k8s-pod-network.4704c746fd4cbb7f566fec5bacd6192a975189eea8ece087b374b4a5b1db97db" Workload="10.0.0.100-k8s-calico--apiserver--659fccb45d--t75zf-eth0" Oct 2 19:14:43.382782 env[1103]: 2023-10-02 19:14:43.306 [INFO][3056] ipam_plugin.go 269: Auto assigning IP ContainerID="4704c746fd4cbb7f566fec5bacd6192a975189eea8ece087b374b4a5b1db97db" HandleID="k8s-pod-network.4704c746fd4cbb7f566fec5bacd6192a975189eea8ece087b374b4a5b1db97db" Workload="10.0.0.100-k8s-calico--apiserver--659fccb45d--t75zf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004ce1b0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"10.0.0.100", "pod":"calico-apiserver-659fccb45d-t75zf", "timestamp":"2023-10-02 19:14:43.297014649 +0000 UTC"}, Hostname:"10.0.0.100", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:14:43.382782 env[1103]: time="2023-10-02T19:14:43Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:14:43.382782 env[1103]: time="2023-10-02T19:14:43Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:14:43.382782 env[1103]: 2023-10-02 19:14:43.325 [INFO][3056] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.100' Oct 2 19:14:43.382782 env[1103]: 2023-10-02 19:14:43.327 [INFO][3056] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4704c746fd4cbb7f566fec5bacd6192a975189eea8ece087b374b4a5b1db97db" host="10.0.0.100" Oct 2 19:14:43.382782 env[1103]: 2023-10-02 19:14:43.330 [INFO][3056] ipam.go 372: Looking up existing affinities for host host="10.0.0.100" Oct 2 19:14:43.382782 env[1103]: 2023-10-02 19:14:43.334 [INFO][3056] ipam.go 489: Trying affinity for 192.168.100.64/26 host="10.0.0.100" Oct 2 19:14:43.382782 env[1103]: 2023-10-02 19:14:43.337 [INFO][3056] ipam.go 155: Attempting to load block cidr=192.168.100.64/26 host="10.0.0.100" Oct 2 19:14:43.382782 env[1103]: 2023-10-02 19:14:43.339 [INFO][3056] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.100.64/26 host="10.0.0.100" Oct 2 19:14:43.382782 env[1103]: 2023-10-02 19:14:43.339 [INFO][3056] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.100.64/26 handle="k8s-pod-network.4704c746fd4cbb7f566fec5bacd6192a975189eea8ece087b374b4a5b1db97db" host="10.0.0.100" Oct 2 19:14:43.382782 env[1103]: 2023-10-02 19:14:43.341 [INFO][3056] ipam.go 1682: Creating new handle: k8s-pod-network.4704c746fd4cbb7f566fec5bacd6192a975189eea8ece087b374b4a5b1db97db Oct 2 19:14:43.382782 env[1103]: 2023-10-02 19:14:43.344 [INFO][3056] ipam.go 1203: Writing block in order to claim IPs block=192.168.100.64/26 handle="k8s-pod-network.4704c746fd4cbb7f566fec5bacd6192a975189eea8ece087b374b4a5b1db97db" host="10.0.0.100" Oct 2 19:14:43.382782 env[1103]: 2023-10-02 19:14:43.350 [INFO][3056] ipam.go 1216: Successfully claimed IPs: [192.168.100.71/26] block=192.168.100.64/26 handle="k8s-pod-network.4704c746fd4cbb7f566fec5bacd6192a975189eea8ece087b374b4a5b1db97db" host="10.0.0.100" Oct 2 19:14:43.382782 env[1103]: 2023-10-02 19:14:43.350 [INFO][3056] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.100.71/26] handle="k8s-pod-network.4704c746fd4cbb7f566fec5bacd6192a975189eea8ece087b374b4a5b1db97db" host="10.0.0.100" Oct 2 19:14:43.382782 env[1103]: time="2023-10-02T19:14:43Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:14:43.382782 env[1103]: 2023-10-02 19:14:43.350 [INFO][3056] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.100.71/26] IPv6=[] ContainerID="4704c746fd4cbb7f566fec5bacd6192a975189eea8ece087b374b4a5b1db97db" HandleID="k8s-pod-network.4704c746fd4cbb7f566fec5bacd6192a975189eea8ece087b374b4a5b1db97db" Workload="10.0.0.100-k8s-calico--apiserver--659fccb45d--t75zf-eth0" Oct 2 19:14:43.383461 env[1103]: 2023-10-02 19:14:43.361 [INFO][3019] k8s.go 383: Populated endpoint ContainerID="4704c746fd4cbb7f566fec5bacd6192a975189eea8ece087b374b4a5b1db97db" Namespace="calico-apiserver" Pod="calico-apiserver-659fccb45d-t75zf" WorkloadEndpoint="10.0.0.100-k8s-calico--apiserver--659fccb45d--t75zf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100-k8s-calico--apiserver--659fccb45d--t75zf-eth0", GenerateName:"calico-apiserver-659fccb45d-", Namespace:"calico-apiserver", SelfLink:"", UID:"4dd8d91d-5ffc-4ccc-ac78-cdaf5c3f12f6", ResourceVersion:"1000", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 14, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"659fccb45d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.100", ContainerID:"", Pod:"calico-apiserver-659fccb45d-t75zf", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.100.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie551dd70dea", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:14:43.383461 env[1103]: 2023-10-02 19:14:43.361 [INFO][3019] k8s.go 384: Calico CNI using IPs: [192.168.100.71/32] ContainerID="4704c746fd4cbb7f566fec5bacd6192a975189eea8ece087b374b4a5b1db97db" Namespace="calico-apiserver" Pod="calico-apiserver-659fccb45d-t75zf" WorkloadEndpoint="10.0.0.100-k8s-calico--apiserver--659fccb45d--t75zf-eth0" Oct 2 19:14:43.383461 env[1103]: 2023-10-02 19:14:43.361 [INFO][3019] dataplane_linux.go 68: Setting the host side veth name to calie551dd70dea ContainerID="4704c746fd4cbb7f566fec5bacd6192a975189eea8ece087b374b4a5b1db97db" Namespace="calico-apiserver" Pod="calico-apiserver-659fccb45d-t75zf" WorkloadEndpoint="10.0.0.100-k8s-calico--apiserver--659fccb45d--t75zf-eth0" Oct 2 19:14:43.383461 env[1103]: 2023-10-02 19:14:43.363 [INFO][3019] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="4704c746fd4cbb7f566fec5bacd6192a975189eea8ece087b374b4a5b1db97db" Namespace="calico-apiserver" Pod="calico-apiserver-659fccb45d-t75zf" WorkloadEndpoint="10.0.0.100-k8s-calico--apiserver--659fccb45d--t75zf-eth0" Oct 2 19:14:43.383461 env[1103]: 2023-10-02 19:14:43.373 [INFO][3019] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="4704c746fd4cbb7f566fec5bacd6192a975189eea8ece087b374b4a5b1db97db" Namespace="calico-apiserver" Pod="calico-apiserver-659fccb45d-t75zf" WorkloadEndpoint="10.0.0.100-k8s-calico--apiserver--659fccb45d--t75zf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.100-k8s-calico--apiserver--659fccb45d--t75zf-eth0", GenerateName:"calico-apiserver-659fccb45d-", Namespace:"calico-apiserver", SelfLink:"", UID:"4dd8d91d-5ffc-4ccc-ac78-cdaf5c3f12f6", ResourceVersion:"1000", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 14, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"659fccb45d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.100", ContainerID:"4704c746fd4cbb7f566fec5bacd6192a975189eea8ece087b374b4a5b1db97db", Pod:"calico-apiserver-659fccb45d-t75zf", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.100.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie551dd70dea", MAC:"66:6f:45:49:97:f4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:14:43.383461 env[1103]: 2023-10-02 19:14:43.379 [INFO][3019] k8s.go 489: Wrote updated endpoint to datastore ContainerID="4704c746fd4cbb7f566fec5bacd6192a975189eea8ece087b374b4a5b1db97db" Namespace="calico-apiserver" Pod="calico-apiserver-659fccb45d-t75zf" WorkloadEndpoint="10.0.0.100-k8s-calico--apiserver--659fccb45d--t75zf-eth0" Oct 2 19:14:43.393000 audit[3099]: NETFILTER_CFG table=filter:94 family=2 entries=56 op=nft_register_chain pid=3099 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:14:43.393000 audit[3099]: SYSCALL arch=c000003e syscall=46 success=yes exit=27332 a0=3 a1=7ffe3a086c20 a2=0 a3=7ffe3a086c0c items=0 ppid=2188 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:43.393000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:14:43.450951 env[1103]: time="2023-10-02T19:14:43.450787516Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:14:43.450951 env[1103]: time="2023-10-02T19:14:43.450825077Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:14:43.450951 env[1103]: time="2023-10-02T19:14:43.450837791Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:14:43.451215 env[1103]: time="2023-10-02T19:14:43.450999235Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/23c97436b1f4214a04dc290b4268084aac0655d34d9cc053b843d4e4ad7d43d9 pid=3112 runtime=io.containerd.runc.v2 Oct 2 19:14:43.451303 env[1103]: time="2023-10-02T19:14:43.450745757Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:14:43.451303 env[1103]: time="2023-10-02T19:14:43.450791213Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:14:43.451303 env[1103]: time="2023-10-02T19:14:43.450806020Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:14:43.451532 env[1103]: time="2023-10-02T19:14:43.451475212Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4704c746fd4cbb7f566fec5bacd6192a975189eea8ece087b374b4a5b1db97db pid=3113 runtime=io.containerd.runc.v2 Oct 2 19:14:43.466026 systemd[1]: Started cri-containerd-4704c746fd4cbb7f566fec5bacd6192a975189eea8ece087b374b4a5b1db97db.scope. Oct 2 19:14:43.481746 systemd[1]: Started cri-containerd-23c97436b1f4214a04dc290b4268084aac0655d34d9cc053b843d4e4ad7d43d9.scope. Oct 2 19:14:43.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.486000 audit: BPF prog-id=128 op=LOAD Oct 2 19:14:43.486000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.486000 audit[3130]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3113 pid=3130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:43.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437303463373436666434636262376635363666656335626163643631 Oct 2 19:14:43.486000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.486000 audit[3130]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3113 pid=3130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:43.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437303463373436666434636262376635363666656335626163643631 Oct 2 19:14:43.486000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.486000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.486000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.486000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.486000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.486000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.486000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.486000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.486000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.486000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.486000 audit: BPF prog-id=129 op=LOAD Oct 2 19:14:43.486000 audit[3130]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000285090 items=0 ppid=3113 pid=3130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:43.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437303463373436666434636262376635363666656335626163643631 Oct 2 19:14:43.487000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.487000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.487000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.487000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.487000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.487000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.487000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.487000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.487000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.487000 audit: BPF prog-id=130 op=LOAD Oct 2 19:14:43.487000 audit[3130]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002850d8 items=0 ppid=3113 pid=3130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:43.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437303463373436666434636262376635363666656335626163643631 Oct 2 19:14:43.487000 audit: BPF prog-id=130 op=UNLOAD Oct 2 19:14:43.487000 audit: BPF prog-id=129 op=UNLOAD Oct 2 19:14:43.487000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.487000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.487000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.487000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.487000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.487000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.487000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.487000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.487000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.487000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.487000 audit: BPF prog-id=131 op=LOAD Oct 2 19:14:43.487000 audit[3130]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002854e8 items=0 ppid=3113 pid=3130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:43.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437303463373436666434636262376635363666656335626163643631 Oct 2 19:14:43.488574 systemd-resolved[1052]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 2 19:14:43.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.492000 audit: BPF prog-id=132 op=LOAD Oct 2 19:14:43.492000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.492000 audit[3131]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3112 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:43.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233633937343336623166343231346130346463323930623432363830 Oct 2 19:14:43.492000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.492000 audit[3131]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3112 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:43.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233633937343336623166343231346130346463323930623432363830 Oct 2 19:14:43.492000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.492000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.492000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.492000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.492000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.492000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.492000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.492000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.492000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.492000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.492000 audit: BPF prog-id=133 op=LOAD Oct 2 19:14:43.492000 audit[3131]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002a0340 items=0 ppid=3112 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:43.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233633937343336623166343231346130346463323930623432363830 Oct 2 19:14:43.492000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.492000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.492000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.492000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.492000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.492000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.492000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.492000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.492000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.492000 audit: BPF prog-id=134 op=LOAD Oct 2 19:14:43.492000 audit[3131]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002a0388 items=0 ppid=3112 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:43.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233633937343336623166343231346130346463323930623432363830 Oct 2 19:14:43.493000 audit: BPF prog-id=134 op=UNLOAD Oct 2 19:14:43.493000 audit: BPF prog-id=133 op=UNLOAD Oct 2 19:14:43.493000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.493000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.493000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.493000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.493000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.493000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.493000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.493000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.493000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.493000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:43.493000 audit: BPF prog-id=135 op=LOAD Oct 2 19:14:43.493000 audit[3131]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002a0798 items=0 ppid=3112 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:43.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233633937343336623166343231346130346463323930623432363830 Oct 2 19:14:43.494496 systemd-resolved[1052]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 2 19:14:43.514131 env[1103]: time="2023-10-02T19:14:43.514084425Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-659fccb45d-t75zf,Uid:4dd8d91d-5ffc-4ccc-ac78-cdaf5c3f12f6,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"4704c746fd4cbb7f566fec5bacd6192a975189eea8ece087b374b4a5b1db97db\"" Oct 2 19:14:43.521829 env[1103]: time="2023-10-02T19:14:43.521784510Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-659fccb45d-8qztb,Uid:85a21605-21ea-48e9-9197-e110ceda2cb6,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"23c97436b1f4214a04dc290b4268084aac0655d34d9cc053b843d4e4ad7d43d9\"" Oct 2 19:14:44.045183 env[1103]: time="2023-10-02T19:14:44.045114837Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:44.048602 env[1103]: time="2023-10-02T19:14:44.048544927Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:22c2ef579d5668dbfa645a84c3a2e988885c114561e9a560a97b2d0ea6d6c988,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:44.050312 env[1103]: time="2023-10-02T19:14:44.050275756Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:44.052430 env[1103]: time="2023-10-02T19:14:44.052385960Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:637f6b877b0a51c456b44ec74046864b5131a87cb1c4536f11170201073027cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:44.053239 env[1103]: time="2023-10-02T19:14:44.053203159Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:22c2ef579d5668dbfa645a84c3a2e988885c114561e9a560a97b2d0ea6d6c988\"" Oct 2 19:14:44.053845 env[1103]: time="2023-10-02T19:14:44.053729771Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:14:44.054784 env[1103]: time="2023-10-02T19:14:44.054761795Z" level=info msg="CreateContainer within sandbox \"7d13e92c80146dac4050b9eb1b320ccae2602e3cde957036dee159a797ab0298\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Oct 2 19:14:44.070968 env[1103]: time="2023-10-02T19:14:44.070916399Z" level=info msg="CreateContainer within sandbox \"7d13e92c80146dac4050b9eb1b320ccae2602e3cde957036dee159a797ab0298\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"c956dc4067a0017db9212be3360993c1ac5674de1ec8ace8f33d3e7c8e9fbc43\"" Oct 2 19:14:44.071570 env[1103]: time="2023-10-02T19:14:44.071522671Z" level=info msg="StartContainer for \"c956dc4067a0017db9212be3360993c1ac5674de1ec8ace8f33d3e7c8e9fbc43\"" Oct 2 19:14:44.091317 systemd[1]: Started cri-containerd-c956dc4067a0017db9212be3360993c1ac5674de1ec8ace8f33d3e7c8e9fbc43.scope. Oct 2 19:14:44.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.106780 kernel: kauditd_printk_skb: 248 callbacks suppressed Oct 2 19:14:44.106842 kernel: audit: type=1400 audit(1696274084.103:932): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.106867 kernel: audit: type=1400 audit(1696274084.103:933): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.114718 kernel: audit: type=1400 audit(1696274084.103:934): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.114815 kernel: audit: type=1400 audit(1696274084.103:935): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.114853 kernel: audit: type=1400 audit(1696274084.103:936): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.118685 kernel: audit: type=1400 audit(1696274084.103:937): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.118763 kernel: audit: type=1400 audit(1696274084.103:938): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.121076 kernel: audit: type=1400 audit(1696274084.103:939): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.125855 kernel: audit: type=1400 audit(1696274084.103:940): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.128285 kernel: audit: type=1400 audit(1696274084.106:941): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.106000 audit: BPF prog-id=136 op=LOAD Oct 2 19:14:44.106000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.106000 audit[3185]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2646 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:44.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339353664633430363761303031376462393231326265333336303939 Oct 2 19:14:44.106000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.106000 audit[3185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2646 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:44.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339353664633430363761303031376462393231326265333336303939 Oct 2 19:14:44.106000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.106000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.106000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.106000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.106000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.106000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.106000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.106000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.106000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.106000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.106000 audit: BPF prog-id=137 op=LOAD Oct 2 19:14:44.106000 audit[3185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003cee60 items=0 ppid=2646 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:44.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339353664633430363761303031376462393231326265333336303939 Oct 2 19:14:44.110000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.110000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.110000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.110000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.110000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.110000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.110000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.110000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.110000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.110000 audit: BPF prog-id=138 op=LOAD Oct 2 19:14:44.110000 audit[3185]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003ceea8 items=0 ppid=2646 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:44.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339353664633430363761303031376462393231326265333336303939 Oct 2 19:14:44.110000 audit: BPF prog-id=138 op=UNLOAD Oct 2 19:14:44.110000 audit: BPF prog-id=137 op=UNLOAD Oct 2 19:14:44.110000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.110000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.110000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.110000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.110000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.110000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.110000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.110000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.110000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.110000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:44.110000 audit: BPF prog-id=139 op=LOAD Oct 2 19:14:44.110000 audit[3185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003cf2b8 items=0 ppid=2646 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:44.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339353664633430363761303031376462393231326265333336303939 Oct 2 19:14:44.137763 env[1103]: time="2023-10-02T19:14:44.137719488Z" level=info msg="StartContainer for \"c956dc4067a0017db9212be3360993c1ac5674de1ec8ace8f33d3e7c8e9fbc43\" returns successfully" Oct 2 19:14:44.287326 env[1103]: time="2023-10-02T19:14:44.287036638Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:14:44.288742 env[1103]: time="2023-10-02T19:14:44.288672077Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:14:44.289034 kubelet[1412]: E1002 19:14:44.288946 1412 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:14:44.289034 kubelet[1412]: E1002 19:14:44.288986 1412 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:14:44.289201 kubelet[1412]: E1002 19:14:44.289173 1412 kuberuntime_manager.go:862] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-5tr4q,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-7t6zx_calico-system(01427fab-57bb-45ce-83e1-41165d656dfc): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:14:44.289365 kubelet[1412]: E1002 19:14:44.289251 1412 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-7t6zx" podUID=01427fab-57bb-45ce-83e1-41165d656dfc Oct 2 19:14:44.289591 env[1103]: time="2023-10-02T19:14:44.289562383Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:14:44.379268 kubelet[1412]: E1002 19:14:44.379136 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:44.544862 env[1103]: time="2023-10-02T19:14:44.544786014Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:14:44.547525 env[1103]: time="2023-10-02T19:14:44.547480750Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:14:44.547776 kubelet[1412]: E1002 19:14:44.547729 1412 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:14:44.547776 kubelet[1412]: E1002 19:14:44.547782 1412 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:14:44.548031 kubelet[1412]: E1002 19:14:44.548002 1412 kuberuntime_manager.go:862] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-q4jmt,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-659fccb45d-t75zf_calico-apiserver(4dd8d91d-5ffc-4ccc-ac78-cdaf5c3f12f6): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:14:44.548152 kubelet[1412]: E1002 19:14:44.548057 1412 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-659fccb45d-t75zf" podUID=4dd8d91d-5ffc-4ccc-ac78-cdaf5c3f12f6 Oct 2 19:14:44.548364 env[1103]: time="2023-10-02T19:14:44.548344706Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:14:44.601947 kubelet[1412]: E1002 19:14:44.601916 1412 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-659fccb45d-t75zf" podUID=4dd8d91d-5ffc-4ccc-ac78-cdaf5c3f12f6 Oct 2 19:14:44.602266 kubelet[1412]: E1002 19:14:44.602233 1412 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-7t6zx" podUID=01427fab-57bb-45ce-83e1-41165d656dfc Oct 2 19:14:44.612972 systemd-networkd[1008]: calie551dd70dea: Gained IPv6LL Oct 2 19:14:44.647000 audit[3260]: NETFILTER_CFG table=filter:95 family=2 entries=8 op=nft_register_rule pid=3260 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:14:44.647000 audit[3260]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fffb6a74070 a2=0 a3=7fffb6a7405c items=0 ppid=1726 pid=3260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:44.647000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:14:44.649000 audit[3260]: NETFILTER_CFG table=nat:96 family=2 entries=78 op=nft_register_rule pid=3260 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:14:44.649000 audit[3260]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fffb6a74070 a2=0 a3=7fffb6a7405c items=0 ppid=1726 pid=3260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:44.649000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:14:44.824285 env[1103]: time="2023-10-02T19:14:44.824218318Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:14:44.825475 env[1103]: time="2023-10-02T19:14:44.825439328Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:14:44.825703 kubelet[1412]: E1002 19:14:44.825655 1412 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:14:44.825772 kubelet[1412]: E1002 19:14:44.825727 1412 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:14:44.825900 kubelet[1412]: E1002 19:14:44.825872 1412 kuberuntime_manager.go:862] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-ltd58,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-659fccb45d-8qztb_calico-apiserver(85a21605-21ea-48e9-9197-e110ceda2cb6): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:14:44.826028 kubelet[1412]: E1002 19:14:44.825930 1412 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-659fccb45d-8qztb" podUID=85a21605-21ea-48e9-9197-e110ceda2cb6 Oct 2 19:14:44.996897 systemd-networkd[1008]: cali0e32f3177b7: Gained IPv6LL Oct 2 19:14:45.380355 kubelet[1412]: E1002 19:14:45.380226 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Oct 2 19:14:45.604366 kubelet[1412]: E1002 19:14:45.604312 1412 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-659fccb45d-8qztb" podUID=85a21605-21ea-48e9-9197-e110ceda2cb6 Oct 2 19:14:45.646000 audit[3289]: NETFILTER_CFG table=filter:97 family=2 entries=8 op=nft_register_rule pid=3289 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:14:45.646000 audit[3289]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffd819c88c0 a2=0 a3=7ffd819c88ac items=0 ppid=1726 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:45.646000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:14:45.647000 audit[3289]: NETFILTER_CFG table=nat:98 family=2 entries=78 op=nft_register_rule pid=3289 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:14:45.647000 audit[3289]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffd819c88c0 a2=0 a3=7ffd819c88ac items=0 ppid=1726 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:45.647000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:14:46.380915 kubelet[1412]: E1002 19:14:46.380838 1412 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"