Oct  2 19:06:25.904866 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Oct 2 17:52:37 -00 2023
Oct  2 19:06:25.904884 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1
Oct  2 19:06:25.904894 kernel: BIOS-provided physical RAM map:
Oct  2 19:06:25.904900 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable
Oct  2 19:06:25.904905 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable
Oct  2 19:06:25.904910 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS
Oct  2 19:06:25.904917 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable
Oct  2 19:06:25.904923 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS
Oct  2 19:06:25.904928 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable
Oct  2 19:06:25.904935 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS
Oct  2 19:06:25.904941 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable
Oct  2 19:06:25.904946 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved
Oct  2 19:06:25.904952 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data
Oct  2 19:06:25.904958 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS
Oct  2 19:06:25.904965 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable
Oct  2 19:06:25.904972 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved
Oct  2 19:06:25.904978 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS
Oct  2 19:06:25.904983 kernel: NX (Execute Disable) protection: active
Oct  2 19:06:25.904989 kernel: e820: update [mem 0x9b3f7018-0x9b400c57] usable ==> usable
Oct  2 19:06:25.904995 kernel: e820: update [mem 0x9b3f7018-0x9b400c57] usable ==> usable
Oct  2 19:06:25.905001 kernel: e820: update [mem 0x9b1aa018-0x9b1e6e57] usable ==> usable
Oct  2 19:06:25.905007 kernel: e820: update [mem 0x9b1aa018-0x9b1e6e57] usable ==> usable
Oct  2 19:06:25.905012 kernel: extended physical RAM map:
Oct  2 19:06:25.905018 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable
Oct  2 19:06:25.905024 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable
Oct  2 19:06:25.905031 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS
Oct  2 19:06:25.905037 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable
Oct  2 19:06:25.905043 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS
Oct  2 19:06:25.905049 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable
Oct  2 19:06:25.905055 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS
Oct  2 19:06:25.905061 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b1aa017] usable
Oct  2 19:06:25.905067 kernel: reserve setup_data: [mem 0x000000009b1aa018-0x000000009b1e6e57] usable
Oct  2 19:06:25.905072 kernel: reserve setup_data: [mem 0x000000009b1e6e58-0x000000009b3f7017] usable
Oct  2 19:06:25.905078 kernel: reserve setup_data: [mem 0x000000009b3f7018-0x000000009b400c57] usable
Oct  2 19:06:25.905084 kernel: reserve setup_data: [mem 0x000000009b400c58-0x000000009c8eefff] usable
Oct  2 19:06:25.905090 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved
Oct  2 19:06:25.905097 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data
Oct  2 19:06:25.905103 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS
Oct  2 19:06:25.905114 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable
Oct  2 19:06:25.905120 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved
Oct  2 19:06:25.905129 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS
Oct  2 19:06:25.905135 kernel: efi: EFI v2.70 by EDK II
Oct  2 19:06:25.905142 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b773018 RNG=0x9cb75018 
Oct  2 19:06:25.905149 kernel: random: crng init done
Oct  2 19:06:25.905155 kernel: SMBIOS 2.8 present.
Oct  2 19:06:25.905162 kernel: DMI: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015
Oct  2 19:06:25.905168 kernel: Hypervisor detected: KVM
Oct  2 19:06:25.905174 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00
Oct  2 19:06:25.905186 kernel: kvm-clock: cpu 0, msr 70f8a001, primary cpu clock
Oct  2 19:06:25.905192 kernel: kvm-clock: using sched offset of 5015863335 cycles
Oct  2 19:06:25.905209 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns
Oct  2 19:06:25.905216 kernel: tsc: Detected 2794.748 MHz processor
Oct  2 19:06:25.905225 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved
Oct  2 19:06:25.905231 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable
Oct  2 19:06:25.905238 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000
Oct  2 19:06:25.905245 kernel: x86/PAT: Configuration [0-7]: WB  WC  UC- UC  WB  WP  UC- WT  
Oct  2 19:06:25.905251 kernel: Using GB pages for direct mapping
Oct  2 19:06:25.905258 kernel: Secure boot disabled
Oct  2 19:06:25.905264 kernel: ACPI: Early table checksum verification disabled
Oct  2 19:06:25.905271 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS )
Oct  2 19:06:25.905277 kernel: ACPI: XSDT 0x000000009CB7D0E8 00004C (v01 BOCHS  BXPC     00000001      01000013)
Oct  2 19:06:25.905285 kernel: ACPI: FACP 0x000000009CB7A000 000074 (v01 BOCHS  BXPC     00000001 BXPC 00000001)
Oct  2 19:06:25.905308 kernel: ACPI: DSDT 0x000000009CB7B000 001A39 (v01 BOCHS  BXPC     00000001 BXPC 00000001)
Oct  2 19:06:25.905314 kernel: ACPI: FACS 0x000000009CBDD000 000040
Oct  2 19:06:25.905321 kernel: ACPI: APIC 0x000000009CB79000 000090 (v01 BOCHS  BXPC     00000001 BXPC 00000001)
Oct  2 19:06:25.905327 kernel: ACPI: HPET 0x000000009CB78000 000038 (v01 BOCHS  BXPC     00000001 BXPC 00000001)
Oct  2 19:06:25.905334 kernel: ACPI: WAET 0x000000009CB77000 000028 (v01 BOCHS  BXPC     00000001 BXPC 00000001)
Oct  2 19:06:25.905340 kernel: ACPI: BGRT 0x000000009CB76000 000038 (v01 INTEL  EDK2     00000002      01000013)
Oct  2 19:06:25.905347 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb7a000-0x9cb7a073]
Oct  2 19:06:25.905353 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7b000-0x9cb7ca38]
Oct  2 19:06:25.905362 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f]
Oct  2 19:06:25.905368 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb79000-0x9cb7908f]
Oct  2 19:06:25.905375 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb78000-0x9cb78037]
Oct  2 19:06:25.905381 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb77000-0x9cb77027]
Oct  2 19:06:25.905388 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb76000-0x9cb76037]
Oct  2 19:06:25.905394 kernel: No NUMA configuration found
Oct  2 19:06:25.905401 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff]
Oct  2 19:06:25.905407 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff]
Oct  2 19:06:25.905414 kernel: Zone ranges:
Oct  2 19:06:25.905421 kernel:   DMA      [mem 0x0000000000001000-0x0000000000ffffff]
Oct  2 19:06:25.905428 kernel:   DMA32    [mem 0x0000000001000000-0x000000009cf3ffff]
Oct  2 19:06:25.905434 kernel:   Normal   empty
Oct  2 19:06:25.905441 kernel: Movable zone start for each node
Oct  2 19:06:25.905447 kernel: Early memory node ranges
Oct  2 19:06:25.905454 kernel:   node   0: [mem 0x0000000000001000-0x000000000009ffff]
Oct  2 19:06:25.905460 kernel:   node   0: [mem 0x0000000000100000-0x00000000007fffff]
Oct  2 19:06:25.905467 kernel:   node   0: [mem 0x0000000000808000-0x000000000080afff]
Oct  2 19:06:25.905473 kernel:   node   0: [mem 0x000000000080c000-0x000000000080ffff]
Oct  2 19:06:25.905485 kernel:   node   0: [mem 0x0000000000900000-0x000000009c8eefff]
Oct  2 19:06:25.905492 kernel:   node   0: [mem 0x000000009cbff000-0x000000009cf3ffff]
Oct  2 19:06:25.905498 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff]
Oct  2 19:06:25.905504 kernel: On node 0, zone DMA: 1 pages in unavailable ranges
Oct  2 19:06:25.905511 kernel: On node 0, zone DMA: 96 pages in unavailable ranges
Oct  2 19:06:25.905517 kernel: On node 0, zone DMA: 8 pages in unavailable ranges
Oct  2 19:06:25.905524 kernel: On node 0, zone DMA: 1 pages in unavailable ranges
Oct  2 19:06:25.905530 kernel: On node 0, zone DMA: 240 pages in unavailable ranges
Oct  2 19:06:25.905537 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges
Oct  2 19:06:25.905547 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges
Oct  2 19:06:25.905553 kernel: ACPI: PM-Timer IO Port: 0xb008
Oct  2 19:06:25.905560 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1])
Oct  2 19:06:25.905566 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23
Oct  2 19:06:25.905573 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
Oct  2 19:06:25.905580 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level)
Oct  2 19:06:25.905586 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
Oct  2 19:06:25.905593 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level)
Oct  2 19:06:25.905599 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level)
Oct  2 19:06:25.905609 kernel: ACPI: Using ACPI (MADT) for SMP configuration information
Oct  2 19:06:25.905616 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000
Oct  2 19:06:25.905622 kernel: TSC deadline timer available
Oct  2 19:06:25.905629 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs
Oct  2 19:06:25.905635 kernel: kvm-guest: KVM setup pv remote TLB flush
Oct  2 19:06:25.905642 kernel: kvm-guest: setup PV sched yield
Oct  2 19:06:25.905649 kernel: [mem 0x9d000000-0xffffffff] available for PCI devices
Oct  2 19:06:25.905655 kernel: Booting paravirtualized kernel on KVM
Oct  2 19:06:25.905662 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns
Oct  2 19:06:25.905668 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1
Oct  2 19:06:25.905679 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u524288
Oct  2 19:06:25.905685 kernel: pcpu-alloc: s185624 r8192 d31464 u524288 alloc=1*2097152
Oct  2 19:06:25.905702 kernel: pcpu-alloc: [0] 0 1 2 3 
Oct  2 19:06:25.905712 kernel: kvm-guest: setup async PF for cpu 0
Oct  2 19:06:25.905719 kernel: kvm-guest: stealtime: cpu 0, msr 9ae1c0c0
Oct  2 19:06:25.905726 kernel: kvm-guest: PV spinlocks enabled
Oct  2 19:06:25.905732 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear)
Oct  2 19:06:25.905739 kernel: Built 1 zonelists, mobility grouping on.  Total pages: 629759
Oct  2 19:06:25.905746 kernel: Policy zone: DMA32
Oct  2 19:06:25.905754 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1
Oct  2 19:06:25.905761 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space.
Oct  2 19:06:25.905771 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear)
Oct  2 19:06:25.905778 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear)
Oct  2 19:06:25.905785 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off
Oct  2 19:06:25.905793 kernel: Memory: 2400436K/2567000K available (12294K kernel code, 2274K rwdata, 13692K rodata, 45372K init, 4176K bss, 166304K reserved, 0K cma-reserved)
Oct  2 19:06:25.905804 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1
Oct  2 19:06:25.905810 kernel: ftrace: allocating 34453 entries in 135 pages
Oct  2 19:06:25.905817 kernel: ftrace: allocated 135 pages with 4 groups
Oct  2 19:06:25.905824 kernel: rcu: Hierarchical RCU implementation.
Oct  2 19:06:25.905832 kernel: rcu:         RCU event tracing is enabled.
Oct  2 19:06:25.905839 kernel: rcu:         RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4.
Oct  2 19:06:25.905846 kernel:         Rude variant of Tasks RCU enabled.
Oct  2 19:06:25.905853 kernel:         Tracing variant of Tasks RCU enabled.
Oct  2 19:06:25.905860 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies.
Oct  2 19:06:25.905870 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4
Oct  2 19:06:25.905877 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16
Oct  2 19:06:25.905884 kernel: Console: colour dummy device 80x25
Oct  2 19:06:25.905891 kernel: printk: console [ttyS0] enabled
Oct  2 19:06:25.905897 kernel: ACPI: Core revision 20210730
Oct  2 19:06:25.905904 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns
Oct  2 19:06:25.905911 kernel: APIC: Switch to symmetric I/O mode setup
Oct  2 19:06:25.905918 kernel: x2apic enabled
Oct  2 19:06:25.905925 kernel: Switched APIC routing to physical x2apic.
Oct  2 19:06:25.905932 kernel: kvm-guest: setup PV IPIs
Oct  2 19:06:25.905942 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1
Oct  2 19:06:25.905949 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized
Oct  2 19:06:25.905956 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748)
Oct  2 19:06:25.905963 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated
Oct  2 19:06:25.905970 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127
Oct  2 19:06:25.905977 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0
Oct  2 19:06:25.905984 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization
Oct  2 19:06:25.905991 kernel: Spectre V2 : Mitigation: Retpolines
Oct  2 19:06:25.906001 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch
Oct  2 19:06:25.906008 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT
Oct  2 19:06:25.906015 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls
Oct  2 19:06:25.906022 kernel: RETBleed: Mitigation: untrained return thunk
Oct  2 19:06:25.906029 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier
Oct  2 19:06:25.906036 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp
Oct  2 19:06:25.906043 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
Oct  2 19:06:25.906050 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
Oct  2 19:06:25.906057 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
Oct  2 19:06:25.906067 kernel: x86/fpu: xstate_offset[2]:  576, xstate_sizes[2]:  256
Oct  2 19:06:25.906074 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format.
Oct  2 19:06:25.906081 kernel: Freeing SMP alternatives memory: 32K
Oct  2 19:06:25.906088 kernel: pid_max: default: 32768 minimum: 301
Oct  2 19:06:25.906095 kernel: LSM: Security Framework initializing
Oct  2 19:06:25.906101 kernel: SELinux:  Initializing.
Oct  2 19:06:25.906114 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear)
Oct  2 19:06:25.906121 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear)
Oct  2 19:06:25.906128 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0)
Oct  2 19:06:25.906138 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver.
Oct  2 19:06:25.906145 kernel: ... version:                0
Oct  2 19:06:25.906152 kernel: ... bit width:              48
Oct  2 19:06:25.906159 kernel: ... generic registers:      6
Oct  2 19:06:25.906166 kernel: ... value mask:             0000ffffffffffff
Oct  2 19:06:25.906173 kernel: ... max period:             00007fffffffffff
Oct  2 19:06:25.906180 kernel: ... fixed-purpose events:   0
Oct  2 19:06:25.906186 kernel: ... event mask:             000000000000003f
Oct  2 19:06:25.906193 kernel: signal: max sigframe size: 1776
Oct  2 19:06:25.906212 kernel: rcu: Hierarchical SRCU implementation.
Oct  2 19:06:25.906219 kernel: smp: Bringing up secondary CPUs ...
Oct  2 19:06:25.906226 kernel: x86: Booting SMP configuration:
Oct  2 19:06:25.906233 kernel: .... node  #0, CPUs:      #1
Oct  2 19:06:25.906239 kernel: kvm-clock: cpu 1, msr 70f8a041, secondary cpu clock
Oct  2 19:06:25.906246 kernel: kvm-guest: setup async PF for cpu 1
Oct  2 19:06:25.906253 kernel: kvm-guest: stealtime: cpu 1, msr 9ae9c0c0
Oct  2 19:06:25.906260 kernel:  #2
Oct  2 19:06:25.906267 kernel: kvm-clock: cpu 2, msr 70f8a081, secondary cpu clock
Oct  2 19:06:25.906274 kernel: kvm-guest: setup async PF for cpu 2
Oct  2 19:06:25.906284 kernel: kvm-guest: stealtime: cpu 2, msr 9af1c0c0
Oct  2 19:06:25.906291 kernel:  #3
Oct  2 19:06:25.906297 kernel: kvm-clock: cpu 3, msr 70f8a0c1, secondary cpu clock
Oct  2 19:06:25.906304 kernel: kvm-guest: setup async PF for cpu 3
Oct  2 19:06:25.906311 kernel: kvm-guest: stealtime: cpu 3, msr 9af9c0c0
Oct  2 19:06:25.906318 kernel: smp: Brought up 1 node, 4 CPUs
Oct  2 19:06:25.906325 kernel: smpboot: Max logical packages: 1
Oct  2 19:06:25.906331 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS)
Oct  2 19:06:25.906338 kernel: devtmpfs: initialized
Oct  2 19:06:25.906348 kernel: x86/mm: Memory block size: 128MB
Oct  2 19:06:25.906355 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes)
Oct  2 19:06:25.906363 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes)
Oct  2 19:06:25.906369 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes)
Oct  2 19:06:25.906376 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes)
Oct  2 19:06:25.906383 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes)
Oct  2 19:06:25.906390 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns
Oct  2 19:06:25.906398 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear)
Oct  2 19:06:25.906404 kernel: pinctrl core: initialized pinctrl subsystem
Oct  2 19:06:25.906415 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family
Oct  2 19:06:25.906422 kernel: audit: initializing netlink subsys (disabled)
Oct  2 19:06:25.906429 kernel: audit: type=2000 audit(1696273585.586:1): state=initialized audit_enabled=0 res=1
Oct  2 19:06:25.906435 kernel: thermal_sys: Registered thermal governor 'step_wise'
Oct  2 19:06:25.906442 kernel: thermal_sys: Registered thermal governor 'user_space'
Oct  2 19:06:25.906449 kernel: cpuidle: using governor menu
Oct  2 19:06:25.906456 kernel: ACPI: bus type PCI registered
Oct  2 19:06:25.906463 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5
Oct  2 19:06:25.906469 kernel: dca service started, version 1.12.1
Oct  2 19:06:25.906480 kernel: PCI: Using configuration type 1 for base access
Oct  2 19:06:25.906486 kernel: PCI: Using configuration type 1 for extended access
Oct  2 19:06:25.906493 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible.
Oct  2 19:06:25.906500 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages
Oct  2 19:06:25.906507 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages
Oct  2 19:06:25.906514 kernel: ACPI: Added _OSI(Module Device)
Oct  2 19:06:25.906521 kernel: ACPI: Added _OSI(Processor Device)
Oct  2 19:06:25.906528 kernel: ACPI: Added _OSI(3.0 _SCP Extensions)
Oct  2 19:06:25.906534 kernel: ACPI: Added _OSI(Processor Aggregator Device)
Oct  2 19:06:25.906545 kernel: ACPI: Added _OSI(Linux-Dell-Video)
Oct  2 19:06:25.906552 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio)
Oct  2 19:06:25.906559 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics)
Oct  2 19:06:25.906566 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded
Oct  2 19:06:25.906572 kernel: ACPI: Interpreter enabled
Oct  2 19:06:25.906579 kernel: ACPI: PM: (supports S0 S3 S5)
Oct  2 19:06:25.906586 kernel: ACPI: Using IOAPIC for interrupt routing
Oct  2 19:06:25.906593 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug
Oct  2 19:06:25.906600 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F
Oct  2 19:06:25.906610 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff])
Oct  2 19:06:25.906754 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3]
Oct  2 19:06:25.906766 kernel: acpiphp: Slot [3] registered
Oct  2 19:06:25.906773 kernel: acpiphp: Slot [4] registered
Oct  2 19:06:25.906780 kernel: acpiphp: Slot [5] registered
Oct  2 19:06:25.906787 kernel: acpiphp: Slot [6] registered
Oct  2 19:06:25.906794 kernel: acpiphp: Slot [7] registered
Oct  2 19:06:25.906800 kernel: acpiphp: Slot [8] registered
Oct  2 19:06:25.906813 kernel: acpiphp: Slot [9] registered
Oct  2 19:06:25.906820 kernel: acpiphp: Slot [10] registered
Oct  2 19:06:25.906826 kernel: acpiphp: Slot [11] registered
Oct  2 19:06:25.906833 kernel: acpiphp: Slot [12] registered
Oct  2 19:06:25.906840 kernel: acpiphp: Slot [13] registered
Oct  2 19:06:25.906847 kernel: acpiphp: Slot [14] registered
Oct  2 19:06:25.906853 kernel: acpiphp: Slot [15] registered
Oct  2 19:06:25.906860 kernel: acpiphp: Slot [16] registered
Oct  2 19:06:25.906867 kernel: acpiphp: Slot [17] registered
Oct  2 19:06:25.906874 kernel: acpiphp: Slot [18] registered
Oct  2 19:06:25.906884 kernel: acpiphp: Slot [19] registered
Oct  2 19:06:25.906893 kernel: acpiphp: Slot [20] registered
Oct  2 19:06:25.906908 kernel: acpiphp: Slot [21] registered
Oct  2 19:06:25.906918 kernel: acpiphp: Slot [22] registered
Oct  2 19:06:25.906927 kernel: acpiphp: Slot [23] registered
Oct  2 19:06:25.906936 kernel: acpiphp: Slot [24] registered
Oct  2 19:06:25.906944 kernel: acpiphp: Slot [25] registered
Oct  2 19:06:25.906951 kernel: acpiphp: Slot [26] registered
Oct  2 19:06:25.906958 kernel: acpiphp: Slot [27] registered
Oct  2 19:06:25.906972 kernel: acpiphp: Slot [28] registered
Oct  2 19:06:25.906979 kernel: acpiphp: Slot [29] registered
Oct  2 19:06:25.906985 kernel: acpiphp: Slot [30] registered
Oct  2 19:06:25.906992 kernel: acpiphp: Slot [31] registered
Oct  2 19:06:25.907001 kernel: PCI host bridge to bus 0000:00
Oct  2 19:06:25.907137 kernel: pci_bus 0000:00: root bus resource [io  0x0000-0x0cf7 window]
Oct  2 19:06:25.907225 kernel: pci_bus 0000:00: root bus resource [io  0x0d00-0xffff window]
Oct  2 19:06:25.907296 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window]
Oct  2 19:06:25.907367 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xfebfffff window]
Oct  2 19:06:25.907431 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0x87fffffff window]
Oct  2 19:06:25.907495 kernel: pci_bus 0000:00: root bus resource [bus 00-ff]
Oct  2 19:06:25.907590 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000
Oct  2 19:06:25.907729 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100
Oct  2 19:06:25.907872 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180
Oct  2 19:06:25.907981 kernel: pci 0000:00:01.1: reg 0x20: [io  0xc0c0-0xc0cf]
Oct  2 19:06:25.908056 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io  0x01f0-0x01f7]
Oct  2 19:06:25.908139 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io  0x03f6]
Oct  2 19:06:25.908225 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io  0x0170-0x0177]
Oct  2 19:06:25.908298 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io  0x0376]
Oct  2 19:06:25.908383 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000
Oct  2 19:06:25.908457 kernel: pci 0000:00:01.3: quirk: [io  0xb000-0xb03f] claimed by PIIX4 ACPI
Oct  2 19:06:25.908539 kernel: pci 0000:00:01.3: quirk: [io  0xb100-0xb10f] claimed by PIIX4 SMB
Oct  2 19:06:25.908639 kernel: pci 0000:00:02.0: [1234:1111] type 00 class 0x030000
Oct  2 19:06:25.908713 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref]
Oct  2 19:06:25.908784 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xc1043000-0xc1043fff]
Oct  2 19:06:25.908857 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xffff0000-0xffffffff pref]
Oct  2 19:06:25.908930 kernel: pci 0000:00:02.0: BAR 0: assigned to efifb
Oct  2 19:06:25.909159 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff]
Oct  2 19:06:25.909282 kernel: pci 0000:00:03.0: [1af4:1005] type 00 class 0x00ff00
Oct  2 19:06:25.909360 kernel: pci 0000:00:03.0: reg 0x10: [io  0xc0a0-0xc0bf]
Oct  2 19:06:25.909437 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff]
Oct  2 19:06:25.909510 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref]
Oct  2 19:06:25.909595 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000
Oct  2 19:06:25.909668 kernel: pci 0000:00:04.0: reg 0x10: [io  0xc000-0xc07f]
Oct  2 19:06:25.909740 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff]
Oct  2 19:06:25.909819 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref]
Oct  2 19:06:25.910009 kernel: pci 0000:00:05.0: [1af4:1000] type 00 class 0x020000
Oct  2 19:06:25.911416 kernel: pci 0000:00:05.0: reg 0x10: [io  0xc080-0xc09f]
Oct  2 19:06:25.911525 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc1040000-0xc1040fff]
Oct  2 19:06:25.911600 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref]
Oct  2 19:06:25.911673 kernel: pci 0000:00:05.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref]
Oct  2 19:06:25.911683 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10
Oct  2 19:06:25.911703 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10
Oct  2 19:06:25.911710 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11
Oct  2 19:06:25.911717 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11
Oct  2 19:06:25.911725 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9
Oct  2 19:06:25.911732 kernel: iommu: Default domain type: Translated 
Oct  2 19:06:25.911740 kernel: iommu: DMA domain TLB invalidation policy: lazy mode 
Oct  2 19:06:25.911819 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device
Oct  2 19:06:25.911892 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none
Oct  2 19:06:25.911963 kernel: pci 0000:00:02.0: vgaarb: bridge control possible
Oct  2 19:06:25.911979 kernel: vgaarb: loaded
Oct  2 19:06:25.911986 kernel: pps_core: LinuxPPS API ver. 1 registered
Oct  2 19:06:25.911995 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>
Oct  2 19:06:25.912002 kernel: PTP clock support registered
Oct  2 19:06:25.912009 kernel: Registered efivars operations
Oct  2 19:06:25.912016 kernel: PCI: Using ACPI for IRQ routing
Oct  2 19:06:25.912024 kernel: PCI: pci_cache_line_size set to 64 bytes
Oct  2 19:06:25.912031 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff]
Oct  2 19:06:25.912038 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff]
Oct  2 19:06:25.912049 kernel: e820: reserve RAM buffer [mem 0x9b1aa018-0x9bffffff]
Oct  2 19:06:25.912057 kernel: e820: reserve RAM buffer [mem 0x9b3f7018-0x9bffffff]
Oct  2 19:06:25.912064 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff]
Oct  2 19:06:25.912071 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff]
Oct  2 19:06:25.912078 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0
Oct  2 19:06:25.912086 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter
Oct  2 19:06:25.912093 kernel: clocksource: Switched to clocksource kvm-clock
Oct  2 19:06:25.912100 kernel: VFS: Disk quotas dquot_6.6.0
Oct  2 19:06:25.912120 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
Oct  2 19:06:25.912127 kernel: pnp: PnP ACPI init
Oct  2 19:06:25.912233 kernel: pnp 00:02: [dma 2]
Oct  2 19:06:25.912245 kernel: pnp: PnP ACPI: found 6 devices
Oct  2 19:06:25.912252 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns
Oct  2 19:06:25.912260 kernel: NET: Registered PF_INET protocol family
Oct  2 19:06:25.912267 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear)
Oct  2 19:06:25.912275 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear)
Oct  2 19:06:25.912282 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear)
Oct  2 19:06:25.912295 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear)
Oct  2 19:06:25.912302 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear)
Oct  2 19:06:25.912310 kernel: TCP: Hash tables configured (established 32768 bind 32768)
Oct  2 19:06:25.912317 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear)
Oct  2 19:06:25.912325 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear)
Oct  2 19:06:25.912332 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family
Oct  2 19:06:25.912340 kernel: NET: Registered PF_XDP protocol family
Oct  2 19:06:25.912417 kernel: pci 0000:00:05.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window
Oct  2 19:06:25.912526 kernel: pci 0000:00:05.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref]
Oct  2 19:06:25.912632 kernel: pci_bus 0000:00: resource 4 [io  0x0000-0x0cf7 window]
Oct  2 19:06:25.912701 kernel: pci_bus 0000:00: resource 5 [io  0x0d00-0xffff window]
Oct  2 19:06:25.912766 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window]
Oct  2 19:06:25.912832 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xfebfffff window]
Oct  2 19:06:25.912898 kernel: pci_bus 0000:00: resource 8 [mem 0x800000000-0x87fffffff window]
Oct  2 19:06:25.912976 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release
Oct  2 19:06:25.913054 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers
Oct  2 19:06:25.913146 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds
Oct  2 19:06:25.913156 kernel: PCI: CLS 0 bytes, default 64
Oct  2 19:06:25.913164 kernel: Initialise system trusted keyrings
Oct  2 19:06:25.913172 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0
Oct  2 19:06:25.913179 kernel: Key type asymmetric registered
Oct  2 19:06:25.913187 kernel: Asymmetric key parser 'x509' registered
Oct  2 19:06:25.913204 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249)
Oct  2 19:06:25.913212 kernel: io scheduler mq-deadline registered
Oct  2 19:06:25.913225 kernel: io scheduler kyber registered
Oct  2 19:06:25.913233 kernel: io scheduler bfq registered
Oct  2 19:06:25.913241 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00
Oct  2 19:06:25.913249 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11
Oct  2 19:06:25.913257 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10
Oct  2 19:06:25.913264 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10
Oct  2 19:06:25.913272 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled
Oct  2 19:06:25.913279 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A
Oct  2 19:06:25.913287 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12
Oct  2 19:06:25.913299 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1
Oct  2 19:06:25.913306 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12
Oct  2 19:06:25.913314 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0
Oct  2 19:06:25.913408 kernel: rtc_cmos 00:05: RTC can wake from S4
Oct  2 19:06:25.913478 kernel: rtc_cmos 00:05: registered as rtc0
Oct  2 19:06:25.913552 kernel: rtc_cmos 00:05: setting system clock to 2023-10-02T19:06:25 UTC (1696273585)
Oct  2 19:06:25.913620 kernel: rtc_cmos 00:05: alarms up to one day, y3k, 242 bytes nvram, hpet irqs
Oct  2 19:06:25.913629 kernel: efifb: probing for efifb
Oct  2 19:06:25.913637 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k
Oct  2 19:06:25.913644 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1
Oct  2 19:06:25.913652 kernel: efifb: scrolling: redraw
Oct  2 19:06:25.913659 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0
Oct  2 19:06:25.913669 kernel: Console: switching to colour frame buffer device 160x50
Oct  2 19:06:25.913676 kernel: fb0: EFI VGA frame buffer device
Oct  2 19:06:25.913689 kernel: pstore: Registered efi as persistent store backend
Oct  2 19:06:25.913697 kernel: NET: Registered PF_INET6 protocol family
Oct  2 19:06:25.913705 kernel: Segment Routing with IPv6
Oct  2 19:06:25.913712 kernel: In-situ OAM (IOAM) with IPv6
Oct  2 19:06:25.913720 kernel: NET: Registered PF_PACKET protocol family
Oct  2 19:06:25.913727 kernel: Key type dns_resolver registered
Oct  2 19:06:25.913735 kernel: IPI shorthand broadcast: enabled
Oct  2 19:06:25.913744 kernel: sched_clock: Marking stable (394038465, 93346824)->(530528340, -43143051)
Oct  2 19:06:25.913752 kernel: registered taskstats version 1
Oct  2 19:06:25.913763 kernel: Loading compiled-in X.509 certificates
Oct  2 19:06:25.913770 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 6f9e51af8b3ef67eb6e93ecfe77d55665ad3d861'
Oct  2 19:06:25.913778 kernel: Key type .fscrypt registered
Oct  2 19:06:25.913785 kernel: Key type fscrypt-provisioning registered
Oct  2 19:06:25.913793 kernel: pstore: Using crash dump compression: deflate
Oct  2 19:06:25.913800 kernel: ima: No TPM chip found, activating TPM-bypass!
Oct  2 19:06:25.913808 kernel: ima: Allocated hash algorithm: sha1
Oct  2 19:06:25.913815 kernel: ima: No architecture policies found
Oct  2 19:06:25.913823 kernel: Freeing unused kernel image (initmem) memory: 45372K
Oct  2 19:06:25.913833 kernel: Write protecting the kernel read-only data: 28672k
Oct  2 19:06:25.913841 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K
Oct  2 19:06:25.913849 kernel: Freeing unused kernel image (rodata/data gap) memory: 644K
Oct  2 19:06:25.913856 kernel: Run /init as init process
Oct  2 19:06:25.913863 kernel:   with arguments:
Oct  2 19:06:25.913871 kernel:     /init
Oct  2 19:06:25.913878 kernel:   with environment:
Oct  2 19:06:25.913885 kernel:     HOME=/
Oct  2 19:06:25.913892 kernel:     TERM=linux
Oct  2 19:06:25.913903 kernel:     BOOT_IMAGE=/flatcar/vmlinuz-a
Oct  2 19:06:25.913913 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
Oct  2 19:06:25.913924 systemd[1]: Detected virtualization kvm.
Oct  2 19:06:25.913932 systemd[1]: Detected architecture x86-64.
Oct  2 19:06:25.913940 systemd[1]: Running in initrd.
Oct  2 19:06:25.913948 systemd[1]: No hostname configured, using default hostname.
Oct  2 19:06:25.913956 systemd[1]: Hostname set to <localhost>.
Oct  2 19:06:25.913967 systemd[1]: Initializing machine ID from VM UUID.
Oct  2 19:06:25.913975 systemd[1]: Queued start job for default target initrd.target.
Oct  2 19:06:25.913983 systemd[1]: Started systemd-ask-password-console.path.
Oct  2 19:06:25.913991 systemd[1]: Reached target cryptsetup.target.
Oct  2 19:06:25.913998 systemd[1]: Reached target paths.target.
Oct  2 19:06:25.914006 systemd[1]: Reached target slices.target.
Oct  2 19:06:25.914014 systemd[1]: Reached target swap.target.
Oct  2 19:06:25.914022 systemd[1]: Reached target timers.target.
Oct  2 19:06:25.914033 systemd[1]: Listening on iscsid.socket.
Oct  2 19:06:25.914041 systemd[1]: Listening on iscsiuio.socket.
Oct  2 19:06:25.914049 systemd[1]: Listening on systemd-journald-audit.socket.
Oct  2 19:06:25.914057 systemd[1]: Listening on systemd-journald-dev-log.socket.
Oct  2 19:06:25.914065 systemd[1]: Listening on systemd-journald.socket.
Oct  2 19:06:25.914073 systemd[1]: Listening on systemd-networkd.socket.
Oct  2 19:06:25.914081 systemd[1]: Listening on systemd-udevd-control.socket.
Oct  2 19:06:25.914089 systemd[1]: Listening on systemd-udevd-kernel.socket.
Oct  2 19:06:25.914100 systemd[1]: Reached target sockets.target.
Oct  2 19:06:25.914116 systemd[1]: Starting kmod-static-nodes.service...
Oct  2 19:06:25.914124 systemd[1]: Finished network-cleanup.service.
Oct  2 19:06:25.914132 systemd[1]: Starting systemd-fsck-usr.service...
Oct  2 19:06:25.914140 systemd[1]: Starting systemd-journald.service...
Oct  2 19:06:25.914148 systemd[1]: Starting systemd-modules-load.service...
Oct  2 19:06:25.914156 systemd[1]: Starting systemd-resolved.service...
Oct  2 19:06:25.914164 systemd[1]: Starting systemd-vconsole-setup.service...
Oct  2 19:06:25.914172 systemd[1]: Finished kmod-static-nodes.service.
Oct  2 19:06:25.914183 systemd[1]: Finished systemd-fsck-usr.service.
Oct  2 19:06:25.914191 systemd[1]: Starting systemd-tmpfiles-setup-dev.service...
Oct  2 19:06:25.914210 systemd[1]: Finished systemd-vconsole-setup.service.
Oct  2 19:06:25.914219 kernel: audit: type=1130 audit(1696273585.910:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:25.914227 systemd[1]: Finished systemd-tmpfiles-setup-dev.service.
Oct  2 19:06:25.914235 kernel: audit: type=1130 audit(1696273585.913:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:25.914247 systemd-journald[198]: Journal started
Oct  2 19:06:25.914297 systemd-journald[198]: Runtime Journal (/run/log/journal/be63e13c95dc49e1ba630a7a02b49012) is 6.0M, max 48.4M, 42.4M free.
Oct  2 19:06:25.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:25.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:25.907929 systemd-modules-load[199]: Inserted module 'overlay'
Oct  2 19:06:25.916746 systemd[1]: Started systemd-journald.service.
Oct  2 19:06:25.919230 kernel: audit: type=1130 audit(1696273585.917:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:25.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:25.918061 systemd[1]: Starting dracut-cmdline-ask.service...
Oct  2 19:06:25.933704 systemd-resolved[200]: Positive Trust Anchors:
Oct  2 19:06:25.933730 systemd-resolved[200]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Oct  2 19:06:25.933784 systemd-resolved[200]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
Oct  2 19:06:25.936918 systemd[1]: Finished dracut-cmdline-ask.service.
Oct  2 19:06:25.942648 kernel: audit: type=1130 audit(1696273585.939:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:25.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:25.937496 systemd-resolved[200]: Defaulting to hostname 'linux'.
Oct  2 19:06:25.946229 kernel: audit: type=1130 audit(1696273585.943:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:25.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:25.939616 systemd[1]: Started systemd-resolved.service.
Oct  2 19:06:25.943352 systemd[1]: Reached target nss-lookup.target.
Oct  2 19:06:25.948392 systemd[1]: Starting dracut-cmdline.service...
Oct  2 19:06:25.952238 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this.
Oct  2 19:06:25.954891 systemd-modules-load[199]: Inserted module 'br_netfilter'
Oct  2 19:06:25.955781 kernel: Bridge firewalling registered
Oct  2 19:06:25.962146 dracut-cmdline[216]: dracut-dracut-053
Oct  2 19:06:25.965747 dracut-cmdline[216]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1
Oct  2 19:06:25.981246 kernel: SCSI subsystem initialized
Oct  2 19:06:25.993825 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log.
Oct  2 19:06:25.993858 kernel: device-mapper: uevent: version 1.0.3
Oct  2 19:06:25.993870 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com
Oct  2 19:06:25.996690 systemd-modules-load[199]: Inserted module 'dm_multipath'
Oct  2 19:06:25.998244 systemd[1]: Finished systemd-modules-load.service.
Oct  2 19:06:25.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:26.000179 systemd[1]: Starting systemd-sysctl.service...
Oct  2 19:06:26.002239 kernel: audit: type=1130 audit(1696273585.999:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:26.006699 systemd[1]: Finished systemd-sysctl.service.
Oct  2 19:06:26.009372 kernel: audit: type=1130 audit(1696273586.006:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:26.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:26.031217 kernel: Loading iSCSI transport class v2.0-870.
Oct  2 19:06:26.041219 kernel: iscsi: registered transport (tcp)
Oct  2 19:06:26.062223 kernel: iscsi: registered transport (qla4xxx)
Oct  2 19:06:26.062257 kernel: QLogic iSCSI HBA Driver
Oct  2 19:06:26.091170 systemd[1]: Finished dracut-cmdline.service.
Oct  2 19:06:26.094471 kernel: audit: type=1130 audit(1696273586.091:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:26.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:26.092109 systemd[1]: Starting dracut-pre-udev.service...
Oct  2 19:06:26.139222 kernel: raid6: avx2x4   gen() 30445 MB/s
Oct  2 19:06:26.156213 kernel: raid6: avx2x4   xor()  6303 MB/s
Oct  2 19:06:26.173223 kernel: raid6: avx2x2   gen() 32266 MB/s
Oct  2 19:06:26.190248 kernel: raid6: avx2x2   xor() 19207 MB/s
Oct  2 19:06:26.207234 kernel: raid6: avx2x1   gen() 26564 MB/s
Oct  2 19:06:26.224234 kernel: raid6: avx2x1   xor() 15284 MB/s
Oct  2 19:06:26.241242 kernel: raid6: sse2x4   gen() 14564 MB/s
Oct  2 19:06:26.258238 kernel: raid6: sse2x4   xor()  7040 MB/s
Oct  2 19:06:26.275224 kernel: raid6: sse2x2   gen() 16221 MB/s
Oct  2 19:06:26.292233 kernel: raid6: sse2x2   xor()  9777 MB/s
Oct  2 19:06:26.309228 kernel: raid6: sse2x1   gen() 10855 MB/s
Oct  2 19:06:26.326604 kernel: raid6: sse2x1   xor()  7398 MB/s
Oct  2 19:06:26.326690 kernel: raid6: using algorithm avx2x2 gen() 32266 MB/s
Oct  2 19:06:26.326715 kernel: raid6: .... xor() 19207 MB/s, rmw enabled
Oct  2 19:06:26.326724 kernel: raid6: using avx2x2 recovery algorithm
Oct  2 19:06:26.344239 kernel: xor: automatically using best checksumming function   avx       
Oct  2 19:06:26.445229 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no
Oct  2 19:06:26.454483 systemd[1]: Finished dracut-pre-udev.service.
Oct  2 19:06:26.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:26.457000 audit: BPF prog-id=7 op=LOAD
Oct  2 19:06:26.457000 audit: BPF prog-id=8 op=LOAD
Oct  2 19:06:26.458222 kernel: audit: type=1130 audit(1696273586.455:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:26.458434 systemd[1]: Starting systemd-udevd.service...
Oct  2 19:06:26.473011 systemd-udevd[401]: Using default interface naming scheme 'v252'.
Oct  2 19:06:26.477135 systemd[1]: Started systemd-udevd.service.
Oct  2 19:06:26.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:26.479594 systemd[1]: Starting dracut-pre-trigger.service...
Oct  2 19:06:26.490859 dracut-pre-trigger[408]: rd.md=0: removing MD RAID activation
Oct  2 19:06:26.515521 systemd[1]: Finished dracut-pre-trigger.service.
Oct  2 19:06:26.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:26.516480 systemd[1]: Starting systemd-udev-trigger.service...
Oct  2 19:06:26.554094 systemd[1]: Finished systemd-udev-trigger.service.
Oct  2 19:06:26.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:26.586216 kernel: cryptd: max_cpu_qlen set to 1000
Oct  2 19:06:26.588227 kernel: virtio_blk virtio1: [vda] 9289728 512-byte logical blocks (4.76 GB/4.43 GiB)
Oct  2 19:06:26.590617 kernel:  vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9
Oct  2 19:06:26.595567 kernel: AVX2 version of gcm_enc/dec engaged.
Oct  2 19:06:26.595589 kernel: AES CTR mode by8 optimization enabled
Oct  2 19:06:26.601228 kernel: libata version 3.00 loaded.
Oct  2 19:06:26.604219 kernel: ata_piix 0000:00:01.1: version 2.13
Oct  2 19:06:26.604375 kernel: scsi host0: ata_piix
Oct  2 19:06:26.605737 kernel: scsi host1: ata_piix
Oct  2 19:06:26.605867 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0c0 irq 14
Oct  2 19:06:26.605878 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0c8 irq 15
Oct  2 19:06:26.629669 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device.
Oct  2 19:06:26.631725 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (448)
Oct  2 19:06:26.632593 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device.
Oct  2 19:06:26.633542 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device.
Oct  2 19:06:26.638608 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device.
Oct  2 19:06:26.647302 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device.
Oct  2 19:06:26.648747 systemd[1]: Starting disk-uuid.service...
Oct  2 19:06:26.656416 kernel:  vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9
Oct  2 19:06:26.660219 kernel:  vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9
Oct  2 19:06:26.761226 kernel: ata2.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100
Oct  2 19:06:26.761301 kernel: scsi 1:0:0:0: CD-ROM            QEMU     QEMU DVD-ROM     2.5+ PQ: 0 ANSI: 5
Oct  2 19:06:26.793241 kernel: sr 1:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray
Oct  2 19:06:26.793525 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20
Oct  2 19:06:26.810223 kernel: sr 1:0:0:0: Attached scsi CD-ROM sr0
Oct  2 19:06:27.704221 kernel:  vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9
Oct  2 19:06:27.704280 disk-uuid[520]: The operation has completed successfully.
Oct  2 19:06:27.724435 systemd[1]: disk-uuid.service: Deactivated successfully.
Oct  2 19:06:27.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:27.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:27.724521 systemd[1]: Finished disk-uuid.service.
Oct  2 19:06:27.732855 systemd[1]: Starting verity-setup.service...
Oct  2 19:06:27.745225 kernel: device-mapper: verity: sha256 using implementation "sha256-generic"
Oct  2 19:06:27.772563 systemd[1]: Found device dev-mapper-usr.device.
Oct  2 19:06:27.774323 systemd[1]: Mounting sysusr-usr.mount...
Oct  2 19:06:27.777313 systemd[1]: Finished verity-setup.service.
Oct  2 19:06:27.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:27.847225 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none.
Oct  2 19:06:27.847289 systemd[1]: Mounted sysusr-usr.mount.
Oct  2 19:06:27.847912 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met.
Oct  2 19:06:27.848584 systemd[1]: Starting ignition-setup.service...
Oct  2 19:06:27.850816 systemd[1]: Starting parse-ip-for-networkd.service...
Oct  2 19:06:27.857861 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm
Oct  2 19:06:27.857897 kernel: BTRFS info (device vda6): using free space tree
Oct  2 19:06:27.857907 kernel: BTRFS info (device vda6): has skinny extents
Oct  2 19:06:27.865938 systemd[1]: mnt-oem.mount: Deactivated successfully.
Oct  2 19:06:27.873479 systemd[1]: Finished ignition-setup.service.
Oct  2 19:06:27.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:27.875177 systemd[1]: Starting ignition-fetch-offline.service...
Oct  2 19:06:27.926775 systemd[1]: Finished parse-ip-for-networkd.service.
Oct  2 19:06:27.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:27.928000 audit: BPF prog-id=9 op=LOAD
Oct  2 19:06:27.929179 systemd[1]: Starting systemd-networkd.service...
Oct  2 19:06:27.949859 systemd-networkd[698]: lo: Link UP
Oct  2 19:06:27.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:27.949870 systemd-networkd[698]: lo: Gained carrier
Oct  2 19:06:27.950675 systemd-networkd[698]: Enumeration completed
Oct  2 19:06:27.950815 systemd[1]: Started systemd-networkd.service.
Oct  2 19:06:27.950927 systemd-networkd[698]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network.
Oct  2 19:06:27.951851 systemd[1]: Reached target network.target.
Oct  2 19:06:27.952290 systemd-networkd[698]: eth0: Link UP
Oct  2 19:06:27.952294 systemd-networkd[698]: eth0: Gained carrier
Oct  2 19:06:27.953333 systemd[1]: Starting iscsiuio.service...
Oct  2 19:06:27.958168 systemd[1]: Started iscsiuio.service.
Oct  2 19:06:27.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:27.959842 systemd[1]: Starting iscsid.service...
Oct  2 19:06:27.963621 iscsid[703]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi
Oct  2 19:06:27.963621 iscsid[703]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.<reversed domain name>[:identifier].
Oct  2 19:06:27.963621 iscsid[703]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6.
Oct  2 19:06:27.963621 iscsid[703]: If using hardware iscsi like qla4xxx this message can be ignored.
Oct  2 19:06:27.963621 iscsid[703]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi
Oct  2 19:06:27.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:27.971543 iscsid[703]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf
Oct  2 19:06:27.966285 systemd[1]: Started iscsid.service.
Oct  2 19:06:27.969286 systemd-networkd[698]: eth0: DHCPv4 address 10.0.0.30/16, gateway 10.0.0.1 acquired from 10.0.0.1
Oct  2 19:06:27.969423 systemd[1]: Starting dracut-initqueue.service...
Oct  2 19:06:27.980219 systemd[1]: Finished dracut-initqueue.service.
Oct  2 19:06:27.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:27.980999 systemd[1]: Reached target remote-fs-pre.target.
Oct  2 19:06:27.981995 systemd[1]: Reached target remote-cryptsetup.target.
Oct  2 19:06:27.982607 systemd[1]: Reached target remote-fs.target.
Oct  2 19:06:27.984592 systemd[1]: Starting dracut-pre-mount.service...
Oct  2 19:06:27.988483 ignition[619]: Ignition 2.14.0
Oct  2 19:06:27.988495 ignition[619]: Stage: fetch-offline
Oct  2 19:06:27.988537 ignition[619]: no configs at "/usr/lib/ignition/base.d"
Oct  2 19:06:27.988545 ignition[619]: no config dir at "/usr/lib/ignition/base.platform.d/qemu"
Oct  2 19:06:27.988630 ignition[619]: parsed url from cmdline: ""
Oct  2 19:06:27.988633 ignition[619]: no config URL provided
Oct  2 19:06:27.988637 ignition[619]: reading system config file "/usr/lib/ignition/user.ign"
Oct  2 19:06:27.988643 ignition[619]: no config at "/usr/lib/ignition/user.ign"
Oct  2 19:06:27.988659 ignition[619]: op(1): [started]  loading QEMU firmware config module
Oct  2 19:06:27.993072 systemd[1]: Finished dracut-pre-mount.service.
Oct  2 19:06:27.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:27.988663 ignition[619]: op(1): executing: "modprobe" "qemu_fw_cfg"
Oct  2 19:06:27.994091 ignition[619]: op(1): [finished] loading QEMU firmware config module
Oct  2 19:06:28.023347 ignition[619]: parsing config with SHA512: 6214fc6ea1231f6c04b0f73c1d5eb8ada1fef7c5a9dede6957efe64bcf5fcf653c9d00378edc501b9971b9684ec74b3c82d3dbd45d838572991bda89481f0a9b
Oct  2 19:06:28.053394 unknown[619]: fetched base config from "system"
Oct  2 19:06:28.053405 unknown[619]: fetched user config from "qemu"
Oct  2 19:06:28.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:28.053824 ignition[619]: fetch-offline: fetch-offline passed
Oct  2 19:06:28.055021 systemd[1]: Finished ignition-fetch-offline.service.
Oct  2 19:06:28.053876 ignition[619]: Ignition finished successfully
Oct  2 19:06:28.079112 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json).
Oct  2 19:06:28.079837 systemd[1]: Starting ignition-kargs.service...
Oct  2 19:06:28.091629 ignition[719]: Ignition 2.14.0
Oct  2 19:06:28.091638 ignition[719]: Stage: kargs
Oct  2 19:06:28.091726 ignition[719]: no configs at "/usr/lib/ignition/base.d"
Oct  2 19:06:28.091734 ignition[719]: no config dir at "/usr/lib/ignition/base.platform.d/qemu"
Oct  2 19:06:28.094737 ignition[719]: kargs: kargs passed
Oct  2 19:06:28.095258 ignition[719]: Ignition finished successfully
Oct  2 19:06:28.097235 systemd[1]: Finished ignition-kargs.service.
Oct  2 19:06:28.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:28.099592 systemd[1]: Starting ignition-disks.service...
Oct  2 19:06:28.107292 ignition[726]: Ignition 2.14.0
Oct  2 19:06:28.107303 ignition[726]: Stage: disks
Oct  2 19:06:28.107409 ignition[726]: no configs at "/usr/lib/ignition/base.d"
Oct  2 19:06:28.107422 ignition[726]: no config dir at "/usr/lib/ignition/base.platform.d/qemu"
Oct  2 19:06:28.110461 ignition[726]: disks: disks passed
Oct  2 19:06:28.110972 ignition[726]: Ignition finished successfully
Oct  2 19:06:28.112624 systemd[1]: Finished ignition-disks.service.
Oct  2 19:06:28.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:28.113985 systemd[1]: Reached target initrd-root-device.target.
Oct  2 19:06:28.115380 systemd[1]: Reached target local-fs-pre.target.
Oct  2 19:06:28.116607 systemd[1]: Reached target local-fs.target.
Oct  2 19:06:28.117668 systemd[1]: Reached target sysinit.target.
Oct  2 19:06:28.118735 systemd[1]: Reached target basic.target.
Oct  2 19:06:28.120621 systemd[1]: Starting systemd-fsck-root.service...
Oct  2 19:06:28.131246 systemd-fsck[734]: ROOT: clean, 603/553520 files, 56012/553472 blocks
Oct  2 19:06:28.139445 systemd[1]: Finished systemd-fsck-root.service.
Oct  2 19:06:28.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:28.140337 systemd[1]: Mounting sysroot.mount...
Oct  2 19:06:28.146213 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none.
Oct  2 19:06:28.146534 systemd[1]: Mounted sysroot.mount.
Oct  2 19:06:28.146631 systemd[1]: Reached target initrd-root-fs.target.
Oct  2 19:06:28.148802 systemd[1]: Mounting sysroot-usr.mount...
Oct  2 19:06:28.149563 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met.
Oct  2 19:06:28.149608 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot).
Oct  2 19:06:28.149635 systemd[1]: Reached target ignition-diskful.target.
Oct  2 19:06:28.151737 systemd[1]: Mounted sysroot-usr.mount.
Oct  2 19:06:28.153645 systemd[1]: Starting initrd-setup-root.service...
Oct  2 19:06:28.157902 initrd-setup-root[744]: cut: /sysroot/etc/passwd: No such file or directory
Oct  2 19:06:28.162223 initrd-setup-root[752]: cut: /sysroot/etc/group: No such file or directory
Oct  2 19:06:28.166372 initrd-setup-root[760]: cut: /sysroot/etc/shadow: No such file or directory
Oct  2 19:06:28.169438 initrd-setup-root[768]: cut: /sysroot/etc/gshadow: No such file or directory
Oct  2 19:06:28.201546 systemd[1]: Finished initrd-setup-root.service.
Oct  2 19:06:28.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:28.203893 systemd[1]: Starting ignition-mount.service...
Oct  2 19:06:28.205530 systemd[1]: Starting sysroot-boot.service...
Oct  2 19:06:28.209237 bash[785]: umount: /sysroot/usr/share/oem: not mounted.
Oct  2 19:06:28.220225 ignition[786]: INFO     : Ignition 2.14.0
Oct  2 19:06:28.220225 ignition[786]: INFO     : Stage: mount
Oct  2 19:06:28.221476 ignition[786]: INFO     : no configs at "/usr/lib/ignition/base.d"
Oct  2 19:06:28.221476 ignition[786]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/qemu"
Oct  2 19:06:28.222973 ignition[786]: INFO     : mount: mount passed
Oct  2 19:06:28.222973 ignition[786]: INFO     : Ignition finished successfully
Oct  2 19:06:28.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:28.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:28.223143 systemd[1]: Finished ignition-mount.service.
Oct  2 19:06:28.224565 systemd[1]: Finished sysroot-boot.service.
Oct  2 19:06:28.788719 systemd[1]: Mounting sysroot-usr-share-oem.mount...
Oct  2 19:06:28.795642 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (795)
Oct  2 19:06:28.795679 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm
Oct  2 19:06:28.795690 kernel: BTRFS info (device vda6): using free space tree
Oct  2 19:06:28.796671 kernel: BTRFS info (device vda6): has skinny extents
Oct  2 19:06:28.799691 systemd[1]: Mounted sysroot-usr-share-oem.mount.
Oct  2 19:06:28.800757 systemd[1]: Starting ignition-files.service...
Oct  2 19:06:28.814176 ignition[815]: INFO     : Ignition 2.14.0
Oct  2 19:06:28.814176 ignition[815]: INFO     : Stage: files
Oct  2 19:06:28.815469 ignition[815]: INFO     : no configs at "/usr/lib/ignition/base.d"
Oct  2 19:06:28.815469 ignition[815]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/qemu"
Oct  2 19:06:28.816899 ignition[815]: DEBUG    : files: compiled without relabeling support, skipping
Oct  2 19:06:28.818694 ignition[815]: INFO     : files: ensureUsers: op(1): [started]  creating or modifying user "core"
Oct  2 19:06:28.818694 ignition[815]: DEBUG    : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core"
Oct  2 19:06:28.821814 ignition[815]: INFO     : files: ensureUsers: op(1): [finished] creating or modifying user "core"
Oct  2 19:06:28.822833 ignition[815]: INFO     : files: ensureUsers: op(2): [started]  adding ssh keys to user "core"
Oct  2 19:06:28.824026 unknown[815]: wrote ssh authorized keys file for user: core
Oct  2 19:06:28.824831 ignition[815]: INFO     : files: ensureUsers: op(2): [finished] adding ssh keys to user "core"
Oct  2 19:06:28.825736 ignition[815]: INFO     : files: createFilesystemsFiles: createFiles: op(3): [started]  writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz"
Oct  2 19:06:28.825736 ignition[815]: INFO     : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1
Oct  2 19:06:29.170535 ignition[815]: INFO     : files: createFilesystemsFiles: createFiles: op(3): GET result: OK
Oct  2 19:06:29.328360 systemd-networkd[698]: eth0: Gained IPv6LL
Oct  2 19:06:29.633275 ignition[815]: DEBUG    : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540
Oct  2 19:06:29.633275 ignition[815]: INFO     : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz"
Oct  2 19:06:29.636254 ignition[815]: INFO     : files: createFilesystemsFiles: createFiles: op(4): [started]  writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz"
Oct  2 19:06:29.636254 ignition[815]: INFO     : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1
Oct  2 19:06:29.729428 ignition[815]: INFO     : files: createFilesystemsFiles: createFiles: op(4): GET result: OK
Oct  2 19:06:29.875142 ignition[815]: DEBUG    : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a
Oct  2 19:06:29.878189 ignition[815]: INFO     : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz"
Oct  2 19:06:29.878189 ignition[815]: INFO     : files: createFilesystemsFiles: createFiles: op(5): [started]  writing file "/sysroot/opt/bin/kubeadm"
Oct  2 19:06:29.878189 ignition[815]: INFO     : files: createFilesystemsFiles: createFiles: op(5): GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1
Oct  2 19:06:29.972935 ignition[815]: INFO     : files: createFilesystemsFiles: createFiles: op(5): GET result: OK
Oct  2 19:06:30.685506 ignition[815]: DEBUG    : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836
Oct  2 19:06:30.687890 ignition[815]: INFO     : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm"
Oct  2 19:06:30.687890 ignition[815]: INFO     : files: createFilesystemsFiles: createFiles: op(6): [started]  writing file "/sysroot/opt/bin/kubelet"
Oct  2 19:06:30.687890 ignition[815]: INFO     : files: createFilesystemsFiles: createFiles: op(6): GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1
Oct  2 19:06:30.765334 ignition[815]: INFO     : files: createFilesystemsFiles: createFiles: op(6): GET result: OK
Oct  2 19:06:32.110078 ignition[815]: DEBUG    : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560
Oct  2 19:06:32.112255 ignition[815]: INFO     : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet"
Oct  2 19:06:32.112255 ignition[815]: INFO     : files: createFilesystemsFiles: createFiles: op(7): [started]  writing file "/sysroot/opt/bin/kubectl"
Oct  2 19:06:32.112255 ignition[815]: INFO     : files: createFilesystemsFiles: createFiles: op(7): GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/amd64/kubectl: attempt #1
Oct  2 19:06:32.286559 ignition[815]: INFO     : files: createFilesystemsFiles: createFiles: op(7): GET result: OK
Oct  2 19:06:33.266666 ignition[815]: DEBUG    : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 857e67001e74840518413593d90c6e64ad3f00d55fa44ad9a8e2ed6135392c908caff7ec19af18cbe10784b8f83afe687a0bc3bacbc9eee984cdeb9c0749cb83
Oct  2 19:06:33.269143 ignition[815]: INFO     : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubectl"
Oct  2 19:06:33.269143 ignition[815]: INFO     : files: createFilesystemsFiles: createFiles: op(8): [started]  writing file "/sysroot/etc/docker/daemon.json"
Oct  2 19:06:33.269143 ignition[815]: INFO     : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json"
Oct  2 19:06:33.269143 ignition[815]: INFO     : files: createFilesystemsFiles: createFiles: op(9): [started]  writing file "/sysroot/home/core/install.sh"
Oct  2 19:06:33.269143 ignition[815]: INFO     : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/home/core/install.sh"
Oct  2 19:06:33.269143 ignition[815]: INFO     : files: createFilesystemsFiles: createFiles: op(a): [started]  writing file "/sysroot/home/core/nginx.yaml"
Oct  2 19:06:33.269143 ignition[815]: INFO     : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/nginx.yaml"
Oct  2 19:06:33.269143 ignition[815]: INFO     : files: op(b): [started]  processing unit "prepare-cni-plugins.service"
Oct  2 19:06:33.539631 ignition[815]: INFO     : files: op(b): op(c): [started]  writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service"
Oct  2 19:06:33.541383 ignition[815]: INFO     : files: op(b): op(c): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service"
Oct  2 19:06:33.541383 ignition[815]: INFO     : files: op(b): [finished] processing unit "prepare-cni-plugins.service"
Oct  2 19:06:33.541383 ignition[815]: INFO     : files: op(d): [started]  processing unit "prepare-critools.service"
Oct  2 19:06:33.541383 ignition[815]: INFO     : files: op(d): op(e): [started]  writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service"
Oct  2 19:06:33.541383 ignition[815]: INFO     : files: op(d): op(e): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service"
Oct  2 19:06:33.541383 ignition[815]: INFO     : files: op(d): [finished] processing unit "prepare-critools.service"
Oct  2 19:06:33.541383 ignition[815]: INFO     : files: op(f): [started]  processing unit "coreos-metadata.service"
Oct  2 19:06:33.541383 ignition[815]: INFO     : files: op(f): op(10): [started]  writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service"
Oct  2 19:06:33.541383 ignition[815]: INFO     : files: op(f): op(10): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service"
Oct  2 19:06:33.541383 ignition[815]: INFO     : files: op(f): [finished] processing unit "coreos-metadata.service"
Oct  2 19:06:33.541383 ignition[815]: INFO     : files: op(11): [started]  setting preset to enabled for "prepare-cni-plugins.service"
Oct  2 19:06:33.541383 ignition[815]: INFO     : files: op(11): [finished] setting preset to enabled for "prepare-cni-plugins.service"
Oct  2 19:06:33.541383 ignition[815]: INFO     : files: op(12): [started]  setting preset to enabled for "prepare-critools.service"
Oct  2 19:06:33.541383 ignition[815]: INFO     : files: op(12): [finished] setting preset to enabled for "prepare-critools.service"
Oct  2 19:06:33.541383 ignition[815]: INFO     : files: op(13): [started]  setting preset to disabled for "coreos-metadata.service"
Oct  2 19:06:33.541383 ignition[815]: INFO     : files: op(13): op(14): [started]  removing enablement symlink(s) for "coreos-metadata.service"
Oct  2 19:06:33.588619 ignition[815]: INFO     : files: op(13): op(14): [finished] removing enablement symlink(s) for "coreos-metadata.service"
Oct  2 19:06:33.590037 ignition[815]: INFO     : files: op(13): [finished] setting preset to disabled for "coreos-metadata.service"
Oct  2 19:06:33.590037 ignition[815]: INFO     : files: createResultFile: createFiles: op(15): [started]  writing file "/sysroot/etc/.ignition-result.json"
Oct  2 19:06:33.590037 ignition[815]: INFO     : files: createResultFile: createFiles: op(15): [finished] writing file "/sysroot/etc/.ignition-result.json"
Oct  2 19:06:33.590037 ignition[815]: INFO     : files: files passed
Oct  2 19:06:33.590037 ignition[815]: INFO     : Ignition finished successfully
Oct  2 19:06:33.599004 kernel: kauditd_printk_skb: 23 callbacks suppressed
Oct  2 19:06:33.599035 kernel: audit: type=1130 audit(1696273593.591:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.590147 systemd[1]: Finished ignition-files.service.
Oct  2 19:06:33.604674 kernel: audit: type=1130 audit(1696273593.599:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.604690 kernel: audit: type=1131 audit(1696273593.599:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.604701 kernel: audit: type=1130 audit(1696273593.604:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.592557 systemd[1]: Starting initrd-setup-root-after-ignition.service...
Oct  2 19:06:33.596082 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile).
Oct  2 19:06:33.609326 initrd-setup-root-after-ignition[839]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory
Oct  2 19:06:33.596667 systemd[1]: Starting ignition-quench.service...
Oct  2 19:06:33.610787 initrd-setup-root-after-ignition[842]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory
Oct  2 19:06:33.598973 systemd[1]: ignition-quench.service: Deactivated successfully.
Oct  2 19:06:33.599103 systemd[1]: Finished ignition-quench.service.
Oct  2 19:06:33.599881 systemd[1]: Finished initrd-setup-root-after-ignition.service.
Oct  2 19:06:33.604745 systemd[1]: Reached target ignition-complete.target.
Oct  2 19:06:33.612439 systemd[1]: Starting initrd-parse-etc.service...
Oct  2 19:06:33.625221 systemd[1]: initrd-parse-etc.service: Deactivated successfully.
Oct  2 19:06:33.625999 systemd[1]: Finished initrd-parse-etc.service.
Oct  2 19:06:33.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.627290 systemd[1]: Reached target initrd-fs.target.
Oct  2 19:06:33.633140 kernel: audit: type=1130 audit(1696273593.626:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.633174 kernel: audit: type=1131 audit(1696273593.626:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.633072 systemd[1]: Reached target initrd.target.
Oct  2 19:06:33.634468 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met.
Oct  2 19:06:33.636442 systemd[1]: Starting dracut-pre-pivot.service...
Oct  2 19:06:33.648905 systemd[1]: Finished dracut-pre-pivot.service.
Oct  2 19:06:33.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.650798 systemd[1]: Starting initrd-cleanup.service...
Oct  2 19:06:33.653588 kernel: audit: type=1130 audit(1696273593.649:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.660501 systemd[1]: Stopped target nss-lookup.target.
Oct  2 19:06:33.661307 systemd[1]: Stopped target remote-cryptsetup.target.
Oct  2 19:06:33.662345 systemd[1]: Stopped target timers.target.
Oct  2 19:06:33.663471 systemd[1]: dracut-pre-pivot.service: Deactivated successfully.
Oct  2 19:06:33.667820 kernel: audit: type=1131 audit(1696273593.664:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.664000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.663587 systemd[1]: Stopped dracut-pre-pivot.service.
Oct  2 19:06:33.664608 systemd[1]: Stopped target initrd.target.
Oct  2 19:06:33.667937 systemd[1]: Stopped target basic.target.
Oct  2 19:06:33.669057 systemd[1]: Stopped target ignition-complete.target.
Oct  2 19:06:33.670035 systemd[1]: Stopped target ignition-diskful.target.
Oct  2 19:06:33.671035 systemd[1]: Stopped target initrd-root-device.target.
Oct  2 19:06:33.672144 systemd[1]: Stopped target remote-fs.target.
Oct  2 19:06:33.673238 systemd[1]: Stopped target remote-fs-pre.target.
Oct  2 19:06:33.674313 systemd[1]: Stopped target sysinit.target.
Oct  2 19:06:33.675304 systemd[1]: Stopped target local-fs.target.
Oct  2 19:06:33.676299 systemd[1]: Stopped target local-fs-pre.target.
Oct  2 19:06:33.677281 systemd[1]: Stopped target swap.target.
Oct  2 19:06:33.682143 kernel: audit: type=1131 audit(1696273593.679:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.678175 systemd[1]: dracut-pre-mount.service: Deactivated successfully.
Oct  2 19:06:33.678274 systemd[1]: Stopped dracut-pre-mount.service.
Oct  2 19:06:33.686396 kernel: audit: type=1131 audit(1696273593.683:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.679310 systemd[1]: Stopped target cryptsetup.target.
Oct  2 19:06:33.686000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.682202 systemd[1]: dracut-initqueue.service: Deactivated successfully.
Oct  2 19:06:33.682290 systemd[1]: Stopped dracut-initqueue.service.
Oct  2 19:06:33.683453 systemd[1]: ignition-fetch-offline.service: Deactivated successfully.
Oct  2 19:06:33.683538 systemd[1]: Stopped ignition-fetch-offline.service.
Oct  2 19:06:33.686531 systemd[1]: Stopped target paths.target.
Oct  2 19:06:33.687572 systemd[1]: systemd-ask-password-console.path: Deactivated successfully.
Oct  2 19:06:33.692239 systemd[1]: Stopped systemd-ask-password-console.path.
Oct  2 19:06:33.692886 systemd[1]: Stopped target slices.target.
Oct  2 19:06:33.693852 systemd[1]: Stopped target sockets.target.
Oct  2 19:06:33.694810 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully.
Oct  2 19:06:33.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.694920 systemd[1]: Stopped initrd-setup-root-after-ignition.service.
Oct  2 19:06:33.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.695913 systemd[1]: ignition-files.service: Deactivated successfully.
Oct  2 19:06:33.696007 systemd[1]: Stopped ignition-files.service.
Oct  2 19:06:33.699606 iscsid[703]: iscsid shutting down.
Oct  2 19:06:33.697856 systemd[1]: Stopping ignition-mount.service...
Oct  2 19:06:33.698905 systemd[1]: Stopping iscsid.service...
Oct  2 19:06:33.700303 systemd[1]: Stopping sysroot-boot.service...
Oct  2 19:06:33.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.700836 systemd[1]: systemd-udev-trigger.service: Deactivated successfully.
Oct  2 19:06:33.701014 systemd[1]: Stopped systemd-udev-trigger.service.
Oct  2 19:06:33.701997 systemd[1]: dracut-pre-trigger.service: Deactivated successfully.
Oct  2 19:06:33.702090 systemd[1]: Stopped dracut-pre-trigger.service.
Oct  2 19:06:33.707160 ignition[856]: INFO     : Ignition 2.14.0
Oct  2 19:06:33.707160 ignition[856]: INFO     : Stage: umount
Oct  2 19:06:33.707160 ignition[856]: INFO     : no configs at "/usr/lib/ignition/base.d"
Oct  2 19:06:33.707160 ignition[856]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/qemu"
Oct  2 19:06:33.710459 ignition[856]: INFO     : umount: umount passed
Oct  2 19:06:33.710459 ignition[856]: INFO     : Ignition finished successfully
Oct  2 19:06:33.712594 systemd[1]: iscsid.service: Deactivated successfully.
Oct  2 19:06:33.713451 systemd[1]: Stopped iscsid.service.
Oct  2 19:06:33.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.716006 systemd[1]: sysroot-boot.mount: Deactivated successfully.
Oct  2 19:06:33.717168 systemd[1]: ignition-mount.service: Deactivated successfully.
Oct  2 19:06:33.717936 systemd[1]: Stopped ignition-mount.service.
Oct  2 19:06:33.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.719353 systemd[1]: sysroot-boot.service: Deactivated successfully.
Oct  2 19:06:33.720017 systemd[1]: Stopped sysroot-boot.service.
Oct  2 19:06:33.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.721496 systemd[1]: iscsid.socket: Deactivated successfully.
Oct  2 19:06:33.722095 systemd[1]: Closed iscsid.socket.
Oct  2 19:06:33.723098 systemd[1]: ignition-disks.service: Deactivated successfully.
Oct  2 19:06:33.723134 systemd[1]: Stopped ignition-disks.service.
Oct  2 19:06:33.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.724394 systemd[1]: ignition-kargs.service: Deactivated successfully.
Oct  2 19:06:33.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.724920 systemd[1]: Stopped ignition-kargs.service.
Oct  2 19:06:33.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.726124 systemd[1]: ignition-setup.service: Deactivated successfully.
Oct  2 19:06:33.726159 systemd[1]: Stopped ignition-setup.service.
Oct  2 19:06:33.727279 systemd[1]: initrd-setup-root.service: Deactivated successfully.
Oct  2 19:06:33.727314 systemd[1]: Stopped initrd-setup-root.service.
Oct  2 19:06:33.730000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.730342 systemd[1]: Stopping iscsiuio.service...
Oct  2 19:06:33.731683 systemd[1]: initrd-cleanup.service: Deactivated successfully.
Oct  2 19:06:33.731763 systemd[1]: Finished initrd-cleanup.service.
Oct  2 19:06:33.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.734082 systemd[1]: iscsiuio.service: Deactivated successfully.
Oct  2 19:06:33.734774 systemd[1]: Stopped iscsiuio.service.
Oct  2 19:06:33.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.736680 systemd[1]: Stopped target network.target.
Oct  2 19:06:33.737746 systemd[1]: iscsiuio.socket: Deactivated successfully.
Oct  2 19:06:33.737782 systemd[1]: Closed iscsiuio.socket.
Oct  2 19:06:33.739458 systemd[1]: Stopping systemd-networkd.service...
Oct  2 19:06:33.740542 systemd[1]: Stopping systemd-resolved.service...
Oct  2 19:06:33.744302 systemd-networkd[698]: eth0: DHCPv6 lease lost
Oct  2 19:06:33.745459 systemd[1]: systemd-networkd.service: Deactivated successfully.
Oct  2 19:06:33.745581 systemd[1]: Stopped systemd-networkd.service.
Oct  2 19:06:33.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.746748 systemd[1]: systemd-networkd.socket: Deactivated successfully.
Oct  2 19:06:33.746775 systemd[1]: Closed systemd-networkd.socket.
Oct  2 19:06:33.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.748508 systemd[1]: Stopping network-cleanup.service...
Oct  2 19:06:33.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.751000 audit: BPF prog-id=9 op=UNLOAD
Oct  2 19:06:33.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.749232 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully.
Oct  2 19:06:33.749273 systemd[1]: Stopped parse-ip-for-networkd.service.
Oct  2 19:06:33.750420 systemd[1]: systemd-sysctl.service: Deactivated successfully.
Oct  2 19:06:33.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.750454 systemd[1]: Stopped systemd-sysctl.service.
Oct  2 19:06:33.751093 systemd[1]: systemd-modules-load.service: Deactivated successfully.
Oct  2 19:06:33.751124 systemd[1]: Stopped systemd-modules-load.service.
Oct  2 19:06:33.752378 systemd[1]: Stopping systemd-udevd.service...
Oct  2 19:06:33.754016 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully.
Oct  2 19:06:33.758000 audit: BPF prog-id=6 op=UNLOAD
Oct  2 19:06:33.754422 systemd[1]: systemd-resolved.service: Deactivated successfully.
Oct  2 19:06:33.754512 systemd[1]: Stopped systemd-resolved.service.
Oct  2 19:06:33.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.759536 systemd[1]: systemd-udevd.service: Deactivated successfully.
Oct  2 19:06:33.759666 systemd[1]: Stopped systemd-udevd.service.
Oct  2 19:06:33.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.761418 systemd[1]: network-cleanup.service: Deactivated successfully.
Oct  2 19:06:33.761487 systemd[1]: Stopped network-cleanup.service.
Oct  2 19:06:33.762513 systemd[1]: systemd-udevd-control.socket: Deactivated successfully.
Oct  2 19:06:33.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.762555 systemd[1]: Closed systemd-udevd-control.socket.
Oct  2 19:06:33.763433 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully.
Oct  2 19:06:33.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.763471 systemd[1]: Closed systemd-udevd-kernel.socket.
Oct  2 19:06:33.764510 systemd[1]: dracut-pre-udev.service: Deactivated successfully.
Oct  2 19:06:33.764550 systemd[1]: Stopped dracut-pre-udev.service.
Oct  2 19:06:33.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.765549 systemd[1]: dracut-cmdline.service: Deactivated successfully.
Oct  2 19:06:33.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.765584 systemd[1]: Stopped dracut-cmdline.service.
Oct  2 19:06:33.766750 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully.
Oct  2 19:06:33.766792 systemd[1]: Stopped dracut-cmdline-ask.service.
Oct  2 19:06:33.768666 systemd[1]: Starting initrd-udevadm-cleanup-db.service...
Oct  2 19:06:33.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.769590 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully.
Oct  2 19:06:33.769646 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service.
Oct  2 19:06:33.771351 systemd[1]: kmod-static-nodes.service: Deactivated successfully.
Oct  2 19:06:33.771385 systemd[1]: Stopped kmod-static-nodes.service.
Oct  2 19:06:33.772001 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully.
Oct  2 19:06:33.772036 systemd[1]: Stopped systemd-vconsole-setup.service.
Oct  2 19:06:33.774137 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully.
Oct  2 19:06:33.774546 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully.
Oct  2 19:06:33.774620 systemd[1]: Finished initrd-udevadm-cleanup-db.service.
Oct  2 19:06:33.775593 systemd[1]: Reached target initrd-switch-root.target.
Oct  2 19:06:33.777274 systemd[1]: Starting initrd-switch-root.service...
Oct  2 19:06:33.792079 systemd[1]: Switching root.
Oct  2 19:06:33.809751 systemd-journald[198]: Journal stopped
Oct  2 19:06:37.136255 systemd-journald[198]: Received SIGTERM from PID 1 (systemd).
Oct  2 19:06:37.136318 kernel: SELinux:  Class mctp_socket not defined in policy.
Oct  2 19:06:37.136336 kernel: SELinux:  Class anon_inode not defined in policy.
Oct  2 19:06:37.136351 kernel: SELinux: the above unknown classes and permissions will be allowed
Oct  2 19:06:37.136365 kernel: SELinux:  policy capability network_peer_controls=1
Oct  2 19:06:37.136379 kernel: SELinux:  policy capability open_perms=1
Oct  2 19:06:37.136397 kernel: SELinux:  policy capability extended_socket_class=1
Oct  2 19:06:37.136411 kernel: SELinux:  policy capability always_check_network=0
Oct  2 19:06:37.136435 kernel: SELinux:  policy capability cgroup_seclabel=1
Oct  2 19:06:37.136449 kernel: SELinux:  policy capability nnp_nosuid_transition=1
Oct  2 19:06:37.136462 kernel: SELinux:  policy capability genfs_seclabel_symlinks=0
Oct  2 19:06:37.136476 kernel: SELinux:  policy capability ioctl_skip_cloexec=0
Oct  2 19:06:37.136493 systemd[1]: Successfully loaded SELinux policy in 40.594ms.
Oct  2 19:06:37.136521 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.308ms.
Oct  2 19:06:37.136538 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
Oct  2 19:06:37.136553 systemd[1]: Detected virtualization kvm.
Oct  2 19:06:37.136575 systemd[1]: Detected architecture x86-64.
Oct  2 19:06:37.136590 systemd[1]: Detected first boot.
Oct  2 19:06:37.136607 systemd[1]: Initializing machine ID from VM UUID.
Oct  2 19:06:37.136621 systemd[1]: Populated /etc with preset unit settings.
Oct  2 19:06:37.136634 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Oct  2 19:06:37.136649 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Oct  2 19:06:37.136665 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Oct  2 19:06:37.136689 systemd[1]: initrd-switch-root.service: Deactivated successfully.
Oct  2 19:06:37.136704 systemd[1]: Stopped initrd-switch-root.service.
Oct  2 19:06:37.136719 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1.
Oct  2 19:06:37.136733 systemd[1]: Created slice system-addon\x2dconfig.slice.
Oct  2 19:06:37.136748 systemd[1]: Created slice system-addon\x2drun.slice.
Oct  2 19:06:37.136763 systemd[1]: Created slice system-getty.slice.
Oct  2 19:06:37.136778 systemd[1]: Created slice system-modprobe.slice.
Oct  2 19:06:37.136793 systemd[1]: Created slice system-serial\x2dgetty.slice.
Oct  2 19:06:37.136808 systemd[1]: Created slice system-system\x2dcloudinit.slice.
Oct  2 19:06:37.136838 systemd[1]: Created slice system-systemd\x2dfsck.slice.
Oct  2 19:06:37.136857 systemd[1]: Created slice user.slice.
Oct  2 19:06:37.136872 systemd[1]: Started systemd-ask-password-console.path.
Oct  2 19:06:37.136887 systemd[1]: Started systemd-ask-password-wall.path.
Oct  2 19:06:37.136901 systemd[1]: Set up automount boot.automount.
Oct  2 19:06:37.136916 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount.
Oct  2 19:06:37.136931 systemd[1]: Stopped target initrd-switch-root.target.
Oct  2 19:06:37.136946 systemd[1]: Stopped target initrd-fs.target.
Oct  2 19:06:37.136960 systemd[1]: Stopped target initrd-root-fs.target.
Oct  2 19:06:37.136983 systemd[1]: Reached target integritysetup.target.
Oct  2 19:06:37.136999 systemd[1]: Reached target remote-cryptsetup.target.
Oct  2 19:06:37.137013 systemd[1]: Reached target remote-fs.target.
Oct  2 19:06:37.137028 systemd[1]: Reached target slices.target.
Oct  2 19:06:37.137042 systemd[1]: Reached target swap.target.
Oct  2 19:06:37.137057 systemd[1]: Reached target torcx.target.
Oct  2 19:06:37.137071 systemd[1]: Reached target veritysetup.target.
Oct  2 19:06:37.137086 systemd[1]: Listening on systemd-coredump.socket.
Oct  2 19:06:37.137107 systemd[1]: Listening on systemd-initctl.socket.
Oct  2 19:06:37.137123 systemd[1]: Listening on systemd-networkd.socket.
Oct  2 19:06:37.137137 systemd[1]: Listening on systemd-udevd-control.socket.
Oct  2 19:06:37.137151 systemd[1]: Listening on systemd-udevd-kernel.socket.
Oct  2 19:06:37.137167 systemd[1]: Listening on systemd-userdbd.socket.
Oct  2 19:06:37.137186 systemd[1]: Mounting dev-hugepages.mount...
Oct  2 19:06:37.137222 systemd[1]: Mounting dev-mqueue.mount...
Oct  2 19:06:37.137237 systemd[1]: Mounting media.mount...
Oct  2 19:06:37.137250 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen).
Oct  2 19:06:37.137272 systemd[1]: Mounting sys-kernel-debug.mount...
Oct  2 19:06:37.137288 systemd[1]: Mounting sys-kernel-tracing.mount...
Oct  2 19:06:37.137302 systemd[1]: Mounting tmp.mount...
Oct  2 19:06:37.137316 systemd[1]: Starting flatcar-tmpfiles.service...
Oct  2 19:06:37.137330 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met.
Oct  2 19:06:37.137345 systemd[1]: Starting kmod-static-nodes.service...
Oct  2 19:06:37.137359 systemd[1]: Starting modprobe@configfs.service...
Oct  2 19:06:37.137375 systemd[1]: Starting modprobe@dm_mod.service...
Oct  2 19:06:37.137389 systemd[1]: Starting modprobe@drm.service...
Oct  2 19:06:37.137411 systemd[1]: Starting modprobe@efi_pstore.service...
Oct  2 19:06:37.137426 systemd[1]: Starting modprobe@fuse.service...
Oct  2 19:06:37.137442 systemd[1]: Starting modprobe@loop.service...
Oct  2 19:06:37.137456 kernel: fuse: init (API version 7.34)
Oct  2 19:06:37.137471 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf).
Oct  2 19:06:37.137486 systemd[1]: systemd-fsck-root.service: Deactivated successfully.
Oct  2 19:06:37.137501 systemd[1]: Stopped systemd-fsck-root.service.
Oct  2 19:06:37.137516 systemd[1]: systemd-fsck-usr.service: Deactivated successfully.
Oct  2 19:06:37.137532 systemd[1]: Stopped systemd-fsck-usr.service.
Oct  2 19:06:37.137553 kernel: loop: module loaded
Oct  2 19:06:37.137568 systemd[1]: Stopped systemd-journald.service.
Oct  2 19:06:37.137582 systemd[1]: Starting systemd-journald.service...
Oct  2 19:06:37.137601 systemd[1]: Starting systemd-modules-load.service...
Oct  2 19:06:37.137616 systemd[1]: Starting systemd-network-generator.service...
Oct  2 19:06:37.137630 systemd[1]: Starting systemd-remount-fs.service...
Oct  2 19:06:37.137645 systemd[1]: Starting systemd-udev-trigger.service...
Oct  2 19:06:37.137659 systemd[1]: verity-setup.service: Deactivated successfully.
Oct  2 19:06:37.137674 systemd[1]: Stopped verity-setup.service.
Oct  2 19:06:37.137692 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen).
Oct  2 19:06:37.137717 systemd-journald[966]: Journal started
Oct  2 19:06:37.137773 systemd-journald[966]: Runtime Journal (/run/log/journal/be63e13c95dc49e1ba630a7a02b49012) is 6.0M, max 48.4M, 42.4M free.
Oct  2 19:06:33.887000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1
Oct  2 19:06:33.925000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
Oct  2 19:06:33.925000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
Oct  2 19:06:33.925000 audit: BPF prog-id=10 op=LOAD
Oct  2 19:06:33.925000 audit: BPF prog-id=10 op=UNLOAD
Oct  2 19:06:33.925000 audit: BPF prog-id=11 op=LOAD
Oct  2 19:06:33.925000 audit: BPF prog-id=11 op=UNLOAD
Oct  2 19:06:36.996000 audit: BPF prog-id=12 op=LOAD
Oct  2 19:06:36.996000 audit: BPF prog-id=3 op=UNLOAD
Oct  2 19:06:36.996000 audit: BPF prog-id=13 op=LOAD
Oct  2 19:06:36.996000 audit: BPF prog-id=14 op=LOAD
Oct  2 19:06:36.996000 audit: BPF prog-id=4 op=UNLOAD
Oct  2 19:06:36.996000 audit: BPF prog-id=5 op=UNLOAD
Oct  2 19:06:36.997000 audit: BPF prog-id=15 op=LOAD
Oct  2 19:06:36.997000 audit: BPF prog-id=12 op=UNLOAD
Oct  2 19:06:36.997000 audit: BPF prog-id=16 op=LOAD
Oct  2 19:06:36.997000 audit: BPF prog-id=17 op=LOAD
Oct  2 19:06:36.997000 audit: BPF prog-id=13 op=UNLOAD
Oct  2 19:06:36.997000 audit: BPF prog-id=14 op=UNLOAD
Oct  2 19:06:36.998000 audit: BPF prog-id=18 op=LOAD
Oct  2 19:06:36.998000 audit: BPF prog-id=15 op=UNLOAD
Oct  2 19:06:36.998000 audit: BPF prog-id=19 op=LOAD
Oct  2 19:06:36.998000 audit: BPF prog-id=20 op=LOAD
Oct  2 19:06:36.998000 audit: BPF prog-id=16 op=UNLOAD
Oct  2 19:06:36.998000 audit: BPF prog-id=17 op=UNLOAD
Oct  2 19:06:36.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.001000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.010000 audit: BPF prog-id=18 op=UNLOAD
Oct  2 19:06:37.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.116000 audit: BPF prog-id=21 op=LOAD
Oct  2 19:06:37.116000 audit: BPF prog-id=22 op=LOAD
Oct  2 19:06:37.116000 audit: BPF prog-id=23 op=LOAD
Oct  2 19:06:37.116000 audit: BPF prog-id=19 op=UNLOAD
Oct  2 19:06:37.116000 audit: BPF prog-id=20 op=UNLOAD
Oct  2 19:06:37.134000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1
Oct  2 19:06:37.134000 audit[966]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7fff2dc9b890 a2=4000 a3=7fff2dc9b92c items=0 ppid=1 pid=966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:06:37.134000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald"
Oct  2 19:06:37.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:33.996379 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2023-10-02T19:06:33Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]"
Oct  2 19:06:36.995270 systemd[1]: Queued start job for default target multi-user.target.
Oct  2 19:06:33.996623 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2023-10-02T19:06:33Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json
Oct  2 19:06:36.995281 systemd[1]: Unnecessary job was removed for dev-vda6.device.
Oct  2 19:06:33.996640 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2023-10-02T19:06:33Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json
Oct  2 19:06:36.999227 systemd[1]: systemd-journald.service: Deactivated successfully.
Oct  2 19:06:33.996669 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2023-10-02T19:06:33Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12"
Oct  2 19:06:33.996678 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2023-10-02T19:06:33Z" level=debug msg="skipped missing lower profile" missing profile=oem
Oct  2 19:06:33.996716 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2023-10-02T19:06:33Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory"
Oct  2 19:06:33.996728 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2023-10-02T19:06:33Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)=
Oct  2 19:06:33.996934 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2023-10-02T19:06:33Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack
Oct  2 19:06:33.996978 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2023-10-02T19:06:33Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json
Oct  2 19:06:33.996991 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2023-10-02T19:06:33Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json
Oct  2 19:06:33.997349 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2023-10-02T19:06:33Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10
Oct  2 19:06:33.997382 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2023-10-02T19:06:33Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl
Oct  2 19:06:33.997397 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2023-10-02T19:06:33Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0
Oct  2 19:06:33.997410 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2023-10-02T19:06:33Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store
Oct  2 19:06:33.997425 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2023-10-02T19:06:33Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0
Oct  2 19:06:33.997437 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2023-10-02T19:06:33Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store
Oct  2 19:06:36.688522 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2023-10-02T19:06:36Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Oct  2 19:06:36.688792 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2023-10-02T19:06:36Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Oct  2 19:06:36.688918 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2023-10-02T19:06:36Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Oct  2 19:06:36.689088 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2023-10-02T19:06:36Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Oct  2 19:06:36.689133 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2023-10-02T19:06:36Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile=
Oct  2 19:06:36.689214 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2023-10-02T19:06:36Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx
Oct  2 19:06:37.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.142221 systemd[1]: Started systemd-journald.service.
Oct  2 19:06:37.142553 systemd[1]: Mounted dev-hugepages.mount.
Oct  2 19:06:37.143214 systemd[1]: Mounted dev-mqueue.mount.
Oct  2 19:06:37.143832 systemd[1]: Mounted media.mount.
Oct  2 19:06:37.144422 systemd[1]: Mounted sys-kernel-debug.mount.
Oct  2 19:06:37.145281 systemd[1]: Mounted sys-kernel-tracing.mount.
Oct  2 19:06:37.146114 systemd[1]: Mounted tmp.mount.
Oct  2 19:06:37.147073 systemd[1]: Finished kmod-static-nodes.service.
Oct  2 19:06:37.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.148084 systemd[1]: Finished flatcar-tmpfiles.service.
Oct  2 19:06:37.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.148951 systemd[1]: modprobe@configfs.service: Deactivated successfully.
Oct  2 19:06:37.149146 systemd[1]: Finished modprobe@configfs.service.
Oct  2 19:06:37.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.150009 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Oct  2 19:06:37.150163 systemd[1]: Finished modprobe@dm_mod.service.
Oct  2 19:06:37.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.151008 systemd[1]: modprobe@drm.service: Deactivated successfully.
Oct  2 19:06:37.151167 systemd[1]: Finished modprobe@drm.service.
Oct  2 19:06:37.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.151990 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully.
Oct  2 19:06:37.152157 systemd[1]: Finished modprobe@efi_pstore.service.
Oct  2 19:06:37.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.153016 systemd[1]: modprobe@fuse.service: Deactivated successfully.
Oct  2 19:06:37.153177 systemd[1]: Finished modprobe@fuse.service.
Oct  2 19:06:37.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.154009 systemd[1]: modprobe@loop.service: Deactivated successfully.
Oct  2 19:06:37.154170 systemd[1]: Finished modprobe@loop.service.
Oct  2 19:06:37.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.155230 systemd[1]: Finished systemd-modules-load.service.
Oct  2 19:06:37.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.156096 systemd[1]: Finished systemd-network-generator.service.
Oct  2 19:06:37.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.157089 systemd[1]: Finished systemd-remount-fs.service.
Oct  2 19:06:37.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.158273 systemd[1]: Reached target network-pre.target.
Oct  2 19:06:37.160036 systemd[1]: Mounting sys-fs-fuse-connections.mount...
Oct  2 19:06:37.161801 systemd[1]: Mounting sys-kernel-config.mount...
Oct  2 19:06:37.162593 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/).
Oct  2 19:06:37.164452 systemd[1]: Starting systemd-hwdb-update.service...
Oct  2 19:06:37.166374 systemd[1]: Starting systemd-journal-flush.service...
Oct  2 19:06:37.167150 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Oct  2 19:06:37.171951 systemd-journald[966]: Time spent on flushing to /var/log/journal/be63e13c95dc49e1ba630a7a02b49012 is 60.105ms for 1161 entries.
Oct  2 19:06:37.171951 systemd-journald[966]: System Journal (/var/log/journal/be63e13c95dc49e1ba630a7a02b49012) is 8.0M, max 195.6M, 187.6M free.
Oct  2 19:06:37.241834 systemd-journald[966]: Received client request to flush runtime journal.
Oct  2 19:06:37.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.168434 systemd[1]: Starting systemd-random-seed.service...
Oct  2 19:06:37.169297 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met.
Oct  2 19:06:37.170577 systemd[1]: Starting systemd-sysctl.service...
Oct  2 19:06:37.172792 systemd[1]: Starting systemd-sysusers.service...
Oct  2 19:06:37.177960 systemd[1]: Mounted sys-fs-fuse-connections.mount.
Oct  2 19:06:37.178959 systemd[1]: Mounted sys-kernel-config.mount.
Oct  2 19:06:37.180165 systemd[1]: Finished systemd-random-seed.service.
Oct  2 19:06:37.181291 systemd[1]: Reached target first-boot-complete.target.
Oct  2 19:06:37.228831 systemd[1]: Finished systemd-sysctl.service.
Oct  2 19:06:37.231453 systemd[1]: Finished systemd-sysusers.service.
Oct  2 19:06:37.233853 systemd[1]: Starting systemd-tmpfiles-setup-dev.service...
Oct  2 19:06:37.242549 systemd[1]: Finished systemd-journal-flush.service.
Oct  2 19:06:37.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.251357 systemd[1]: Finished systemd-tmpfiles-setup-dev.service.
Oct  2 19:06:37.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.252654 systemd[1]: Finished systemd-udev-trigger.service.
Oct  2 19:06:37.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.254362 systemd[1]: Starting systemd-udev-settle.service...
Oct  2 19:06:37.260635 udevadm[996]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in.
Oct  2 19:06:37.904123 systemd[1]: Finished systemd-hwdb-update.service.
Oct  2 19:06:37.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.905000 audit: BPF prog-id=24 op=LOAD
Oct  2 19:06:37.905000 audit: BPF prog-id=25 op=LOAD
Oct  2 19:06:37.905000 audit: BPF prog-id=7 op=UNLOAD
Oct  2 19:06:37.905000 audit: BPF prog-id=8 op=UNLOAD
Oct  2 19:06:37.906450 systemd[1]: Starting systemd-udevd.service...
Oct  2 19:06:37.921278 systemd-udevd[997]: Using default interface naming scheme 'v252'.
Oct  2 19:06:37.941174 systemd[1]: Started systemd-udevd.service.
Oct  2 19:06:37.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:37.943000 audit: BPF prog-id=26 op=LOAD
Oct  2 19:06:37.944594 systemd[1]: Starting systemd-networkd.service...
Oct  2 19:06:37.954000 audit: BPF prog-id=27 op=LOAD
Oct  2 19:06:37.954000 audit: BPF prog-id=28 op=LOAD
Oct  2 19:06:37.954000 audit: BPF prog-id=29 op=LOAD
Oct  2 19:06:37.956049 systemd[1]: Starting systemd-userdbd.service...
Oct  2 19:06:37.972766 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped.
Oct  2 19:06:37.987646 systemd[1]: Started systemd-userdbd.service.
Oct  2 19:06:37.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:38.013222 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2
Oct  2 19:06:38.021007 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device.
Oct  2 19:06:38.026212 kernel: ACPI: button: Power Button [PWRF]
Oct  2 19:06:38.033191 systemd-networkd[1003]: lo: Link UP
Oct  2 19:06:38.033233 systemd-networkd[1003]: lo: Gained carrier
Oct  2 19:06:38.033594 systemd-networkd[1003]: Enumeration completed
Oct  2 19:06:38.033685 systemd-networkd[1003]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network.
Oct  2 19:06:38.033739 systemd[1]: Started systemd-networkd.service.
Oct  2 19:06:38.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:38.035380 systemd-networkd[1003]: eth0: Link UP
Oct  2 19:06:38.035388 systemd-networkd[1003]: eth0: Gained carrier
Oct  2 19:06:38.036000 audit[998]: AVC avc:  denied  { confidentiality } for  pid=998 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1
Oct  2 19:06:38.036000 audit[998]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=560de8efe390 a1=32194 a2=7fded5adfbc5 a3=5 items=106 ppid=997 pid=998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:06:38.036000 audit: CWD cwd="/"
Oct  2 19:06:38.036000 audit: PATH item=0 name=(null) inode=14153 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=1 name=(null) inode=14154 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=2 name=(null) inode=14153 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=3 name=(null) inode=14155 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=4 name=(null) inode=14153 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=5 name=(null) inode=14156 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=6 name=(null) inode=14156 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=7 name=(null) inode=14157 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=8 name=(null) inode=14156 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=9 name=(null) inode=14158 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=10 name=(null) inode=14156 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=11 name=(null) inode=14159 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=12 name=(null) inode=14156 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=13 name=(null) inode=14160 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=14 name=(null) inode=14156 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=15 name=(null) inode=14161 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=16 name=(null) inode=14153 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=17 name=(null) inode=14162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=18 name=(null) inode=14162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=19 name=(null) inode=14163 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=20 name=(null) inode=14162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=21 name=(null) inode=14164 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=22 name=(null) inode=14162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=23 name=(null) inode=14165 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=24 name=(null) inode=14162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=25 name=(null) inode=14166 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=26 name=(null) inode=14162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=27 name=(null) inode=14167 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=28 name=(null) inode=14153 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=29 name=(null) inode=14168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=30 name=(null) inode=14168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=31 name=(null) inode=14169 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=32 name=(null) inode=14168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=33 name=(null) inode=14170 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=34 name=(null) inode=14168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=35 name=(null) inode=14171 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=36 name=(null) inode=14168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=37 name=(null) inode=14172 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=38 name=(null) inode=14168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=39 name=(null) inode=14173 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=40 name=(null) inode=14153 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=41 name=(null) inode=14174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=42 name=(null) inode=14174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=43 name=(null) inode=14175 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=44 name=(null) inode=14174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=45 name=(null) inode=14176 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=46 name=(null) inode=14174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=47 name=(null) inode=14177 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=48 name=(null) inode=14174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=49 name=(null) inode=14178 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=50 name=(null) inode=14174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=51 name=(null) inode=14179 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=52 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=53 name=(null) inode=14180 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=54 name=(null) inode=14180 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=55 name=(null) inode=14181 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=56 name=(null) inode=14180 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=57 name=(null) inode=14182 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=58 name=(null) inode=14180 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=59 name=(null) inode=14183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=60 name=(null) inode=14183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=61 name=(null) inode=14184 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=62 name=(null) inode=14183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=63 name=(null) inode=14185 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=64 name=(null) inode=14183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=65 name=(null) inode=14186 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=66 name=(null) inode=14183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=67 name=(null) inode=14187 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=68 name=(null) inode=14183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=69 name=(null) inode=14188 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=70 name=(null) inode=14180 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=71 name=(null) inode=14189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=72 name=(null) inode=14189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=73 name=(null) inode=14190 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=74 name=(null) inode=14189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=75 name=(null) inode=14191 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=76 name=(null) inode=14189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=77 name=(null) inode=14192 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=78 name=(null) inode=14189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=79 name=(null) inode=14193 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=80 name=(null) inode=14189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=81 name=(null) inode=14194 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=82 name=(null) inode=14180 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=83 name=(null) inode=14195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=84 name=(null) inode=14195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=85 name=(null) inode=14196 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=86 name=(null) inode=14195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=87 name=(null) inode=14197 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=88 name=(null) inode=14195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=89 name=(null) inode=14198 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=90 name=(null) inode=14195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=91 name=(null) inode=14199 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=92 name=(null) inode=14195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=93 name=(null) inode=14200 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=94 name=(null) inode=14180 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=95 name=(null) inode=14201 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=96 name=(null) inode=14201 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=97 name=(null) inode=14202 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=98 name=(null) inode=14201 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=99 name=(null) inode=14203 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=100 name=(null) inode=14201 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=101 name=(null) inode=14204 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=102 name=(null) inode=14201 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=103 name=(null) inode=14205 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=104 name=(null) inode=14201 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PATH item=105 name=(null) inode=14206 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:06:38.036000 audit: PROCTITLE proctitle="(udev-worker)"
Oct  2 19:06:38.049315 systemd-networkd[1003]: eth0: DHCPv4 address 10.0.0.30/16, gateway 10.0.0.1 acquired from 10.0.0.1
Oct  2 19:06:38.056236 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 0
Oct  2 19:06:38.060222 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3
Oct  2 19:06:38.069220 kernel: mousedev: PS/2 mouse device common for all mice
Oct  2 19:06:38.124266 kernel: kvm: Nested Virtualization enabled
Oct  2 19:06:38.124477 kernel: SVM: kvm: Nested Paging enabled
Oct  2 19:06:38.140249 kernel: EDAC MC: Ver: 3.0.0
Oct  2 19:06:38.161741 systemd[1]: Finished systemd-udev-settle.service.
Oct  2 19:06:38.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:38.163995 systemd[1]: Starting lvm2-activation-early.service...
Oct  2 19:06:38.179315 lvm[1034]:   WARNING: Failed to connect to lvmetad. Falling back to device scanning.
Oct  2 19:06:38.208662 systemd[1]: Finished lvm2-activation-early.service.
Oct  2 19:06:38.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:38.209554 systemd[1]: Reached target cryptsetup.target.
Oct  2 19:06:38.211281 systemd[1]: Starting lvm2-activation.service...
Oct  2 19:06:38.215212 lvm[1035]:   WARNING: Failed to connect to lvmetad. Falling back to device scanning.
Oct  2 19:06:38.242374 systemd[1]: Finished lvm2-activation.service.
Oct  2 19:06:38.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:38.243184 systemd[1]: Reached target local-fs-pre.target.
Oct  2 19:06:38.243776 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw).
Oct  2 19:06:38.243802 systemd[1]: Reached target local-fs.target.
Oct  2 19:06:38.244364 systemd[1]: Reached target machines.target.
Oct  2 19:06:38.246052 systemd[1]: Starting ldconfig.service...
Oct  2 19:06:38.246896 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met.
Oct  2 19:06:38.247006 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Oct  2 19:06:38.248340 systemd[1]: Starting systemd-boot-update.service...
Oct  2 19:06:38.249814 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service...
Oct  2 19:06:38.251520 systemd[1]: Starting systemd-machine-id-commit.service...
Oct  2 19:06:38.252239 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met.
Oct  2 19:06:38.252285 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met.
Oct  2 19:06:38.253103 systemd[1]: Starting systemd-tmpfiles-setup.service...
Oct  2 19:06:38.253962 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1037 (bootctl)
Oct  2 19:06:38.255038 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service...
Oct  2 19:06:38.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:38.263308 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service.
Oct  2 19:06:38.267180 systemd-tmpfiles[1040]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring.
Oct  2 19:06:38.268330 systemd-tmpfiles[1040]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring.
Oct  2 19:06:38.269856 systemd-tmpfiles[1040]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring.
Oct  2 19:06:38.288643 systemd-fsck[1045]: fsck.fat 4.2 (2021-01-31)
Oct  2 19:06:38.288643 systemd-fsck[1045]: /dev/vda1: 790 files, 115092/258078 clusters
Oct  2 19:06:38.304378 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service.
Oct  2 19:06:38.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:38.308521 systemd[1]: Mounting boot.mount...
Oct  2 19:06:38.317571 systemd[1]: Mounted boot.mount.
Oct  2 19:06:38.504984 systemd[1]: Finished systemd-boot-update.service.
Oct  2 19:06:38.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:38.557005 systemd[1]: etc-machine\x2did.mount: Deactivated successfully.
Oct  2 19:06:38.557585 systemd[1]: Finished systemd-machine-id-commit.service.
Oct  2 19:06:38.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:38.564851 systemd[1]: Finished systemd-tmpfiles-setup.service.
Oct  2 19:06:38.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:38.567330 systemd[1]: Starting audit-rules.service...
Oct  2 19:06:38.568902 systemd[1]: Starting clean-ca-certificates.service...
Oct  2 19:06:38.570706 systemd[1]: Starting systemd-journal-catalog-update.service...
Oct  2 19:06:38.572000 audit: BPF prog-id=30 op=LOAD
Oct  2 19:06:38.573186 systemd[1]: Starting systemd-resolved.service...
Oct  2 19:06:38.575000 audit: BPF prog-id=31 op=LOAD
Oct  2 19:06:38.577254 systemd[1]: Starting systemd-timesyncd.service...
Oct  2 19:06:38.579697 systemd[1]: Starting systemd-update-utmp.service...
Oct  2 19:06:38.581405 systemd[1]: Finished clean-ca-certificates.service.
Oct  2 19:06:38.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:38.583631 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt).
Oct  2 19:06:38.585000 audit[1055]: SYSTEM_BOOT pid=1055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:38.589698 systemd[1]: Finished systemd-update-utmp.service.
Oct  2 19:06:38.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:38.605334 kernel: kauditd_printk_skb: 233 callbacks suppressed
Oct  2 19:06:38.605457 kernel: audit: type=1130 audit(1696273598.602:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:38.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:38.601363 systemd[1]: Finished systemd-journal-catalog-update.service.
Oct  2 19:06:38.684170 augenrules[1069]: No rules
Oct  2 19:06:38.683000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1
Oct  2 19:06:38.684585 systemd[1]: Started systemd-timesyncd.service.
Oct  2 19:06:38.686501 kernel: audit: type=1305 audit(1696273598.683:167): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1
Oct  2 19:06:38.686575 kernel: audit: type=1300 audit(1696273598.683:167): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcdd685050 a2=420 a3=0 items=0 ppid=1049 pid=1069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:06:38.686600 kernel: audit: type=1327 audit(1696273598.683:167): proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573
Oct  2 19:06:38.683000 audit[1069]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcdd685050 a2=420 a3=0 items=0 ppid=1049 pid=1069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:06:38.683000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573
Oct  2 19:06:39.195902 systemd-timesyncd[1054]: Contacted time server 10.0.0.1:123 (10.0.0.1).
Oct  2 19:06:39.195957 systemd-timesyncd[1054]: Initial clock synchronization to Mon 2023-10-02 19:06:39.195780 UTC.
Oct  2 19:06:39.196526 systemd-resolved[1052]: Positive Trust Anchors:
Oct  2 19:06:39.196539 systemd-resolved[1052]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Oct  2 19:06:39.196566 systemd-resolved[1052]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
Oct  2 19:06:39.198718 systemd[1]: Finished audit-rules.service.
Oct  2 19:06:39.199573 systemd[1]: Reached target time-set.target.
Oct  2 19:06:39.214370 systemd-resolved[1052]: Defaulting to hostname 'linux'.
Oct  2 19:06:39.216008 systemd[1]: Started systemd-resolved.service.
Oct  2 19:06:39.216958 systemd[1]: Reached target network.target.
Oct  2 19:06:39.217772 systemd[1]: Reached target nss-lookup.target.
Oct  2 19:06:39.313603 ldconfig[1036]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start.
Oct  2 19:06:39.319595 systemd[1]: Finished ldconfig.service.
Oct  2 19:06:39.321711 systemd[1]: Starting systemd-update-done.service...
Oct  2 19:06:39.328828 systemd[1]: Finished systemd-update-done.service.
Oct  2 19:06:39.329517 systemd[1]: Reached target sysinit.target.
Oct  2 19:06:39.330122 systemd[1]: Started motdgen.path.
Oct  2 19:06:39.330741 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path.
Oct  2 19:06:39.331647 systemd[1]: Started logrotate.timer.
Oct  2 19:06:39.332204 systemd[1]: Started mdadm.timer.
Oct  2 19:06:39.332667 systemd[1]: Started systemd-tmpfiles-clean.timer.
Oct  2 19:06:39.333232 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate).
Oct  2 19:06:39.333257 systemd[1]: Reached target paths.target.
Oct  2 19:06:39.333737 systemd[1]: Reached target timers.target.
Oct  2 19:06:39.334489 systemd[1]: Listening on dbus.socket.
Oct  2 19:06:39.335893 systemd[1]: Starting docker.socket...
Oct  2 19:06:39.338823 systemd[1]: Listening on sshd.socket.
Oct  2 19:06:39.339434 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Oct  2 19:06:39.339769 systemd[1]: Listening on docker.socket.
Oct  2 19:06:39.340336 systemd[1]: Reached target sockets.target.
Oct  2 19:06:39.340866 systemd[1]: Reached target basic.target.
Oct  2 19:06:39.341421 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met.
Oct  2 19:06:39.341438 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met.
Oct  2 19:06:39.342272 systemd[1]: Starting containerd.service...
Oct  2 19:06:39.343693 systemd[1]: Starting dbus.service...
Oct  2 19:06:39.345140 systemd[1]: Starting enable-oem-cloudinit.service...
Oct  2 19:06:39.346901 systemd[1]: Starting extend-filesystems.service...
Oct  2 19:06:39.347793 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment).
Oct  2 19:06:39.349199 systemd[1]: Starting motdgen.service...
Oct  2 19:06:39.350862 systemd[1]: Starting prepare-cni-plugins.service...
Oct  2 19:06:39.354887 systemd[1]: Starting prepare-critools.service...
Oct  2 19:06:39.356432 systemd[1]: Starting ssh-key-proc-cmdline.service...
Oct  2 19:06:39.356678 jq[1080]: false
Oct  2 19:06:39.358265 systemd[1]: Starting sshd-keygen.service...
Oct  2 19:06:39.361849 systemd[1]: Starting systemd-logind.service...
Oct  2 19:06:39.362667 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Oct  2 19:06:39.362785 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0).
Oct  2 19:06:39.365699 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details.
Oct  2 19:06:39.366527 systemd[1]: Starting update-engine.service...
Oct  2 19:06:39.368182 systemd[1]: Starting update-ssh-keys-after-ignition.service...
Oct  2 19:06:39.370997 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'.
Oct  2 19:06:39.371177 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped.
Oct  2 19:06:39.374185 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully.
Oct  2 19:06:39.374404 systemd[1]: Finished ssh-key-proc-cmdline.service.
Oct  2 19:06:39.412698 jq[1097]: true
Oct  2 19:06:39.414103 jq[1107]: true
Oct  2 19:06:39.416888 tar[1103]: crictl
Oct  2 19:06:39.417940 systemd[1]: motdgen.service: Deactivated successfully.
Oct  2 19:06:39.418112 systemd[1]: Finished motdgen.service.
Oct  2 19:06:39.423738 dbus-daemon[1079]: [system] SELinux support is enabled
Oct  2 19:06:39.423927 systemd[1]: Started dbus.service.
Oct  2 19:06:39.427109 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml).
Oct  2 19:06:39.427143 systemd[1]: Reached target system-config.target.
Oct  2 19:06:39.428593 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url).
Oct  2 19:06:39.428614 systemd[1]: Reached target user-config.target.
Oct  2 19:06:39.434143 extend-filesystems[1081]: Found sr0
Oct  2 19:06:39.435188 extend-filesystems[1081]: Found vda
Oct  2 19:06:39.440982 extend-filesystems[1081]: Found vda1
Oct  2 19:06:39.441762 extend-filesystems[1081]: Found vda2
Oct  2 19:06:39.444166 extend-filesystems[1081]: Found vda3
Oct  2 19:06:39.444758 extend-filesystems[1081]: Found usr
Oct  2 19:06:39.446009 tar[1099]: ./
Oct  2 19:06:39.446009 tar[1099]: ./loopback
Oct  2 19:06:39.446323 extend-filesystems[1081]: Found vda4
Oct  2 19:06:39.447058 extend-filesystems[1081]: Found vda6
Oct  2 19:06:39.447754 extend-filesystems[1081]: Found vda7
Oct  2 19:06:39.448782 extend-filesystems[1081]: Found vda9
Oct  2 19:06:39.449697 extend-filesystems[1081]: Checking size of /dev/vda9
Oct  2 19:06:39.511939 extend-filesystems[1081]: Old size kept for /dev/vda9
Oct  2 19:06:39.512997 systemd-logind[1090]: Watching system buttons on /dev/input/event1 (Power Button)
Oct  2 19:06:39.513019 systemd-logind[1090]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard)
Oct  2 19:06:39.513373 systemd-logind[1090]: New seat seat0.
Oct  2 19:06:39.513414 systemd[1]: extend-filesystems.service: Deactivated successfully.
Oct  2 19:06:39.513862 systemd[1]: Finished extend-filesystems.service.
Oct  2 19:06:39.520678 systemd[1]: Started systemd-logind.service.
Oct  2 19:06:39.537471 update_engine[1095]: I1002 19:06:39.535233  1095 main.cc:92] Flatcar Update Engine starting
Oct  2 19:06:39.542456 update_engine[1095]: I1002 19:06:39.542372  1095 update_check_scheduler.cc:74] Next update check in 5m31s
Oct  2 19:06:39.543687 systemd[1]: Started update-engine.service.
Oct  2 19:06:39.547482 systemd[1]: Started locksmithd.service.
Oct  2 19:06:39.558103 bash[1132]: Updated "/home/core/.ssh/authorized_keys"
Oct  2 19:06:39.557970 systemd[1]: Finished update-ssh-keys-after-ignition.service.
Oct  2 19:06:39.583641 tar[1099]: ./bandwidth
Oct  2 19:06:39.583786 env[1104]: time="2023-10-02T19:06:39.583289322Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16
Oct  2 19:06:39.618915 tar[1099]: ./ptp
Oct  2 19:06:39.635971 env[1104]: time="2023-10-02T19:06:39.635903521Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1
Oct  2 19:06:39.636148 env[1104]: time="2023-10-02T19:06:39.636095662Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1
Oct  2 19:06:39.637672 env[1104]: time="2023-10-02T19:06:39.637637223Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1
Oct  2 19:06:39.637672 env[1104]: time="2023-10-02T19:06:39.637665967Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1
Oct  2 19:06:39.637886 env[1104]: time="2023-10-02T19:06:39.637857055Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
Oct  2 19:06:39.637886 env[1104]: time="2023-10-02T19:06:39.637881291Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1
Oct  2 19:06:39.637970 env[1104]: time="2023-10-02T19:06:39.637895538Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured"
Oct  2 19:06:39.637970 env[1104]: time="2023-10-02T19:06:39.637904575Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1
Oct  2 19:06:39.637970 env[1104]: time="2023-10-02T19:06:39.637965649Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1
Oct  2 19:06:39.638210 env[1104]: time="2023-10-02T19:06:39.638181123Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1
Oct  2 19:06:39.638339 env[1104]: time="2023-10-02T19:06:39.638310746Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
Oct  2 19:06:39.638339 env[1104]: time="2023-10-02T19:06:39.638328119Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1
Oct  2 19:06:39.638416 env[1104]: time="2023-10-02T19:06:39.638372582Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured"
Oct  2 19:06:39.638416 env[1104]: time="2023-10-02T19:06:39.638384785Z" level=info msg="metadata content store policy set" policy=shared
Oct  2 19:06:39.654525 tar[1099]: ./vlan
Oct  2 19:06:39.685902 tar[1099]: ./host-device
Oct  2 19:06:39.697816 locksmithd[1133]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot"
Oct  2 19:06:39.722509 tar[1099]: ./tuning
Oct  2 19:06:39.754024 tar[1099]: ./vrf
Oct  2 19:06:39.788578 tar[1099]: ./sbr
Oct  2 19:06:39.820556 tar[1099]: ./tap
Oct  2 19:06:39.855935 tar[1099]: ./dhcp
Oct  2 19:06:39.871458 env[1104]: time="2023-10-02T19:06:39.871391409Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1
Oct  2 19:06:39.871458 env[1104]: time="2023-10-02T19:06:39.871449729Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1
Oct  2 19:06:39.871458 env[1104]: time="2023-10-02T19:06:39.871462563Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1
Oct  2 19:06:39.871668 env[1104]: time="2023-10-02T19:06:39.871503830Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1
Oct  2 19:06:39.871668 env[1104]: time="2023-10-02T19:06:39.871519219Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1
Oct  2 19:06:39.871668 env[1104]: time="2023-10-02T19:06:39.871537814Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1
Oct  2 19:06:39.871668 env[1104]: time="2023-10-02T19:06:39.871551920Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1
Oct  2 19:06:39.871668 env[1104]: time="2023-10-02T19:06:39.871564344Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1
Oct  2 19:06:39.871668 env[1104]: time="2023-10-02T19:06:39.871576747Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1
Oct  2 19:06:39.871668 env[1104]: time="2023-10-02T19:06:39.871588739Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1
Oct  2 19:06:39.871668 env[1104]: time="2023-10-02T19:06:39.871599840Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1
Oct  2 19:06:39.871668 env[1104]: time="2023-10-02T19:06:39.871614438Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1
Oct  2 19:06:39.871873 env[1104]: time="2023-10-02T19:06:39.871764769Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2
Oct  2 19:06:39.871873 env[1104]: time="2023-10-02T19:06:39.871856482Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1
Oct  2 19:06:39.872109 env[1104]: time="2023-10-02T19:06:39.872083618Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1
Oct  2 19:06:39.872155 env[1104]: time="2023-10-02T19:06:39.872113985Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1
Oct  2 19:06:39.872155 env[1104]: time="2023-10-02T19:06:39.872127630Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1
Oct  2 19:06:39.872207 env[1104]: time="2023-10-02T19:06:39.872187813Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1
Oct  2 19:06:39.872250 env[1104]: time="2023-10-02T19:06:39.872210125Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1
Oct  2 19:06:39.872250 env[1104]: time="2023-10-02T19:06:39.872233358Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1
Oct  2 19:06:39.872250 env[1104]: time="2023-10-02T19:06:39.872244189Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1
Oct  2 19:06:39.872306 env[1104]: time="2023-10-02T19:06:39.872255019Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1
Oct  2 19:06:39.872306 env[1104]: time="2023-10-02T19:06:39.872265869Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1
Oct  2 19:06:39.872306 env[1104]: time="2023-10-02T19:06:39.872276219Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1
Oct  2 19:06:39.872306 env[1104]: time="2023-10-02T19:06:39.872286799Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1
Oct  2 19:06:39.872306 env[1104]: time="2023-10-02T19:06:39.872298170Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1
Oct  2 19:06:39.872437 env[1104]: time="2023-10-02T19:06:39.872412194Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1
Oct  2 19:06:39.872437 env[1104]: time="2023-10-02T19:06:39.872433664Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1
Oct  2 19:06:39.872510 env[1104]: time="2023-10-02T19:06:39.872444695Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1
Oct  2 19:06:39.872510 env[1104]: time="2023-10-02T19:06:39.872455736Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1
Oct  2 19:06:39.872510 env[1104]: time="2023-10-02T19:06:39.872469161Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1
Oct  2 19:06:39.872510 env[1104]: time="2023-10-02T19:06:39.872479530Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1
Oct  2 19:06:39.872510 env[1104]: time="2023-10-02T19:06:39.872496322Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin"
Oct  2 19:06:39.872609 env[1104]: time="2023-10-02T19:06:39.872533702Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1
Oct  2 19:06:39.872850 env[1104]: time="2023-10-02T19:06:39.872728607Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}"
Oct  2 19:06:39.874283 env[1104]: time="2023-10-02T19:06:39.872934033Z" level=info msg="Connect containerd service"
Oct  2 19:06:39.874283 env[1104]: time="2023-10-02T19:06:39.874199116Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\""
Oct  2 19:06:39.874896 env[1104]: time="2023-10-02T19:06:39.874861508Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config"
Oct  2 19:06:39.875145 env[1104]: time="2023-10-02T19:06:39.875120644Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc
Oct  2 19:06:39.875201 env[1104]: time="2023-10-02T19:06:39.875160850Z" level=info msg=serving... address=/run/containerd/containerd.sock
Oct  2 19:06:39.875321 systemd[1]: Started containerd.service.
Oct  2 19:06:39.876626 env[1104]: time="2023-10-02T19:06:39.876585392Z" level=info msg="Start subscribing containerd event"
Oct  2 19:06:39.876673 env[1104]: time="2023-10-02T19:06:39.876642088Z" level=info msg="Start recovering state"
Oct  2 19:06:39.876716 env[1104]: time="2023-10-02T19:06:39.876707921Z" level=info msg="Start event monitor"
Oct  2 19:06:39.876740 env[1104]: time="2023-10-02T19:06:39.876718872Z" level=info msg="Start snapshots syncer"
Oct  2 19:06:39.876740 env[1104]: time="2023-10-02T19:06:39.876727478Z" level=info msg="Start cni network conf syncer for default"
Oct  2 19:06:39.876740 env[1104]: time="2023-10-02T19:06:39.876734191Z" level=info msg="Start streaming server"
Oct  2 19:06:39.877266 env[1104]: time="2023-10-02T19:06:39.877241442Z" level=info msg="containerd successfully booted in 0.294865s"
Oct  2 19:06:39.942092 systemd[1]: Finished prepare-critools.service.
Oct  2 19:06:39.948558 tar[1099]: ./static
Oct  2 19:06:39.970434 tar[1099]: ./firewall
Oct  2 19:06:40.004478 tar[1099]: ./macvlan
Oct  2 19:06:40.034714 tar[1099]: ./dummy
Oct  2 19:06:40.047971 sshd_keygen[1096]: ssh-keygen: generating new host keys: RSA ECDSA ED25519
Oct  2 19:06:40.064550 tar[1099]: ./bridge
Oct  2 19:06:40.067080 systemd[1]: Finished sshd-keygen.service.
Oct  2 19:06:40.069069 systemd[1]: Starting issuegen.service...
Oct  2 19:06:40.073705 systemd[1]: issuegen.service: Deactivated successfully.
Oct  2 19:06:40.073861 systemd[1]: Finished issuegen.service.
Oct  2 19:06:40.075535 systemd[1]: Starting systemd-user-sessions.service...
Oct  2 19:06:40.080215 systemd[1]: Finished systemd-user-sessions.service.
Oct  2 19:06:40.081914 systemd[1]: Started getty@tty1.service.
Oct  2 19:06:40.083450 systemd[1]: Started serial-getty@ttyS0.service.
Oct  2 19:06:40.084183 systemd[1]: Reached target getty.target.
Oct  2 19:06:40.099085 tar[1099]: ./ipvlan
Oct  2 19:06:40.128590 tar[1099]: ./portmap
Oct  2 19:06:40.158755 tar[1099]: ./host-local
Oct  2 19:06:40.192354 systemd[1]: Finished prepare-cni-plugins.service.
Oct  2 19:06:40.193374 systemd[1]: Reached target multi-user.target.
Oct  2 19:06:40.195499 systemd[1]: Starting systemd-update-utmp-runlevel.service...
Oct  2 19:06:40.202206 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully.
Oct  2 19:06:40.202389 systemd[1]: Finished systemd-update-utmp-runlevel.service.
Oct  2 19:06:40.203208 systemd[1]: Startup finished in 655ms (kernel) + 8.062s (initrd) + 5.857s (userspace) = 14.574s.
Oct  2 19:06:40.444754 systemd[1]: Created slice system-sshd.slice.
Oct  2 19:06:40.445811 systemd[1]: Started sshd@0-10.0.0.30:22-10.0.0.1:55014.service.
Oct  2 19:06:40.484842 sshd[1163]: Accepted publickey for core from 10.0.0.1 port 55014 ssh2: RSA SHA256:9wRqOmzBU7I1L73Sd3XbDPVeoZziQ4I3fHnP0PJ8idM
Oct  2 19:06:40.486188 sshd[1163]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:06:40.493865 systemd[1]: Created slice user-500.slice.
Oct  2 19:06:40.494940 systemd[1]: Starting user-runtime-dir@500.service...
Oct  2 19:06:40.496546 systemd-logind[1090]: New session 1 of user core.
Oct  2 19:06:40.502157 systemd[1]: Finished user-runtime-dir@500.service.
Oct  2 19:06:40.503480 systemd[1]: Starting user@500.service...
Oct  2 19:06:40.505846 (systemd)[1166]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:06:40.554346 systemd-networkd[1003]: eth0: Gained IPv6LL
Oct  2 19:06:40.570960 systemd[1166]: Queued start job for default target default.target.
Oct  2 19:06:40.571390 systemd[1166]: Reached target paths.target.
Oct  2 19:06:40.571410 systemd[1166]: Reached target sockets.target.
Oct  2 19:06:40.571421 systemd[1166]: Reached target timers.target.
Oct  2 19:06:40.571431 systemd[1166]: Reached target basic.target.
Oct  2 19:06:40.571464 systemd[1166]: Reached target default.target.
Oct  2 19:06:40.571487 systemd[1166]: Startup finished in 61ms.
Oct  2 19:06:40.571544 systemd[1]: Started user@500.service.
Oct  2 19:06:40.572452 systemd[1]: Started session-1.scope.
Oct  2 19:06:40.624105 systemd[1]: Started sshd@1-10.0.0.30:22-10.0.0.1:55022.service.
Oct  2 19:06:40.658501 sshd[1175]: Accepted publickey for core from 10.0.0.1 port 55022 ssh2: RSA SHA256:9wRqOmzBU7I1L73Sd3XbDPVeoZziQ4I3fHnP0PJ8idM
Oct  2 19:06:40.659706 sshd[1175]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:06:40.664172 systemd-logind[1090]: New session 2 of user core.
Oct  2 19:06:40.665211 systemd[1]: Started session-2.scope.
Oct  2 19:06:40.720286 sshd[1175]: pam_unix(sshd:session): session closed for user core
Oct  2 19:06:40.723558 systemd[1]: sshd@1-10.0.0.30:22-10.0.0.1:55022.service: Deactivated successfully.
Oct  2 19:06:40.724304 systemd[1]: session-2.scope: Deactivated successfully.
Oct  2 19:06:40.724790 systemd-logind[1090]: Session 2 logged out. Waiting for processes to exit.
Oct  2 19:06:40.726386 systemd[1]: Started sshd@2-10.0.0.30:22-10.0.0.1:40214.service.
Oct  2 19:06:40.727192 systemd-logind[1090]: Removed session 2.
Oct  2 19:06:40.757524 sshd[1181]: Accepted publickey for core from 10.0.0.1 port 40214 ssh2: RSA SHA256:9wRqOmzBU7I1L73Sd3XbDPVeoZziQ4I3fHnP0PJ8idM
Oct  2 19:06:40.758792 sshd[1181]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:06:40.762445 systemd-logind[1090]: New session 3 of user core.
Oct  2 19:06:40.763210 systemd[1]: Started session-3.scope.
Oct  2 19:06:40.812793 sshd[1181]: pam_unix(sshd:session): session closed for user core
Oct  2 19:06:40.815587 systemd[1]: sshd@2-10.0.0.30:22-10.0.0.1:40214.service: Deactivated successfully.
Oct  2 19:06:40.816086 systemd[1]: session-3.scope: Deactivated successfully.
Oct  2 19:06:40.816565 systemd-logind[1090]: Session 3 logged out. Waiting for processes to exit.
Oct  2 19:06:40.817506 systemd[1]: Started sshd@3-10.0.0.30:22-10.0.0.1:40228.service.
Oct  2 19:06:40.818124 systemd-logind[1090]: Removed session 3.
Oct  2 19:06:40.848612 sshd[1187]: Accepted publickey for core from 10.0.0.1 port 40228 ssh2: RSA SHA256:9wRqOmzBU7I1L73Sd3XbDPVeoZziQ4I3fHnP0PJ8idM
Oct  2 19:06:40.849754 sshd[1187]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:06:40.853594 systemd-logind[1090]: New session 4 of user core.
Oct  2 19:06:40.854382 systemd[1]: Started session-4.scope.
Oct  2 19:06:40.907736 sshd[1187]: pam_unix(sshd:session): session closed for user core
Oct  2 19:06:40.910303 systemd[1]: sshd@3-10.0.0.30:22-10.0.0.1:40228.service: Deactivated successfully.
Oct  2 19:06:40.910914 systemd[1]: session-4.scope: Deactivated successfully.
Oct  2 19:06:40.911469 systemd-logind[1090]: Session 4 logged out. Waiting for processes to exit.
Oct  2 19:06:40.912367 systemd[1]: Started sshd@4-10.0.0.30:22-10.0.0.1:40240.service.
Oct  2 19:06:40.912984 systemd-logind[1090]: Removed session 4.
Oct  2 19:06:40.942160 sshd[1193]: Accepted publickey for core from 10.0.0.1 port 40240 ssh2: RSA SHA256:9wRqOmzBU7I1L73Sd3XbDPVeoZziQ4I3fHnP0PJ8idM
Oct  2 19:06:40.943440 sshd[1193]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:06:40.946861 systemd-logind[1090]: New session 5 of user core.
Oct  2 19:06:40.947775 systemd[1]: Started session-5.scope.
Oct  2 19:06:41.007365 sudo[1196]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1
Oct  2 19:06:41.007558 sudo[1196]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Oct  2 19:06:41.014427 dbus-daemon[1079]: \xd0\u001dn|\xbaU:  received setenforce notice (enforcing=513703408)
Oct  2 19:06:41.016253 sudo[1196]: pam_unix(sudo:session): session closed for user root
Oct  2 19:06:41.018111 sshd[1193]: pam_unix(sshd:session): session closed for user core
Oct  2 19:06:41.022017 systemd[1]: sshd@4-10.0.0.30:22-10.0.0.1:40240.service: Deactivated successfully.
Oct  2 19:06:41.022805 systemd[1]: session-5.scope: Deactivated successfully.
Oct  2 19:06:41.023441 systemd-logind[1090]: Session 5 logged out. Waiting for processes to exit.
Oct  2 19:06:41.024806 systemd[1]: Started sshd@5-10.0.0.30:22-10.0.0.1:40256.service.
Oct  2 19:06:41.025420 systemd-logind[1090]: Removed session 5.
Oct  2 19:06:41.054789 sshd[1200]: Accepted publickey for core from 10.0.0.1 port 40256 ssh2: RSA SHA256:9wRqOmzBU7I1L73Sd3XbDPVeoZziQ4I3fHnP0PJ8idM
Oct  2 19:06:41.055870 sshd[1200]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:06:41.058830 systemd-logind[1090]: New session 6 of user core.
Oct  2 19:06:41.059653 systemd[1]: Started session-6.scope.
Oct  2 19:06:41.111106 sudo[1204]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules
Oct  2 19:06:41.111358 sudo[1204]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Oct  2 19:06:41.114012 sudo[1204]: pam_unix(sudo:session): session closed for user root
Oct  2 19:06:41.118133 sudo[1203]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules
Oct  2 19:06:41.118305 sudo[1203]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Oct  2 19:06:41.125693 systemd[1]: Stopping audit-rules.service...
Oct  2 19:06:41.125000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1
Oct  2 19:06:41.126766 auditctl[1207]: No rules
Oct  2 19:06:41.127136 systemd[1]: audit-rules.service: Deactivated successfully.
Oct  2 19:06:41.127339 systemd[1]: Stopped audit-rules.service.
Oct  2 19:06:41.125000 audit[1207]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe75565050 a2=420 a3=0 items=0 ppid=1 pid=1207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:06:41.130927 kernel: audit: type=1305 audit(1696273601.125:168): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1
Oct  2 19:06:41.130966 kernel: audit: type=1300 audit(1696273601.125:168): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe75565050 a2=420 a3=0 items=0 ppid=1 pid=1207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:06:41.130982 kernel: audit: type=1327 audit(1696273601.125:168): proctitle=2F7362696E2F617564697463746C002D44
Oct  2 19:06:41.125000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44
Oct  2 19:06:41.131410 systemd[1]: Starting audit-rules.service...
Oct  2 19:06:41.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:41.134487 kernel: audit: type=1131 audit(1696273601.126:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:41.147243 augenrules[1224]: No rules
Oct  2 19:06:41.148036 systemd[1]: Finished audit-rules.service.
Oct  2 19:06:41.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:41.148806 sudo[1203]: pam_unix(sudo:session): session closed for user root
Oct  2 19:06:41.150058 sshd[1200]: pam_unix(sshd:session): session closed for user core
Oct  2 19:06:41.147000 audit[1203]: USER_END pid=1203 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:41.152772 systemd[1]: sshd@5-10.0.0.30:22-10.0.0.1:40256.service: Deactivated successfully.
Oct  2 19:06:41.153311 systemd[1]: session-6.scope: Deactivated successfully.
Oct  2 19:06:41.153701 kernel: audit: type=1130 audit(1696273601.147:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:41.153811 kernel: audit: type=1106 audit(1696273601.147:171): pid=1203 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:41.147000 audit[1203]: CRED_DISP pid=1203 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:41.149000 audit[1200]: USER_END pid=1200 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:06:41.149000 audit[1200]: CRED_DISP pid=1200 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:06:41.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.30:22-10.0.0.1:40256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:41.153883 systemd-logind[1090]: Session 6 logged out. Waiting for processes to exit.
Oct  2 19:06:41.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.30:22-10.0.0.1:40266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:41.154788 systemd[1]: Started sshd@6-10.0.0.30:22-10.0.0.1:40266.service.
Oct  2 19:06:41.155532 systemd-logind[1090]: Removed session 6.
Oct  2 19:06:41.185000 audit[1230]: USER_ACCT pid=1230 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:06:41.186538 sshd[1230]: Accepted publickey for core from 10.0.0.1 port 40266 ssh2: RSA SHA256:9wRqOmzBU7I1L73Sd3XbDPVeoZziQ4I3fHnP0PJ8idM
Oct  2 19:06:41.186000 audit[1230]: CRED_ACQ pid=1230 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:06:41.186000 audit[1230]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffae5aca50 a2=3 a3=0 items=0 ppid=1 pid=1230 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:06:41.186000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Oct  2 19:06:41.187778 sshd[1230]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:06:41.191279 systemd-logind[1090]: New session 7 of user core.
Oct  2 19:06:41.191975 systemd[1]: Started session-7.scope.
Oct  2 19:06:41.194000 audit[1230]: USER_START pid=1230 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:06:41.195000 audit[1232]: CRED_ACQ pid=1232 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:06:41.242000 audit[1233]: USER_ACCT pid=1233 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:41.242000 audit[1233]: CRED_REFR pid=1233 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:41.244146 sudo[1233]:     core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh
Oct  2 19:06:41.244326 sudo[1233]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Oct  2 19:06:41.244000 audit[1233]: USER_START pid=1233 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:41.941558 systemd[1]: Starting systemd-networkd-wait-online.service...
Oct  2 19:06:41.946946 systemd[1]: Finished systemd-networkd-wait-online.service.
Oct  2 19:06:41.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:41.947307 systemd[1]: Reached target network-online.target.
Oct  2 19:06:41.948805 systemd[1]: Starting docker.service...
Oct  2 19:06:41.985517 env[1251]: time="2023-10-02T19:06:41.985436574Z" level=info msg="Starting up"
Oct  2 19:06:41.987045 env[1251]: time="2023-10-02T19:06:41.986996129Z" level=info msg="parsed scheme: \"unix\"" module=grpc
Oct  2 19:06:41.987045 env[1251]: time="2023-10-02T19:06:41.987039931Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc
Oct  2 19:06:41.987153 env[1251]: time="2023-10-02T19:06:41.987068044Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock  <nil> 0 <nil>}] <nil> <nil>}" module=grpc
Oct  2 19:06:41.987153 env[1251]: time="2023-10-02T19:06:41.987080647Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc
Oct  2 19:06:41.989706 env[1251]: time="2023-10-02T19:06:41.989667890Z" level=info msg="parsed scheme: \"unix\"" module=grpc
Oct  2 19:06:41.989706 env[1251]: time="2023-10-02T19:06:41.989695262Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc
Oct  2 19:06:41.989781 env[1251]: time="2023-10-02T19:06:41.989718706Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock  <nil> 0 <nil>}] <nil> <nil>}" module=grpc
Oct  2 19:06:41.989781 env[1251]: time="2023-10-02T19:06:41.989733674Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc
Oct  2 19:06:42.373370 env[1251]: time="2023-10-02T19:06:42.373200748Z" level=info msg="Loading containers: start."
Oct  2 19:06:42.428000 audit[1282]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1282 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:06:42.428000 audit[1282]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffcbbaa6630 a2=0 a3=7ffcbbaa661c items=0 ppid=1251 pid=1282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:06:42.428000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552
Oct  2 19:06:42.430000 audit[1284]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1284 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:06:42.430000 audit[1284]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd54bc5f70 a2=0 a3=7ffd54bc5f5c items=0 ppid=1251 pid=1284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:06:42.430000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552
Oct  2 19:06:42.432000 audit[1286]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1286 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:06:42.432000 audit[1286]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffdefd9cfb0 a2=0 a3=7ffdefd9cf9c items=0 ppid=1251 pid=1286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:06:42.432000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31
Oct  2 19:06:42.433000 audit[1288]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1288 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:06:42.433000 audit[1288]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffc86cfd00 a2=0 a3=7fffc86cfcec items=0 ppid=1251 pid=1288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:06:42.433000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32
Oct  2 19:06:42.435000 audit[1290]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1290 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:06:42.435000 audit[1290]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffe2b38620 a2=0 a3=7fffe2b3860c items=0 ppid=1251 pid=1290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:06:42.435000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E
Oct  2 19:06:42.454000 audit[1295]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1295 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:06:42.454000 audit[1295]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff07d5c4f0 a2=0 a3=7fff07d5c4dc items=0 ppid=1251 pid=1295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:06:42.454000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E
Oct  2 19:06:42.532000 audit[1297]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1297 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:06:42.532000 audit[1297]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff1e54eaa0 a2=0 a3=7fff1e54ea8c items=0 ppid=1251 pid=1297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:06:42.532000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552
Oct  2 19:06:42.534000 audit[1299]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1299 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:06:42.534000 audit[1299]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd9a16e540 a2=0 a3=7ffd9a16e52c items=0 ppid=1251 pid=1299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:06:42.534000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E
Oct  2 19:06:42.536000 audit[1301]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1301 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:06:42.536000 audit[1301]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffd36b08170 a2=0 a3=7ffd36b0815c items=0 ppid=1251 pid=1301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:06:42.536000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552
Oct  2 19:06:42.634000 audit[1305]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1305 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:06:42.634000 audit[1305]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffcfb98dc20 a2=0 a3=7ffcfb98dc0c items=0 ppid=1251 pid=1305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:06:42.634000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552
Oct  2 19:06:42.635000 audit[1306]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1306 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:06:42.635000 audit[1306]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd0ce71620 a2=0 a3=7ffd0ce7160c items=0 ppid=1251 pid=1306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:06:42.635000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552
Oct  2 19:06:42.644257 kernel: Initializing XFRM netlink socket
Oct  2 19:06:42.727365 env[1251]: time="2023-10-02T19:06:42.727324864Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address"
Oct  2 19:06:42.743000 audit[1313]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1313 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:06:42.743000 audit[1313]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffe00b7ecd0 a2=0 a3=7ffe00b7ecbc items=0 ppid=1251 pid=1313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:06:42.743000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445
Oct  2 19:06:42.753000 audit[1316]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1316 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:06:42.753000 audit[1316]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc873abe90 a2=0 a3=7ffc873abe7c items=0 ppid=1251 pid=1316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:06:42.753000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E
Oct  2 19:06:42.756000 audit[1319]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1319 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:06:42.756000 audit[1319]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc9e8f4720 a2=0 a3=7ffc9e8f470c items=0 ppid=1251 pid=1319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:06:42.756000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054
Oct  2 19:06:42.757000 audit[1321]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1321 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:06:42.757000 audit[1321]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffa89a7b20 a2=0 a3=7fffa89a7b0c items=0 ppid=1251 pid=1321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:06:42.757000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054
Oct  2 19:06:42.759000 audit[1323]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1323 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:06:42.759000 audit[1323]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffd7f5eaf10 a2=0 a3=7ffd7f5eaefc items=0 ppid=1251 pid=1323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:06:42.759000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552
Oct  2 19:06:42.761000 audit[1325]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1325 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:06:42.761000 audit[1325]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd82f3b2a0 a2=0 a3=7ffd82f3b28c items=0 ppid=1251 pid=1325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:06:42.761000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38
Oct  2 19:06:42.762000 audit[1327]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1327 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:06:42.762000 audit[1327]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffddcc7b7e0 a2=0 a3=7ffddcc7b7cc items=0 ppid=1251 pid=1327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:06:42.762000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552
Oct  2 19:06:42.771000 audit[1330]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1330 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:06:42.771000 audit[1330]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffdbc0a21a0 a2=0 a3=7ffdbc0a218c items=0 ppid=1251 pid=1330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:06:42.771000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054
Oct  2 19:06:42.772000 audit[1332]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1332 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:06:42.772000 audit[1332]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff72cb4530 a2=0 a3=7fff72cb451c items=0 ppid=1251 pid=1332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:06:42.772000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31
Oct  2 19:06:42.774000 audit[1334]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1334 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:06:42.774000 audit[1334]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe56ed68a0 a2=0 a3=7ffe56ed688c items=0 ppid=1251 pid=1334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:06:42.774000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32
Oct  2 19:06:42.776000 audit[1336]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1336 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:06:42.776000 audit[1336]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc01a02a20 a2=0 a3=7ffc01a02a0c items=0 ppid=1251 pid=1336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:06:42.776000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50
Oct  2 19:06:42.777813 systemd-networkd[1003]: docker0: Link UP
Oct  2 19:06:42.784000 audit[1340]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1340 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:06:42.784000 audit[1340]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcedf255f0 a2=0 a3=7ffcedf255dc items=0 ppid=1251 pid=1340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:06:42.784000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552
Oct  2 19:06:42.785000 audit[1341]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1341 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:06:42.785000 audit[1341]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff41818b10 a2=0 a3=7fff41818afc items=0 ppid=1251 pid=1341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:06:42.785000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552
Oct  2 19:06:42.786954 env[1251]: time="2023-10-02T19:06:42.786924536Z" level=info msg="Loading containers: done."
Oct  2 19:06:42.801034 env[1251]: time="2023-10-02T19:06:42.800996952Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2
Oct  2 19:06:42.801166 env[1251]: time="2023-10-02T19:06:42.801148466Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23
Oct  2 19:06:42.801248 env[1251]: time="2023-10-02T19:06:42.801219299Z" level=info msg="Daemon has completed initialization"
Oct  2 19:06:42.816595 systemd[1]: Started docker.service.
Oct  2 19:06:42.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:42.824568 env[1251]: time="2023-10-02T19:06:42.824511659Z" level=info msg="API listen on /run/docker.sock"
Oct  2 19:06:42.843082 systemd[1]: Reloading.
Oct  2 19:06:42.908849 /usr/lib/systemd/system-generators/torcx-generator[1390]: time="2023-10-02T19:06:42Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]"
Oct  2 19:06:42.908891 /usr/lib/systemd/system-generators/torcx-generator[1390]: time="2023-10-02T19:06:42Z" level=info msg="torcx already run"
Oct  2 19:06:42.972399 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Oct  2 19:06:42.972416 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Oct  2 19:06:42.993154 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Oct  2 19:06:43.046000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.046000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.046000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.046000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.046000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.046000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.046000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.046000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.046000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.046000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.046000 audit: BPF prog-id=37 op=LOAD
Oct  2 19:06:43.046000 audit: BPF prog-id=21 op=UNLOAD
Oct  2 19:06:43.046000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.046000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.046000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.046000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.046000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.046000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.046000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.046000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.047000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.047000 audit: BPF prog-id=38 op=LOAD
Oct  2 19:06:43.047000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.047000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.047000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.047000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.047000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.047000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.047000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.047000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.047000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.047000 audit: BPF prog-id=39 op=LOAD
Oct  2 19:06:43.047000 audit: BPF prog-id=22 op=UNLOAD
Oct  2 19:06:43.047000 audit: BPF prog-id=23 op=UNLOAD
Oct  2 19:06:43.048000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.048000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.048000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.048000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.048000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.048000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.048000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.048000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.048000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.048000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.048000 audit: BPF prog-id=40 op=LOAD
Oct  2 19:06:43.048000 audit: BPF prog-id=32 op=UNLOAD
Oct  2 19:06:43.048000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.048000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.048000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.048000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.048000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.048000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.048000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.048000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.048000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.048000 audit: BPF prog-id=41 op=LOAD
Oct  2 19:06:43.048000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.048000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.048000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.048000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.048000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.048000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.048000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.048000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.049000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.049000 audit: BPF prog-id=42 op=LOAD
Oct  2 19:06:43.049000 audit: BPF prog-id=33 op=UNLOAD
Oct  2 19:06:43.049000 audit: BPF prog-id=34 op=UNLOAD
Oct  2 19:06:43.050000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.050000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.050000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.050000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.050000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.050000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.050000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.050000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.050000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.051000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.051000 audit: BPF prog-id=43 op=LOAD
Oct  2 19:06:43.051000 audit: BPF prog-id=30 op=UNLOAD
Oct  2 19:06:43.052000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.052000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.052000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.052000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.052000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.052000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.052000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.052000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.052000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.052000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.052000 audit: BPF prog-id=44 op=LOAD
Oct  2 19:06:43.052000 audit: BPF prog-id=26 op=UNLOAD
Oct  2 19:06:43.053000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.053000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.053000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.053000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.053000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.053000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.053000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.053000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.053000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.053000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.053000 audit: BPF prog-id=45 op=LOAD
Oct  2 19:06:43.053000 audit: BPF prog-id=35 op=UNLOAD
Oct  2 19:06:43.053000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.053000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.053000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.053000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.053000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.053000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.053000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.053000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.054000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.054000 audit: BPF prog-id=46 op=LOAD
Oct  2 19:06:43.054000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.054000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.054000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.054000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.054000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.054000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.054000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.054000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.054000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.054000 audit: BPF prog-id=47 op=LOAD
Oct  2 19:06:43.054000 audit: BPF prog-id=24 op=UNLOAD
Oct  2 19:06:43.054000 audit: BPF prog-id=25 op=UNLOAD
Oct  2 19:06:43.054000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.054000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.054000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.054000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.054000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.054000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.054000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.054000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.054000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.054000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.054000 audit: BPF prog-id=48 op=LOAD
Oct  2 19:06:43.054000 audit: BPF prog-id=27 op=UNLOAD
Oct  2 19:06:43.054000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.054000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.054000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.054000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.054000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.054000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.054000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.054000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.055000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.055000 audit: BPF prog-id=49 op=LOAD
Oct  2 19:06:43.055000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.055000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.055000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.055000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.055000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.055000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.055000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.055000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.055000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.055000 audit: BPF prog-id=50 op=LOAD
Oct  2 19:06:43.055000 audit: BPF prog-id=28 op=UNLOAD
Oct  2 19:06:43.055000 audit: BPF prog-id=29 op=UNLOAD
Oct  2 19:06:43.056000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.056000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.056000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.056000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.056000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.056000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.056000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.056000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.056000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.056000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:06:43.056000 audit: BPF prog-id=51 op=LOAD
Oct  2 19:06:43.056000 audit: BPF prog-id=31 op=UNLOAD
Oct  2 19:06:43.063823 systemd[1]: Started kubelet.service.
Oct  2 19:06:43.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:43.181790 kubelet[1430]: E1002 19:06:43.181658    1430 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml"
Oct  2 19:06:43.185950 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE
Oct  2 19:06:43.186075 systemd[1]: kubelet.service: Failed with result 'exit-code'.
Oct  2 19:06:43.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Oct  2 19:06:43.630518 env[1104]: time="2023-10-02T19:06:43.630386950Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.6\""
Oct  2 19:06:44.347415 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4017574002.mount: Deactivated successfully.
Oct  2 19:06:46.800885 env[1104]: time="2023-10-02T19:06:46.800819175Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:06:46.802808 env[1104]: time="2023-10-02T19:06:46.802751009Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:19b9246d37c8b8c754a8af86facf1975604cfc709fc0ff736531917402189d9c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:06:46.807804 env[1104]: time="2023-10-02T19:06:46.807743834Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:06:46.808563 env[1104]: time="2023-10-02T19:06:46.808511894Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.6\" returns image reference \"sha256:19b9246d37c8b8c754a8af86facf1975604cfc709fc0ff736531917402189d9c\""
Oct  2 19:06:46.809955 env[1104]: time="2023-10-02T19:06:46.809296396Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:5e7a0196a7908cb49bcbf751d2546a008c329ff1e70c26c1cd542e0ada4b623c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:06:46.820906 env[1104]: time="2023-10-02T19:06:46.820860367Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.6\""
Oct  2 19:06:49.551265 env[1104]: time="2023-10-02T19:06:49.551178553Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:06:49.553820 env[1104]: time="2023-10-02T19:06:49.553745608Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7810e6aed9778a5f84fc93f48b0c52edfc55333d7b8de7c71972df8c5b925988,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:06:49.555720 env[1104]: time="2023-10-02T19:06:49.555661341Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:06:49.557598 env[1104]: time="2023-10-02T19:06:49.557550345Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:c76ca5b0cf607f82c54d51c3c6766da30c9a9f684065e1cac761ea9b07b74e97,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:06:49.558317 env[1104]: time="2023-10-02T19:06:49.558282428Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.6\" returns image reference \"sha256:7810e6aed9778a5f84fc93f48b0c52edfc55333d7b8de7c71972df8c5b925988\""
Oct  2 19:06:49.576270 env[1104]: time="2023-10-02T19:06:49.576196560Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.6\""
Oct  2 19:06:51.531027 env[1104]: time="2023-10-02T19:06:51.530964225Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:06:51.534688 env[1104]: time="2023-10-02T19:06:51.534639990Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:993d768b9b96e874c4a171298200661de0d28e52f4d8764e6b2ed1c42470851d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:06:51.536708 env[1104]: time="2023-10-02T19:06:51.536670408Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:06:51.538320 env[1104]: time="2023-10-02T19:06:51.538284085Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:bb227512d96e93dd3fe356cef552cc3f78905f36330b762adde23c3f0943d57b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:06:51.539007 env[1104]: time="2023-10-02T19:06:51.538954923Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.6\" returns image reference \"sha256:993d768b9b96e874c4a171298200661de0d28e52f4d8764e6b2ed1c42470851d\""
Oct  2 19:06:51.551199 env[1104]: time="2023-10-02T19:06:51.551163283Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.6\""
Oct  2 19:06:53.116751 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1751977479.mount: Deactivated successfully.
Oct  2 19:06:53.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:53.436934 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1.
Oct  2 19:06:53.437129 systemd[1]: Stopped kubelet.service.
Oct  2 19:06:53.437895 kernel: kauditd_printk_skb: 263 callbacks suppressed
Oct  2 19:06:53.437963 kernel: audit: type=1130 audit(1696273613.435:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:53.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:53.438614 systemd[1]: Started kubelet.service.
Oct  2 19:06:53.441856 kernel: audit: type=1131 audit(1696273613.435:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:53.441898 kernel: audit: type=1130 audit(1696273613.436:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:53.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:06:53.484125 kubelet[1471]: E1002 19:06:53.484053    1471 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml"
Oct  2 19:06:53.487161 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE
Oct  2 19:06:53.487299 systemd[1]: kubelet.service: Failed with result 'exit-code'.
Oct  2 19:06:53.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Oct  2 19:06:53.490245 kernel: audit: type=1131 audit(1696273613.486:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Oct  2 19:06:53.765325 env[1104]: time="2023-10-02T19:06:53.763247901Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:06:53.766366 env[1104]: time="2023-10-02T19:06:53.766328009Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ec57bbfaaae73ecc3c12f05d5ae974468cc0ef356dee588cd15fd471815c7985,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:06:53.767735 env[1104]: time="2023-10-02T19:06:53.767709079Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:06:53.769077 env[1104]: time="2023-10-02T19:06:53.769027212Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:8e9eff2f6d0b398f9ac5f5a15c1cb7d5f468f28d64a78d593d57f72a969a54ef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:06:53.769569 env[1104]: time="2023-10-02T19:06:53.769532269Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.6\" returns image reference \"sha256:ec57bbfaaae73ecc3c12f05d5ae974468cc0ef356dee588cd15fd471815c7985\""
Oct  2 19:06:53.780187 env[1104]: time="2023-10-02T19:06:53.780140537Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\""
Oct  2 19:06:54.576673 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount415465342.mount: Deactivated successfully.
Oct  2 19:06:55.127870 env[1104]: time="2023-10-02T19:06:55.127807866Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:06:55.130697 env[1104]: time="2023-10-02T19:06:55.130662149Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:06:55.132396 env[1104]: time="2023-10-02T19:06:55.132361557Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:06:55.133818 env[1104]: time="2023-10-02T19:06:55.133781581Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:06:55.134269 env[1104]: time="2023-10-02T19:06:55.134240291Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\""
Oct  2 19:06:55.143562 env[1104]: time="2023-10-02T19:06:55.143515489Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\""
Oct  2 19:06:56.672832 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3670673696.mount: Deactivated successfully.
Oct  2 19:07:01.337855 env[1104]: time="2023-10-02T19:07:01.337784637Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:01.339722 env[1104]: time="2023-10-02T19:07:01.339688969Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:01.341499 env[1104]: time="2023-10-02T19:07:01.341458648Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:01.343003 env[1104]: time="2023-10-02T19:07:01.342956518Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:01.343691 env[1104]: time="2023-10-02T19:07:01.343662412Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681\""
Oct  2 19:07:01.360549 env[1104]: time="2023-10-02T19:07:01.360488343Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\""
Oct  2 19:07:02.761693 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3465716697.mount: Deactivated successfully.
Oct  2 19:07:03.593819 env[1104]: time="2023-10-02T19:07:03.593741367Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:03.596388 env[1104]: time="2023-10-02T19:07:03.596312770Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:03.599360 env[1104]: time="2023-10-02T19:07:03.599320282Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:03.599972 env[1104]: time="2023-10-02T19:07:03.599931348Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:03.600810 env[1104]: time="2023-10-02T19:07:03.600754492Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\""
Oct  2 19:07:03.640771 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2.
Oct  2 19:07:03.641015 systemd[1]: Stopped kubelet.service.
Oct  2 19:07:03.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:07:03.642689 systemd[1]: Started kubelet.service.
Oct  2 19:07:03.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:07:03.647248 kernel: audit: type=1130 audit(1696273623.639:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:07:03.647326 kernel: audit: type=1131 audit(1696273623.639:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:07:03.647343 kernel: audit: type=1130 audit(1696273623.639:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:07:03.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:07:03.737261 kubelet[1506]: E1002 19:07:03.737188    1506 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml"
Oct  2 19:07:03.740124 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE
Oct  2 19:07:03.740313 systemd[1]: kubelet.service: Failed with result 'exit-code'.
Oct  2 19:07:03.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Oct  2 19:07:03.743258 kernel: audit: type=1131 audit(1696273623.739:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Oct  2 19:07:05.675066 systemd[1]: Stopped kubelet.service.
Oct  2 19:07:05.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:07:05.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:07:05.679519 kernel: audit: type=1130 audit(1696273625.673:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:07:05.679574 kernel: audit: type=1131 audit(1696273625.673:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:07:05.696579 systemd[1]: Reloading.
Oct  2 19:07:05.767743 /usr/lib/systemd/system-generators/torcx-generator[1604]: time="2023-10-02T19:07:05Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]"
Oct  2 19:07:05.768144 /usr/lib/systemd/system-generators/torcx-generator[1604]: time="2023-10-02T19:07:05Z" level=info msg="torcx already run"
Oct  2 19:07:05.841061 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Oct  2 19:07:05.841089 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Oct  2 19:07:05.867788 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Oct  2 19:07:05.926000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.926000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.931348 kernel: audit: type=1400 audit(1696273625.926:395): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.931395 kernel: audit: type=1400 audit(1696273625.926:396): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.931413 kernel: audit: type=1400 audit(1696273625.926:397): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.926000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.926000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.935043 kernel: audit: type=1400 audit(1696273625.926:398): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.926000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.926000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.926000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.926000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.926000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.930000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.930000 audit: BPF prog-id=52 op=LOAD
Oct  2 19:07:05.930000 audit: BPF prog-id=37 op=UNLOAD
Oct  2 19:07:05.930000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.930000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.930000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.930000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.930000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.930000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.930000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.930000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.931000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.931000 audit: BPF prog-id=53 op=LOAD
Oct  2 19:07:05.931000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.932000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.932000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.932000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.932000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.932000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.932000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.932000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.933000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.933000 audit: BPF prog-id=54 op=LOAD
Oct  2 19:07:05.933000 audit: BPF prog-id=38 op=UNLOAD
Oct  2 19:07:05.933000 audit: BPF prog-id=39 op=UNLOAD
Oct  2 19:07:05.935000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.935000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.935000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.935000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.935000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.935000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.935000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.935000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.935000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.935000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.935000 audit: BPF prog-id=55 op=LOAD
Oct  2 19:07:05.935000 audit: BPF prog-id=40 op=UNLOAD
Oct  2 19:07:05.935000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.935000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.935000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.935000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.935000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.935000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.935000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.935000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.935000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.935000 audit: BPF prog-id=56 op=LOAD
Oct  2 19:07:05.936000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.936000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.936000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.936000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.936000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.936000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.936000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.936000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.936000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.936000 audit: BPF prog-id=57 op=LOAD
Oct  2 19:07:05.936000 audit: BPF prog-id=41 op=UNLOAD
Oct  2 19:07:05.936000 audit: BPF prog-id=42 op=UNLOAD
Oct  2 19:07:05.938000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.938000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.938000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.938000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.938000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.938000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.938000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.938000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.938000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.938000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.938000 audit: BPF prog-id=58 op=LOAD
Oct  2 19:07:05.938000 audit: BPF prog-id=43 op=UNLOAD
Oct  2 19:07:05.939000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.939000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.939000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.939000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.939000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.939000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.939000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.939000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.939000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.939000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.939000 audit: BPF prog-id=59 op=LOAD
Oct  2 19:07:05.940000 audit: BPF prog-id=44 op=UNLOAD
Oct  2 19:07:05.940000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.940000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.940000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.940000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.940000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.940000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.940000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.940000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.940000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.941000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.941000 audit: BPF prog-id=60 op=LOAD
Oct  2 19:07:05.941000 audit: BPF prog-id=45 op=UNLOAD
Oct  2 19:07:05.941000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.941000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.941000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.941000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.941000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.941000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.941000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.941000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.941000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.941000 audit: BPF prog-id=61 op=LOAD
Oct  2 19:07:05.941000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.941000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.941000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.941000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.941000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.941000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.941000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.941000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.941000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.941000 audit: BPF prog-id=62 op=LOAD
Oct  2 19:07:05.941000 audit: BPF prog-id=46 op=UNLOAD
Oct  2 19:07:05.941000 audit: BPF prog-id=47 op=UNLOAD
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit: BPF prog-id=63 op=LOAD
Oct  2 19:07:05.942000 audit: BPF prog-id=48 op=UNLOAD
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit: BPF prog-id=64 op=LOAD
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit: BPF prog-id=65 op=LOAD
Oct  2 19:07:05.942000 audit: BPF prog-id=49 op=UNLOAD
Oct  2 19:07:05.942000 audit: BPF prog-id=50 op=UNLOAD
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:05.942000 audit: BPF prog-id=66 op=LOAD
Oct  2 19:07:05.943000 audit: BPF prog-id=51 op=UNLOAD
Oct  2 19:07:05.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:07:05.954271 systemd[1]: Started kubelet.service.
Oct  2 19:07:06.005932 kubelet[1645]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Oct  2 19:07:06.005932 kubelet[1645]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI.
Oct  2 19:07:06.005932 kubelet[1645]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Oct  2 19:07:06.006476 kubelet[1645]: I1002 19:07:06.006006    1645 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime"
Oct  2 19:07:06.778460 kubelet[1645]: I1002 19:07:06.778406    1645 server.go:415] "Kubelet version" kubeletVersion="v1.27.2"
Oct  2 19:07:06.778460 kubelet[1645]: I1002 19:07:06.778450    1645 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK=""
Oct  2 19:07:06.778750 kubelet[1645]: I1002 19:07:06.778711    1645 server.go:837] "Client rotation is on, will bootstrap in background"
Oct  2 19:07:06.782849 kubelet[1645]: I1002 19:07:06.782798    1645 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt"
Oct  2 19:07:06.782849 kubelet[1645]: E1002 19:07:06.782841    1645 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.30:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.30:6443: connect: connection refused
Oct  2 19:07:06.786339 kubelet[1645]: I1002 19:07:06.786320    1645 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified.  defaulting to /"
Oct  2 19:07:06.786591 kubelet[1645]: I1002 19:07:06.786567    1645 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[]
Oct  2 19:07:06.786700 kubelet[1645]: I1002 19:07:06.786656    1645 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.1} GracePeriod:0s MinReclaim:<nil>} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity:<nil> Percentage:0.05} GracePeriod:0s MinReclaim:<nil>} {Signal:imagefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.15} GracePeriod:0s MinReclaim:<nil>} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:<nil>}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}
Oct  2 19:07:06.786700 kubelet[1645]: I1002 19:07:06.786696    1645 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container"
Oct  2 19:07:06.786905 kubelet[1645]: I1002 19:07:06.786712    1645 container_manager_linux.go:302] "Creating device plugin manager"
Oct  2 19:07:06.786905 kubelet[1645]: I1002 19:07:06.786833    1645 state_mem.go:36] "Initialized new in-memory state store"
Oct  2 19:07:06.791283 kubelet[1645]: I1002 19:07:06.791257    1645 kubelet.go:405] "Attempting to sync node with API server"
Oct  2 19:07:06.791365 kubelet[1645]: I1002 19:07:06.791289    1645 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests"
Oct  2 19:07:06.791365 kubelet[1645]: I1002 19:07:06.791323    1645 kubelet.go:309] "Adding apiserver pod source"
Oct  2 19:07:06.791365 kubelet[1645]: I1002 19:07:06.791352    1645 apiserver.go:42] "Waiting for node sync before watching apiserver pods"
Oct  2 19:07:06.792024 kubelet[1645]: W1002 19:07:06.791947    1645 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.0.0.30:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.30:6443: connect: connection refused
Oct  2 19:07:06.792120 kubelet[1645]: E1002 19:07:06.792053    1645 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.30:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.30:6443: connect: connection refused
Oct  2 19:07:06.792220 kubelet[1645]: W1002 19:07:06.792166    1645 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.0.0.30:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.30:6443: connect: connection refused
Oct  2 19:07:06.792298 kubelet[1645]: E1002 19:07:06.792219    1645 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.30:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.30:6443: connect: connection refused
Oct  2 19:07:06.792298 kubelet[1645]: I1002 19:07:06.792264    1645 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1"
Oct  2 19:07:06.792769 kubelet[1645]: W1002 19:07:06.792743    1645 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating.
Oct  2 19:07:06.793443 kubelet[1645]: I1002 19:07:06.793414    1645 server.go:1168] "Started kubelet"
Oct  2 19:07:06.793715 kubelet[1645]: I1002 19:07:06.793685    1645 server.go:162] "Starting to listen" address="0.0.0.0" port=10250
Oct  2 19:07:06.793779 kubelet[1645]: I1002 19:07:06.793715    1645 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10
Oct  2 19:07:06.795058 kubelet[1645]: I1002 19:07:06.795020    1645 server.go:461] "Adding debug handlers to kubelet server"
Oct  2 19:07:06.793000 audit[1645]: AVC avc:  denied  { mac_admin } for  pid=1645 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:06.793000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Oct  2 19:07:06.793000 audit[1645]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d4cea0 a1=c000cc4750 a2=c000d4ce40 a3=25 items=0 ppid=1 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:06.793000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Oct  2 19:07:06.794000 audit[1645]: AVC avc:  denied  { mac_admin } for  pid=1645 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:06.794000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Oct  2 19:07:06.794000 audit[1645]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0004cd760 a1=c000cc4768 a2=c000d4cfc0 a3=25 items=0 ppid=1 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:06.794000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Oct  2 19:07:06.795710 kubelet[1645]: I1002 19:07:06.795264    1645 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument"
Oct  2 19:07:06.795710 kubelet[1645]: I1002 19:07:06.795319    1645 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument"
Oct  2 19:07:06.795710 kubelet[1645]: I1002 19:07:06.795429    1645 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer"
Oct  2 19:07:06.796354 kubelet[1645]: I1002 19:07:06.796321    1645 volume_manager.go:284] "Starting Kubelet Volume Manager"
Oct  2 19:07:06.796702 kubelet[1645]: I1002 19:07:06.796446    1645 desired_state_of_world_populator.go:145] "Desired state populator starts to run"
Oct  2 19:07:06.797007 kubelet[1645]: E1002 19:07:06.796853    1645 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.178a5fe056e1f3f1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 7, 6, 793374705, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 7, 6, 793374705, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.0.0.30:6443/api/v1/namespaces/default/events": dial tcp 10.0.0.30:6443: connect: connection refused'(may retry after sleeping)
Oct  2 19:07:06.797181 kubelet[1645]: E1002 19:07:06.797122    1645 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs"
Oct  2 19:07:06.797181 kubelet[1645]: E1002 19:07:06.797149    1645 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem"
Oct  2 19:07:06.797407 kubelet[1645]: W1002 19:07:06.797363    1645 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.0.0.30:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.30:6443: connect: connection refused
Oct  2 19:07:06.797472 kubelet[1645]: E1002 19:07:06.797420    1645 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.30:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.30:6443: connect: connection refused
Oct  2 19:07:06.797791 kubelet[1645]: E1002 19:07:06.797767    1645 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.30:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.30:6443: connect: connection refused" interval="200ms"
Oct  2 19:07:06.804000 audit[1657]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1657 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:07:06.804000 audit[1657]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff7b808f20 a2=0 a3=7fff7b808f0c items=0 ppid=1645 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:06.804000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65
Oct  2 19:07:06.806000 audit[1658]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1658 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:07:06.806000 audit[1658]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6a01a180 a2=0 a3=7ffc6a01a16c items=0 ppid=1645 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:06.806000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572
Oct  2 19:07:06.812000 audit[1660]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1660 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:07:06.812000 audit[1660]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdd684a920 a2=0 a3=7ffdd684a90c items=0 ppid=1645 pid=1660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:06.812000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Oct  2 19:07:06.814000 audit[1664]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1664 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:07:06.814000 audit[1664]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdbf36e7d0 a2=0 a3=7ffdbf36e7bc items=0 ppid=1645 pid=1664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:06.814000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Oct  2 19:07:06.819000 audit[1667]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1667 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:07:06.819000 audit[1667]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe9166a1b0 a2=0 a3=7ffe9166a19c items=0 ppid=1645 pid=1667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:06.819000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38
Oct  2 19:07:06.820676 kubelet[1645]: I1002 19:07:06.820653    1645 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4
Oct  2 19:07:06.820000 audit[1668]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1668 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:07:06.820000 audit[1668]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd6580dd70 a2=0 a3=7ffd6580dd5c items=0 ppid=1645 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:06.820000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65
Oct  2 19:07:06.821765 kubelet[1645]: I1002 19:07:06.821733    1645 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6
Oct  2 19:07:06.821859 kubelet[1645]: I1002 19:07:06.821785    1645 status_manager.go:207] "Starting to sync pod status with apiserver"
Oct  2 19:07:06.820000 audit[1669]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1669 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:07:06.820000 audit[1669]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc36c4f080 a2=0 a3=7ffc36c4f06c items=0 ppid=1645 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:06.820000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65
Oct  2 19:07:06.822000 audit[1671]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1671 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:07:06.822000 audit[1671]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd200b4310 a2=0 a3=7ffd200b42fc items=0 ppid=1645 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:06.822000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65
Oct  2 19:07:06.823000 audit[1672]: NETFILTER_CFG table=nat:34 family=10 entries=2 op=nft_register_chain pid=1672 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:07:06.823000 audit[1672]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff90b1ad70 a2=0 a3=7fff90b1ad5c items=0 ppid=1645 pid=1672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:06.824551 kubelet[1645]: I1002 19:07:06.824502    1645 kubelet.go:2257] "Starting kubelet main sync loop"
Oct  2 19:07:06.824590 kubelet[1645]: E1002 19:07:06.824581    1645 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]"
Oct  2 19:07:06.823000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174
Oct  2 19:07:06.825382 kubelet[1645]: W1002 19:07:06.825112    1645 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.0.0.30:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.30:6443: connect: connection refused
Oct  2 19:07:06.825382 kubelet[1645]: E1002 19:07:06.825381    1645 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.30:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.30:6443: connect: connection refused
Oct  2 19:07:06.824000 audit[1674]: NETFILTER_CFG table=filter:35 family=10 entries=2 op=nft_register_chain pid=1674 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:07:06.824000 audit[1674]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc93a22b80 a2=0 a3=7ffc93a22b6c items=0 ppid=1645 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:06.824000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572
Oct  2 19:07:06.825000 audit[1675]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_chain pid=1675 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:07:06.825000 audit[1675]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd63dfabe0 a2=0 a3=7ffd63dfabcc items=0 ppid=1645 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:06.825000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174
Oct  2 19:07:06.826000 audit[1677]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1677 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:07:06.826000 audit[1677]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff937a7c90 a2=0 a3=7fff937a7c7c items=0 ppid=1645 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:06.827813 kubelet[1645]: I1002 19:07:06.827721    1645 cpu_manager.go:214] "Starting CPU manager" policy="none"
Oct  2 19:07:06.827813 kubelet[1645]: I1002 19:07:06.827741    1645 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s"
Oct  2 19:07:06.827813 kubelet[1645]: I1002 19:07:06.827757    1645 state_mem.go:36] "Initialized new in-memory state store"
Oct  2 19:07:06.826000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572
Oct  2 19:07:06.833001 kubelet[1645]: I1002 19:07:06.832970    1645 policy_none.go:49] "None policy: Start"
Oct  2 19:07:06.833543 kubelet[1645]: I1002 19:07:06.833526    1645 memory_manager.go:169] "Starting memorymanager" policy="None"
Oct  2 19:07:06.833589 kubelet[1645]: I1002 19:07:06.833547    1645 state_mem.go:35] "Initializing new in-memory state store"
Oct  2 19:07:06.838405 systemd[1]: Created slice kubepods.slice.
Oct  2 19:07:06.842048 systemd[1]: Created slice kubepods-burstable.slice.
Oct  2 19:07:06.844369 systemd[1]: Created slice kubepods-besteffort.slice.
Oct  2 19:07:06.851943 kubelet[1645]: I1002 19:07:06.851906    1645 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found"
Oct  2 19:07:06.850000 audit[1645]: AVC avc:  denied  { mac_admin } for  pid=1645 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:06.850000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Oct  2 19:07:06.850000 audit[1645]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00111af90 a1=c0011117e8 a2=c00111af60 a3=25 items=0 ppid=1 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:06.850000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Oct  2 19:07:06.852319 kubelet[1645]: I1002 19:07:06.851998    1645 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument"
Oct  2 19:07:06.852319 kubelet[1645]: I1002 19:07:06.852157    1645 plugin_manager.go:118] "Starting Kubelet Plugin Manager"
Oct  2 19:07:06.852830 kubelet[1645]: E1002 19:07:06.852674    1645 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found"
Oct  2 19:07:06.898075 kubelet[1645]: I1002 19:07:06.898041    1645 kubelet_node_status.go:70] "Attempting to register node" node="localhost"
Oct  2 19:07:06.898549 kubelet[1645]: E1002 19:07:06.898510    1645 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.30:6443/api/v1/nodes\": dial tcp 10.0.0.30:6443: connect: connection refused" node="localhost"
Oct  2 19:07:06.925021 kubelet[1645]: I1002 19:07:06.924933    1645 topology_manager.go:212] "Topology Admit Handler"
Oct  2 19:07:06.926365 kubelet[1645]: I1002 19:07:06.926330    1645 topology_manager.go:212] "Topology Admit Handler"
Oct  2 19:07:06.927008 kubelet[1645]: I1002 19:07:06.926984    1645 topology_manager.go:212] "Topology Admit Handler"
Oct  2 19:07:06.932271 systemd[1]: Created slice kubepods-burstable-pod24fef87020af50fba838138f9686fc61.slice.
Oct  2 19:07:06.946414 systemd[1]: Created slice kubepods-burstable-podf9e636e26f0a1c809e1732b85072f0ed.slice.
Oct  2 19:07:06.949013 systemd[1]: Created slice kubepods-burstable-pod80b8b8966aa7d1c422f3be2bfac9c13f.slice.
Oct  2 19:07:06.997118 kubelet[1645]: I1002 19:07:06.997047    1645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/80b8b8966aa7d1c422f3be2bfac9c13f-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"80b8b8966aa7d1c422f3be2bfac9c13f\") " pod="kube-system/kube-controller-manager-localhost"
Oct  2 19:07:06.997118 kubelet[1645]: I1002 19:07:06.997109    1645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/80b8b8966aa7d1c422f3be2bfac9c13f-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"80b8b8966aa7d1c422f3be2bfac9c13f\") " pod="kube-system/kube-controller-manager-localhost"
Oct  2 19:07:06.997405 kubelet[1645]: I1002 19:07:06.997179    1645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/80b8b8966aa7d1c422f3be2bfac9c13f-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"80b8b8966aa7d1c422f3be2bfac9c13f\") " pod="kube-system/kube-controller-manager-localhost"
Oct  2 19:07:06.997405 kubelet[1645]: I1002 19:07:06.997272    1645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/24fef87020af50fba838138f9686fc61-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"24fef87020af50fba838138f9686fc61\") " pod="kube-system/kube-scheduler-localhost"
Oct  2 19:07:06.997405 kubelet[1645]: I1002 19:07:06.997297    1645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f9e636e26f0a1c809e1732b85072f0ed-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"f9e636e26f0a1c809e1732b85072f0ed\") " pod="kube-system/kube-apiserver-localhost"
Oct  2 19:07:06.997405 kubelet[1645]: I1002 19:07:06.997313    1645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f9e636e26f0a1c809e1732b85072f0ed-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"f9e636e26f0a1c809e1732b85072f0ed\") " pod="kube-system/kube-apiserver-localhost"
Oct  2 19:07:06.997405 kubelet[1645]: I1002 19:07:06.997336    1645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f9e636e26f0a1c809e1732b85072f0ed-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"f9e636e26f0a1c809e1732b85072f0ed\") " pod="kube-system/kube-apiserver-localhost"
Oct  2 19:07:06.997575 kubelet[1645]: I1002 19:07:06.997404    1645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/80b8b8966aa7d1c422f3be2bfac9c13f-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"80b8b8966aa7d1c422f3be2bfac9c13f\") " pod="kube-system/kube-controller-manager-localhost"
Oct  2 19:07:06.998699 kubelet[1645]: E1002 19:07:06.998670    1645 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.30:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.30:6443: connect: connection refused" interval="400ms"
Oct  2 19:07:07.098425 kubelet[1645]: I1002 19:07:07.098206    1645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/80b8b8966aa7d1c422f3be2bfac9c13f-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"80b8b8966aa7d1c422f3be2bfac9c13f\") " pod="kube-system/kube-controller-manager-localhost"
Oct  2 19:07:07.100353 kubelet[1645]: I1002 19:07:07.100309    1645 kubelet_node_status.go:70] "Attempting to register node" node="localhost"
Oct  2 19:07:07.100858 kubelet[1645]: E1002 19:07:07.100817    1645 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.30:6443/api/v1/nodes\": dial tcp 10.0.0.30:6443: connect: connection refused" node="localhost"
Oct  2 19:07:07.245634 kubelet[1645]: E1002 19:07:07.245579    1645 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:07.246475 env[1104]: time="2023-10-02T19:07:07.246428394Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:24fef87020af50fba838138f9686fc61,Namespace:kube-system,Attempt:0,}"
Oct  2 19:07:07.253784 kubelet[1645]: E1002 19:07:07.253739    1645 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:07.253907 kubelet[1645]: E1002 19:07:07.253813    1645 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:07.254477 env[1104]: time="2023-10-02T19:07:07.254439841Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:f9e636e26f0a1c809e1732b85072f0ed,Namespace:kube-system,Attempt:0,}"
Oct  2 19:07:07.254577 env[1104]: time="2023-10-02T19:07:07.254439771Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:80b8b8966aa7d1c422f3be2bfac9c13f,Namespace:kube-system,Attempt:0,}"
Oct  2 19:07:07.399979 kubelet[1645]: E1002 19:07:07.399821    1645 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.30:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.30:6443: connect: connection refused" interval="800ms"
Oct  2 19:07:07.502765 kubelet[1645]: I1002 19:07:07.502726    1645 kubelet_node_status.go:70] "Attempting to register node" node="localhost"
Oct  2 19:07:07.503071 kubelet[1645]: E1002 19:07:07.503055    1645 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.30:6443/api/v1/nodes\": dial tcp 10.0.0.30:6443: connect: connection refused" node="localhost"
Oct  2 19:07:07.623163 kubelet[1645]: W1002 19:07:07.623065    1645 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.0.0.30:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.30:6443: connect: connection refused
Oct  2 19:07:07.623163 kubelet[1645]: E1002 19:07:07.623169    1645 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.30:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.30:6443: connect: connection refused
Oct  2 19:07:07.635660 kubelet[1645]: W1002 19:07:07.635567    1645 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.0.0.30:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.30:6443: connect: connection refused
Oct  2 19:07:07.635660 kubelet[1645]: E1002 19:07:07.635634    1645 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.30:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.30:6443: connect: connection refused
Oct  2 19:07:07.772201 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2329937502.mount: Deactivated successfully.
Oct  2 19:07:07.779241 env[1104]: time="2023-10-02T19:07:07.779157371Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:07.780098 env[1104]: time="2023-10-02T19:07:07.780064112Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:07.783183 env[1104]: time="2023-10-02T19:07:07.783140913Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:07.784724 env[1104]: time="2023-10-02T19:07:07.784677485Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:07.786043 env[1104]: time="2023-10-02T19:07:07.786012720Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:07.787491 env[1104]: time="2023-10-02T19:07:07.787452851Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:07.789652 env[1104]: time="2023-10-02T19:07:07.789618563Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:07.791629 env[1104]: time="2023-10-02T19:07:07.791598227Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:07.795051 env[1104]: time="2023-10-02T19:07:07.795008403Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:07.796469 env[1104]: time="2023-10-02T19:07:07.796439277Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:07.797965 env[1104]: time="2023-10-02T19:07:07.797942777Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:07.798732 env[1104]: time="2023-10-02T19:07:07.798698665Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:07.827107 env[1104]: time="2023-10-02T19:07:07.827008536Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 19:07:07.827107 env[1104]: time="2023-10-02T19:07:07.827057959Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 19:07:07.827107 env[1104]: time="2023-10-02T19:07:07.827067677Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 19:07:07.827379 env[1104]: time="2023-10-02T19:07:07.827196419Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e7dad7bed63e0116806b1c8ab24d9cfe934ca223f5f78314e1646519db9dbd89 pid=1694 runtime=io.containerd.runc.v2
Oct  2 19:07:07.830523 env[1104]: time="2023-10-02T19:07:07.830364681Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 19:07:07.830523 env[1104]: time="2023-10-02T19:07:07.830404436Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 19:07:07.830523 env[1104]: time="2023-10-02T19:07:07.830414485Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 19:07:07.830722 env[1104]: time="2023-10-02T19:07:07.830584013Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3c605dc2ee5c5705faad7a84128e60db30b281659a8ab8a7c4faa53adce040f2 pid=1693 runtime=io.containerd.runc.v2
Oct  2 19:07:07.836929 env[1104]: time="2023-10-02T19:07:07.836424197Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 19:07:07.836929 env[1104]: time="2023-10-02T19:07:07.836481445Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 19:07:07.836929 env[1104]: time="2023-10-02T19:07:07.836498066Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 19:07:07.836929 env[1104]: time="2023-10-02T19:07:07.836644120Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/30b960f2a15946d35e0ac47e740544faf66e126cf63352d5402be5a3fe7b6f85 pid=1716 runtime=io.containerd.runc.v2
Oct  2 19:07:07.896855 systemd[1]: Started cri-containerd-e7dad7bed63e0116806b1c8ab24d9cfe934ca223f5f78314e1646519db9dbd89.scope.
Oct  2 19:07:07.899416 kubelet[1645]: W1002 19:07:07.899295    1645 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.0.0.30:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.30:6443: connect: connection refused
Oct  2 19:07:07.899416 kubelet[1645]: E1002 19:07:07.899372    1645 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.30:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.30:6443: connect: connection refused
Oct  2 19:07:07.906081 systemd[1]: Started cri-containerd-3c605dc2ee5c5705faad7a84128e60db30b281659a8ab8a7c4faa53adce040f2.scope.
Oct  2 19:07:07.912888 systemd[1]: Started cri-containerd-30b960f2a15946d35e0ac47e740544faf66e126cf63352d5402be5a3fe7b6f85.scope.
Oct  2 19:07:07.951000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:07.951000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:07.952000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:07.952000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:07.952000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:07.952000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:07.952000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:07.952000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:07.952000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.055000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.055000 audit: BPF prog-id=67 op=LOAD
Oct  2 19:07:08.056000 audit[1720]: AVC avc:  denied  { bpf } for  pid=1720 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.056000 audit[1720]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1694 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:08.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537646164376265643633653031313638303662316338616232346439
Oct  2 19:07:08.056000 audit[1720]: AVC avc:  denied  { perfmon } for  pid=1720 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.056000 audit[1720]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1694 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:08.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537646164376265643633653031313638303662316338616232346439
Oct  2 19:07:08.056000 audit[1720]: AVC avc:  denied  { bpf } for  pid=1720 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.056000 audit[1720]: AVC avc:  denied  { bpf } for  pid=1720 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.056000 audit[1720]: AVC avc:  denied  { bpf } for  pid=1720 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.056000 audit[1720]: AVC avc:  denied  { perfmon } for  pid=1720 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.056000 audit[1720]: AVC avc:  denied  { perfmon } for  pid=1720 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.056000 audit[1720]: AVC avc:  denied  { perfmon } for  pid=1720 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.056000 audit[1720]: AVC avc:  denied  { perfmon } for  pid=1720 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.056000 audit[1720]: AVC avc:  denied  { perfmon } for  pid=1720 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.056000 audit[1720]: AVC avc:  denied  { bpf } for  pid=1720 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.056000 audit[1720]: AVC avc:  denied  { bpf } for  pid=1720 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.056000 audit: BPF prog-id=68 op=LOAD
Oct  2 19:07:08.056000 audit[1720]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00021b3c0 items=0 ppid=1694 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:08.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537646164376265643633653031313638303662316338616232346439
Oct  2 19:07:08.057000 audit[1720]: AVC avc:  denied  { bpf } for  pid=1720 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.057000 audit[1720]: AVC avc:  denied  { bpf } for  pid=1720 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.057000 audit[1720]: AVC avc:  denied  { perfmon } for  pid=1720 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.057000 audit[1720]: AVC avc:  denied  { perfmon } for  pid=1720 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.057000 audit[1720]: AVC avc:  denied  { perfmon } for  pid=1720 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.057000 audit[1720]: AVC avc:  denied  { perfmon } for  pid=1720 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.057000 audit[1720]: AVC avc:  denied  { perfmon } for  pid=1720 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.057000 audit[1720]: AVC avc:  denied  { bpf } for  pid=1720 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.057000 audit[1720]: AVC avc:  denied  { bpf } for  pid=1720 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.057000 audit: BPF prog-id=69 op=LOAD
Oct  2 19:07:08.057000 audit[1720]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00021b408 items=0 ppid=1694 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:08.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537646164376265643633653031313638303662316338616232346439
Oct  2 19:07:08.057000 audit: BPF prog-id=69 op=UNLOAD
Oct  2 19:07:08.057000 audit: BPF prog-id=68 op=UNLOAD
Oct  2 19:07:08.057000 audit[1720]: AVC avc:  denied  { bpf } for  pid=1720 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.057000 audit[1720]: AVC avc:  denied  { bpf } for  pid=1720 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.057000 audit[1720]: AVC avc:  denied  { bpf } for  pid=1720 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.057000 audit[1720]: AVC avc:  denied  { perfmon } for  pid=1720 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.057000 audit[1720]: AVC avc:  denied  { perfmon } for  pid=1720 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.057000 audit[1720]: AVC avc:  denied  { perfmon } for  pid=1720 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.057000 audit[1720]: AVC avc:  denied  { perfmon } for  pid=1720 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.057000 audit[1720]: AVC avc:  denied  { perfmon } for  pid=1720 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.057000 audit[1720]: AVC avc:  denied  { bpf } for  pid=1720 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.057000 audit[1720]: AVC avc:  denied  { bpf } for  pid=1720 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.057000 audit: BPF prog-id=70 op=LOAD
Oct  2 19:07:08.057000 audit[1720]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00021b818 items=0 ppid=1694 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:08.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537646164376265643633653031313638303662316338616232346439
Oct  2 19:07:08.057000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.057000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.057000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.057000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.057000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.057000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.057000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.057000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.057000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.057000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.057000 audit: BPF prog-id=71 op=LOAD
Oct  2 19:07:08.058000 audit[1721]: AVC avc:  denied  { bpf } for  pid=1721 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.058000 audit[1721]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1693 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:08.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363363035646332656535633537303566616164376138343132386536
Oct  2 19:07:08.058000 audit[1721]: AVC avc:  denied  { perfmon } for  pid=1721 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.058000 audit[1721]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1693 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:08.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363363035646332656535633537303566616164376138343132386536
Oct  2 19:07:08.058000 audit[1721]: AVC avc:  denied  { bpf } for  pid=1721 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.058000 audit[1721]: AVC avc:  denied  { bpf } for  pid=1721 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.058000 audit[1721]: AVC avc:  denied  { bpf } for  pid=1721 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.058000 audit[1721]: AVC avc:  denied  { perfmon } for  pid=1721 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.058000 audit[1721]: AVC avc:  denied  { perfmon } for  pid=1721 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.058000 audit[1721]: AVC avc:  denied  { perfmon } for  pid=1721 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.058000 audit[1721]: AVC avc:  denied  { perfmon } for  pid=1721 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.058000 audit[1721]: AVC avc:  denied  { perfmon } for  pid=1721 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.058000 audit[1721]: AVC avc:  denied  { bpf } for  pid=1721 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.058000 audit[1721]: AVC avc:  denied  { bpf } for  pid=1721 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.058000 audit: BPF prog-id=72 op=LOAD
Oct  2 19:07:08.058000 audit[1721]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00039e830 items=0 ppid=1693 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:08.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363363035646332656535633537303566616164376138343132386536
Oct  2 19:07:08.058000 audit[1721]: AVC avc:  denied  { bpf } for  pid=1721 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.058000 audit[1721]: AVC avc:  denied  { bpf } for  pid=1721 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.058000 audit[1721]: AVC avc:  denied  { perfmon } for  pid=1721 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.058000 audit[1721]: AVC avc:  denied  { perfmon } for  pid=1721 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.058000 audit[1721]: AVC avc:  denied  { perfmon } for  pid=1721 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.058000 audit[1721]: AVC avc:  denied  { perfmon } for  pid=1721 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.058000 audit[1721]: AVC avc:  denied  { perfmon } for  pid=1721 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.058000 audit[1721]: AVC avc:  denied  { bpf } for  pid=1721 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.058000 audit[1721]: AVC avc:  denied  { bpf } for  pid=1721 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.058000 audit: BPF prog-id=73 op=LOAD
Oct  2 19:07:08.058000 audit[1721]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00039e878 items=0 ppid=1693 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:08.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363363035646332656535633537303566616164376138343132386536
Oct  2 19:07:08.058000 audit: BPF prog-id=73 op=UNLOAD
Oct  2 19:07:08.058000 audit: BPF prog-id=72 op=UNLOAD
Oct  2 19:07:08.058000 audit[1721]: AVC avc:  denied  { bpf } for  pid=1721 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.058000 audit[1721]: AVC avc:  denied  { bpf } for  pid=1721 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.058000 audit[1721]: AVC avc:  denied  { bpf } for  pid=1721 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.058000 audit[1721]: AVC avc:  denied  { perfmon } for  pid=1721 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.058000 audit[1721]: AVC avc:  denied  { perfmon } for  pid=1721 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.058000 audit[1721]: AVC avc:  denied  { perfmon } for  pid=1721 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.058000 audit[1721]: AVC avc:  denied  { perfmon } for  pid=1721 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.058000 audit[1721]: AVC avc:  denied  { perfmon } for  pid=1721 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.058000 audit[1721]: AVC avc:  denied  { bpf } for  pid=1721 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.058000 audit[1721]: AVC avc:  denied  { bpf } for  pid=1721 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.058000 audit: BPF prog-id=74 op=LOAD
Oct  2 19:07:08.058000 audit[1721]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00039ec88 items=0 ppid=1693 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:08.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363363035646332656535633537303566616164376138343132386536
Oct  2 19:07:08.083000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.083000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.083000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.083000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.083000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.083000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.083000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.083000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.083000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.084000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.084000 audit: BPF prog-id=75 op=LOAD
Oct  2 19:07:08.085000 audit[1734]: AVC avc:  denied  { bpf } for  pid=1734 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.085000 audit[1734]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1716 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:08.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330623936306632613135393436643335653061633437653734303534
Oct  2 19:07:08.085000 audit[1734]: AVC avc:  denied  { perfmon } for  pid=1734 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.085000 audit[1734]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1716 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:08.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330623936306632613135393436643335653061633437653734303534
Oct  2 19:07:08.085000 audit[1734]: AVC avc:  denied  { bpf } for  pid=1734 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.085000 audit[1734]: AVC avc:  denied  { bpf } for  pid=1734 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.085000 audit[1734]: AVC avc:  denied  { bpf } for  pid=1734 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.085000 audit[1734]: AVC avc:  denied  { perfmon } for  pid=1734 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.085000 audit[1734]: AVC avc:  denied  { perfmon } for  pid=1734 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.085000 audit[1734]: AVC avc:  denied  { perfmon } for  pid=1734 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.085000 audit[1734]: AVC avc:  denied  { perfmon } for  pid=1734 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.085000 audit[1734]: AVC avc:  denied  { perfmon } for  pid=1734 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.085000 audit[1734]: AVC avc:  denied  { bpf } for  pid=1734 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.085000 audit[1734]: AVC avc:  denied  { bpf } for  pid=1734 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.085000 audit: BPF prog-id=76 op=LOAD
Oct  2 19:07:08.085000 audit[1734]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c62e0 items=0 ppid=1716 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:08.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330623936306632613135393436643335653061633437653734303534
Oct  2 19:07:08.085000 audit[1734]: AVC avc:  denied  { bpf } for  pid=1734 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.085000 audit[1734]: AVC avc:  denied  { bpf } for  pid=1734 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.085000 audit[1734]: AVC avc:  denied  { perfmon } for  pid=1734 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.085000 audit[1734]: AVC avc:  denied  { perfmon } for  pid=1734 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.085000 audit[1734]: AVC avc:  denied  { perfmon } for  pid=1734 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.085000 audit[1734]: AVC avc:  denied  { perfmon } for  pid=1734 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.085000 audit[1734]: AVC avc:  denied  { perfmon } for  pid=1734 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.085000 audit[1734]: AVC avc:  denied  { bpf } for  pid=1734 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.085000 audit[1734]: AVC avc:  denied  { bpf } for  pid=1734 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.085000 audit: BPF prog-id=77 op=LOAD
Oct  2 19:07:08.085000 audit[1734]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c6328 items=0 ppid=1716 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:08.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330623936306632613135393436643335653061633437653734303534
Oct  2 19:07:08.085000 audit: BPF prog-id=77 op=UNLOAD
Oct  2 19:07:08.085000 audit: BPF prog-id=76 op=UNLOAD
Oct  2 19:07:08.085000 audit[1734]: AVC avc:  denied  { bpf } for  pid=1734 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.085000 audit[1734]: AVC avc:  denied  { bpf } for  pid=1734 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.085000 audit[1734]: AVC avc:  denied  { bpf } for  pid=1734 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.085000 audit[1734]: AVC avc:  denied  { perfmon } for  pid=1734 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.085000 audit[1734]: AVC avc:  denied  { perfmon } for  pid=1734 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.085000 audit[1734]: AVC avc:  denied  { perfmon } for  pid=1734 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.085000 audit[1734]: AVC avc:  denied  { perfmon } for  pid=1734 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.085000 audit[1734]: AVC avc:  denied  { perfmon } for  pid=1734 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.085000 audit[1734]: AVC avc:  denied  { bpf } for  pid=1734 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.085000 audit[1734]: AVC avc:  denied  { bpf } for  pid=1734 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.085000 audit: BPF prog-id=78 op=LOAD
Oct  2 19:07:08.085000 audit[1734]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c6738 items=0 ppid=1716 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:08.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330623936306632613135393436643335653061633437653734303534
Oct  2 19:07:08.100265 env[1104]: time="2023-10-02T19:07:08.100191439Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:f9e636e26f0a1c809e1732b85072f0ed,Namespace:kube-system,Attempt:0,} returns sandbox id \"e7dad7bed63e0116806b1c8ab24d9cfe934ca223f5f78314e1646519db9dbd89\""
Oct  2 19:07:08.101974 env[1104]: time="2023-10-02T19:07:08.101921655Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:24fef87020af50fba838138f9686fc61,Namespace:kube-system,Attempt:0,} returns sandbox id \"3c605dc2ee5c5705faad7a84128e60db30b281659a8ab8a7c4faa53adce040f2\""
Oct  2 19:07:08.102745 kubelet[1645]: E1002 19:07:08.102713    1645 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:08.103103 kubelet[1645]: E1002 19:07:08.102934    1645 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:08.105918 env[1104]: time="2023-10-02T19:07:08.105881743Z" level=info msg="CreateContainer within sandbox \"e7dad7bed63e0116806b1c8ab24d9cfe934ca223f5f78314e1646519db9dbd89\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}"
Oct  2 19:07:08.107439 env[1104]: time="2023-10-02T19:07:08.107408416Z" level=info msg="CreateContainer within sandbox \"3c605dc2ee5c5705faad7a84128e60db30b281659a8ab8a7c4faa53adce040f2\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}"
Oct  2 19:07:08.112803 env[1104]: time="2023-10-02T19:07:08.112766286Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:80b8b8966aa7d1c422f3be2bfac9c13f,Namespace:kube-system,Attempt:0,} returns sandbox id \"30b960f2a15946d35e0ac47e740544faf66e126cf63352d5402be5a3fe7b6f85\""
Oct  2 19:07:08.113702 kubelet[1645]: E1002 19:07:08.113678    1645 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:08.115946 env[1104]: time="2023-10-02T19:07:08.115889414Z" level=info msg="CreateContainer within sandbox \"30b960f2a15946d35e0ac47e740544faf66e126cf63352d5402be5a3fe7b6f85\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}"
Oct  2 19:07:08.132271 env[1104]: time="2023-10-02T19:07:08.132157168Z" level=info msg="CreateContainer within sandbox \"e7dad7bed63e0116806b1c8ab24d9cfe934ca223f5f78314e1646519db9dbd89\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"204e0dd5955ead308cef3548bcdd96734f8a1fc2258173f615d8cdb71f32cbfb\""
Oct  2 19:07:08.133087 env[1104]: time="2023-10-02T19:07:08.133018714Z" level=info msg="StartContainer for \"204e0dd5955ead308cef3548bcdd96734f8a1fc2258173f615d8cdb71f32cbfb\""
Oct  2 19:07:08.137270 env[1104]: time="2023-10-02T19:07:08.137217780Z" level=info msg="CreateContainer within sandbox \"3c605dc2ee5c5705faad7a84128e60db30b281659a8ab8a7c4faa53adce040f2\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"27680575e31056d9ea8e5f5902432f84e31babb83028a8a224a030a40477c465\""
Oct  2 19:07:08.137726 env[1104]: time="2023-10-02T19:07:08.137700225Z" level=info msg="StartContainer for \"27680575e31056d9ea8e5f5902432f84e31babb83028a8a224a030a40477c465\""
Oct  2 19:07:08.138842 env[1104]: time="2023-10-02T19:07:08.138782044Z" level=info msg="CreateContainer within sandbox \"30b960f2a15946d35e0ac47e740544faf66e126cf63352d5402be5a3fe7b6f85\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"550adb3c7eb101d71b5c1daf1e035d97d8f58ad0e426d946fcb6eee859d7b108\""
Oct  2 19:07:08.139424 env[1104]: time="2023-10-02T19:07:08.139376199Z" level=info msg="StartContainer for \"550adb3c7eb101d71b5c1daf1e035d97d8f58ad0e426d946fcb6eee859d7b108\""
Oct  2 19:07:08.161853 systemd[1]: Started cri-containerd-27680575e31056d9ea8e5f5902432f84e31babb83028a8a224a030a40477c465.scope.
Oct  2 19:07:08.162736 systemd[1]: Started cri-containerd-550adb3c7eb101d71b5c1daf1e035d97d8f58ad0e426d946fcb6eee859d7b108.scope.
Oct  2 19:07:08.167886 systemd[1]: Started cri-containerd-204e0dd5955ead308cef3548bcdd96734f8a1fc2258173f615d8cdb71f32cbfb.scope.
Oct  2 19:07:08.177000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.177000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.177000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.177000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.177000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.177000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.177000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.177000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.177000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.177000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.177000 audit: BPF prog-id=79 op=LOAD
Oct  2 19:07:08.178000 audit[1825]: AVC avc:  denied  { bpf } for  pid=1825 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.178000 audit[1825]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1693 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:08.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237363830353735653331303536643965613865356635393032343332
Oct  2 19:07:08.178000 audit[1825]: AVC avc:  denied  { perfmon } for  pid=1825 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.178000 audit[1825]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1693 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:08.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237363830353735653331303536643965613865356635393032343332
Oct  2 19:07:08.178000 audit[1825]: AVC avc:  denied  { bpf } for  pid=1825 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.178000 audit[1825]: AVC avc:  denied  { bpf } for  pid=1825 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.178000 audit[1825]: AVC avc:  denied  { bpf } for  pid=1825 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.178000 audit[1825]: AVC avc:  denied  { perfmon } for  pid=1825 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.178000 audit[1825]: AVC avc:  denied  { perfmon } for  pid=1825 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.178000 audit[1825]: AVC avc:  denied  { perfmon } for  pid=1825 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.178000 audit[1825]: AVC avc:  denied  { perfmon } for  pid=1825 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.178000 audit[1825]: AVC avc:  denied  { perfmon } for  pid=1825 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.178000 audit[1825]: AVC avc:  denied  { bpf } for  pid=1825 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.178000 audit[1825]: AVC avc:  denied  { bpf } for  pid=1825 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.178000 audit: BPF prog-id=80 op=LOAD
Oct  2 19:07:08.178000 audit[1825]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000250e40 items=0 ppid=1693 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:08.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237363830353735653331303536643965613865356635393032343332
Oct  2 19:07:08.178000 audit[1825]: AVC avc:  denied  { bpf } for  pid=1825 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.178000 audit[1825]: AVC avc:  denied  { bpf } for  pid=1825 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.178000 audit[1825]: AVC avc:  denied  { perfmon } for  pid=1825 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.178000 audit[1825]: AVC avc:  denied  { perfmon } for  pid=1825 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.178000 audit[1825]: AVC avc:  denied  { perfmon } for  pid=1825 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.178000 audit[1825]: AVC avc:  denied  { perfmon } for  pid=1825 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.178000 audit[1825]: AVC avc:  denied  { perfmon } for  pid=1825 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.178000 audit[1825]: AVC avc:  denied  { bpf } for  pid=1825 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.178000 audit[1825]: AVC avc:  denied  { bpf } for  pid=1825 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.178000 audit: BPF prog-id=81 op=LOAD
Oct  2 19:07:08.178000 audit[1825]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000250e88 items=0 ppid=1693 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:08.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237363830353735653331303536643965613865356635393032343332
Oct  2 19:07:08.178000 audit: BPF prog-id=81 op=UNLOAD
Oct  2 19:07:08.178000 audit: BPF prog-id=80 op=UNLOAD
Oct  2 19:07:08.178000 audit[1825]: AVC avc:  denied  { bpf } for  pid=1825 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.178000 audit[1825]: AVC avc:  denied  { bpf } for  pid=1825 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.178000 audit[1825]: AVC avc:  denied  { bpf } for  pid=1825 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.178000 audit[1825]: AVC avc:  denied  { perfmon } for  pid=1825 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.178000 audit[1825]: AVC avc:  denied  { perfmon } for  pid=1825 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.178000 audit[1825]: AVC avc:  denied  { perfmon } for  pid=1825 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.178000 audit[1825]: AVC avc:  denied  { perfmon } for  pid=1825 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.178000 audit[1825]: AVC avc:  denied  { perfmon } for  pid=1825 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.178000 audit[1825]: AVC avc:  denied  { bpf } for  pid=1825 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.178000 audit[1825]: AVC avc:  denied  { bpf } for  pid=1825 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.178000 audit: BPF prog-id=82 op=LOAD
Oct  2 19:07:08.178000 audit[1825]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000251298 items=0 ppid=1693 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:08.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237363830353735653331303536643965613865356635393032343332
Oct  2 19:07:08.182000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.182000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.182000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.182000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.182000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.182000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.182000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.182000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.182000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.182000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.182000 audit: BPF prog-id=83 op=LOAD
Oct  2 19:07:08.183000 audit[1829]: AVC avc:  denied  { bpf } for  pid=1829 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.183000 audit[1829]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1716 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:08.183000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535306164623363376562313031643731623563316461663165303335
Oct  2 19:07:08.183000 audit[1829]: AVC avc:  denied  { perfmon } for  pid=1829 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.183000 audit[1829]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1716 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:08.183000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535306164623363376562313031643731623563316461663165303335
Oct  2 19:07:08.183000 audit[1829]: AVC avc:  denied  { bpf } for  pid=1829 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.183000 audit[1829]: AVC avc:  denied  { bpf } for  pid=1829 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.183000 audit[1829]: AVC avc:  denied  { bpf } for  pid=1829 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.183000 audit[1829]: AVC avc:  denied  { perfmon } for  pid=1829 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.183000 audit[1829]: AVC avc:  denied  { perfmon } for  pid=1829 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.183000 audit[1829]: AVC avc:  denied  { perfmon } for  pid=1829 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.183000 audit[1829]: AVC avc:  denied  { perfmon } for  pid=1829 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.183000 audit[1829]: AVC avc:  denied  { perfmon } for  pid=1829 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.183000 audit[1829]: AVC avc:  denied  { bpf } for  pid=1829 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.183000 audit[1829]: AVC avc:  denied  { bpf } for  pid=1829 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.183000 audit: BPF prog-id=84 op=LOAD
Oct  2 19:07:08.183000 audit[1829]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001179d8 a2=78 a3=c0003824a0 items=0 ppid=1716 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:08.183000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535306164623363376562313031643731623563316461663165303335
Oct  2 19:07:08.183000 audit[1829]: AVC avc:  denied  { bpf } for  pid=1829 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.183000 audit[1829]: AVC avc:  denied  { bpf } for  pid=1829 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.183000 audit[1829]: AVC avc:  denied  { perfmon } for  pid=1829 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.183000 audit[1829]: AVC avc:  denied  { perfmon } for  pid=1829 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.183000 audit[1829]: AVC avc:  denied  { perfmon } for  pid=1829 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.183000 audit[1829]: AVC avc:  denied  { perfmon } for  pid=1829 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.183000 audit[1829]: AVC avc:  denied  { perfmon } for  pid=1829 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.183000 audit[1829]: AVC avc:  denied  { bpf } for  pid=1829 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.183000 audit[1829]: AVC avc:  denied  { bpf } for  pid=1829 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.183000 audit: BPF prog-id=85 op=LOAD
Oct  2 19:07:08.183000 audit[1829]: SYSCALL arch=c000003e syscall=321 success=yes exit=19 a0=5 a1=c000117770 a2=78 a3=c0003824e8 items=0 ppid=1716 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:08.183000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535306164623363376562313031643731623563316461663165303335
Oct  2 19:07:08.183000 audit: BPF prog-id=85 op=UNLOAD
Oct  2 19:07:08.183000 audit: BPF prog-id=84 op=UNLOAD
Oct  2 19:07:08.183000 audit[1829]: AVC avc:  denied  { bpf } for  pid=1829 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.183000 audit[1829]: AVC avc:  denied  { bpf } for  pid=1829 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.183000 audit[1829]: AVC avc:  denied  { bpf } for  pid=1829 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.183000 audit[1829]: AVC avc:  denied  { perfmon } for  pid=1829 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.183000 audit[1829]: AVC avc:  denied  { perfmon } for  pid=1829 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.183000 audit[1829]: AVC avc:  denied  { perfmon } for  pid=1829 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.183000 audit[1829]: AVC avc:  denied  { perfmon } for  pid=1829 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.183000 audit[1829]: AVC avc:  denied  { perfmon } for  pid=1829 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.183000 audit[1829]: AVC avc:  denied  { bpf } for  pid=1829 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.183000 audit[1829]: AVC avc:  denied  { bpf } for  pid=1829 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.183000 audit: BPF prog-id=86 op=LOAD
Oct  2 19:07:08.183000 audit[1829]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117c30 a2=78 a3=c0003828f8 items=0 ppid=1716 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:08.183000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535306164623363376562313031643731623563316461663165303335
Oct  2 19:07:08.184000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.184000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.184000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.184000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.184000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.184000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.184000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.184000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.184000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.184000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.184000 audit: BPF prog-id=87 op=LOAD
Oct  2 19:07:08.185000 audit[1814]: AVC avc:  denied  { bpf } for  pid=1814 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.185000 audit[1814]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1694 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:08.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230346530646435393535656164333038636566333534386263646439
Oct  2 19:07:08.185000 audit[1814]: AVC avc:  denied  { perfmon } for  pid=1814 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.185000 audit[1814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1694 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:08.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230346530646435393535656164333038636566333534386263646439
Oct  2 19:07:08.185000 audit[1814]: AVC avc:  denied  { bpf } for  pid=1814 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.185000 audit[1814]: AVC avc:  denied  { bpf } for  pid=1814 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.185000 audit[1814]: AVC avc:  denied  { bpf } for  pid=1814 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.185000 audit[1814]: AVC avc:  denied  { perfmon } for  pid=1814 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.185000 audit[1814]: AVC avc:  denied  { perfmon } for  pid=1814 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.185000 audit[1814]: AVC avc:  denied  { perfmon } for  pid=1814 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.185000 audit[1814]: AVC avc:  denied  { perfmon } for  pid=1814 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.185000 audit[1814]: AVC avc:  denied  { perfmon } for  pid=1814 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.185000 audit[1814]: AVC avc:  denied  { bpf } for  pid=1814 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.185000 audit[1814]: AVC avc:  denied  { bpf } for  pid=1814 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.185000 audit: BPF prog-id=88 op=LOAD
Oct  2 19:07:08.185000 audit[1814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000343f20 items=0 ppid=1694 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:08.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230346530646435393535656164333038636566333534386263646439
Oct  2 19:07:08.186000 audit[1814]: AVC avc:  denied  { bpf } for  pid=1814 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.186000 audit[1814]: AVC avc:  denied  { bpf } for  pid=1814 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.186000 audit[1814]: AVC avc:  denied  { perfmon } for  pid=1814 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.186000 audit[1814]: AVC avc:  denied  { perfmon } for  pid=1814 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.186000 audit[1814]: AVC avc:  denied  { perfmon } for  pid=1814 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.186000 audit[1814]: AVC avc:  denied  { perfmon } for  pid=1814 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.186000 audit[1814]: AVC avc:  denied  { perfmon } for  pid=1814 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.186000 audit[1814]: AVC avc:  denied  { bpf } for  pid=1814 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.186000 audit[1814]: AVC avc:  denied  { bpf } for  pid=1814 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.186000 audit: BPF prog-id=89 op=LOAD
Oct  2 19:07:08.186000 audit[1814]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000343f68 items=0 ppid=1694 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:08.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230346530646435393535656164333038636566333534386263646439
Oct  2 19:07:08.187000 audit: BPF prog-id=89 op=UNLOAD
Oct  2 19:07:08.187000 audit: BPF prog-id=88 op=UNLOAD
Oct  2 19:07:08.187000 audit[1814]: AVC avc:  denied  { bpf } for  pid=1814 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.187000 audit[1814]: AVC avc:  denied  { bpf } for  pid=1814 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.187000 audit[1814]: AVC avc:  denied  { bpf } for  pid=1814 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.187000 audit[1814]: AVC avc:  denied  { perfmon } for  pid=1814 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.187000 audit[1814]: AVC avc:  denied  { perfmon } for  pid=1814 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.187000 audit[1814]: AVC avc:  denied  { perfmon } for  pid=1814 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.187000 audit[1814]: AVC avc:  denied  { perfmon } for  pid=1814 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.187000 audit[1814]: AVC avc:  denied  { perfmon } for  pid=1814 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.187000 audit[1814]: AVC avc:  denied  { bpf } for  pid=1814 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.187000 audit[1814]: AVC avc:  denied  { bpf } for  pid=1814 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:08.187000 audit: BPF prog-id=90 op=LOAD
Oct  2 19:07:08.187000 audit[1814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d4378 items=0 ppid=1694 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:08.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230346530646435393535656164333038636566333534386263646439
Oct  2 19:07:08.200737 kubelet[1645]: E1002 19:07:08.200700    1645 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.30:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.30:6443: connect: connection refused" interval="1.6s"
Oct  2 19:07:08.220005 env[1104]: time="2023-10-02T19:07:08.219925666Z" level=info msg="StartContainer for \"550adb3c7eb101d71b5c1daf1e035d97d8f58ad0e426d946fcb6eee859d7b108\" returns successfully"
Oct  2 19:07:08.225523 env[1104]: time="2023-10-02T19:07:08.225458174Z" level=info msg="StartContainer for \"204e0dd5955ead308cef3548bcdd96734f8a1fc2258173f615d8cdb71f32cbfb\" returns successfully"
Oct  2 19:07:08.232236 env[1104]: time="2023-10-02T19:07:08.231325109Z" level=info msg="StartContainer for \"27680575e31056d9ea8e5f5902432f84e31babb83028a8a224a030a40477c465\" returns successfully"
Oct  2 19:07:08.304689 kubelet[1645]: I1002 19:07:08.304626    1645 kubelet_node_status.go:70] "Attempting to register node" node="localhost"
Oct  2 19:07:08.831270 kubelet[1645]: E1002 19:07:08.831211    1645 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:08.832853 kubelet[1645]: E1002 19:07:08.832831    1645 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:08.834323 kubelet[1645]: E1002 19:07:08.834303    1645 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:09.081126 kernel: kauditd_printk_skb: 559 callbacks suppressed
Oct  2 19:07:09.081291 kernel: audit: type=1400 audit(1696273629.073:691): avc:  denied  { watch } for  pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=6798 scontext=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:07:09.081319 kernel: audit: type=1300 audit(1696273629.073:691): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0009ee000 a2=fc6 a3=0 items=0 ppid=1716 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 key=(null)
Oct  2 19:07:09.073000 audit[1862]: AVC avc:  denied  { watch } for  pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=6798 scontext=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:07:09.073000 audit[1862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0009ee000 a2=fc6 a3=0 items=0 ppid=1716 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 key=(null)
Oct  2 19:07:09.073000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:07:09.086796 kernel: audit: type=1327 audit(1696273629.073:691): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:07:09.086839 kernel: audit: type=1400 audit(1696273629.073:692): avc:  denied  { watch } for  pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6787 scontext=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:07:09.073000 audit[1862]: AVC avc:  denied  { watch } for  pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6787 scontext=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:07:09.073000 audit[1862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0009de040 a2=fc6 a3=0 items=0 ppid=1716 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 key=(null)
Oct  2 19:07:09.090055 kernel: audit: type=1300 audit(1696273629.073:692): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0009de040 a2=fc6 a3=0 items=0 ppid=1716 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 key=(null)
Oct  2 19:07:09.090134 kernel: audit: type=1327 audit(1696273629.073:692): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:07:09.073000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:07:09.838325 kubelet[1645]: E1002 19:07:09.838216    1645 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:09.850000 audit[1864]: AVC avc:  denied  { watch } for  pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=6798 scontext=system_u:system_r:svirt_lxc_net_t:s0:c449,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:07:09.850000 audit[1864]: AVC avc:  denied  { watch } for  pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=6793 scontext=system_u:system_r:svirt_lxc_net_t:s0:c449,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:07:09.858241 kernel: audit: type=1400 audit(1696273629.850:693): avc:  denied  { watch } for  pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=6798 scontext=system_u:system_r:svirt_lxc_net_t:s0:c449,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:07:09.858291 kernel: audit: type=1400 audit(1696273629.850:694): avc:  denied  { watch } for  pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=6793 scontext=system_u:system_r:svirt_lxc_net_t:s0:c449,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:07:09.858308 kernel: audit: type=1300 audit(1696273629.850:694): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c003f7c030 a2=fc6 a3=0 items=0 ppid=1694 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c449,c780 key=(null)
Oct  2 19:07:09.850000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c003f7c030 a2=fc6 a3=0 items=0 ppid=1694 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c449,c780 key=(null)
Oct  2 19:07:09.850000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E
Oct  2 19:07:09.862569 kernel: audit: type=1327 audit(1696273629.850:694): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E
Oct  2 19:07:09.855000 audit[1864]: AVC avc:  denied  { watch } for  pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=6800 scontext=system_u:system_r:svirt_lxc_net_t:s0:c449,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:07:09.855000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c00435c300 a2=fc6 a3=0 items=0 ppid=1694 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c449,c780 key=(null)
Oct  2 19:07:09.855000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E
Oct  2 19:07:09.857000 audit[1864]: AVC avc:  denied  { watch } for  pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6787 scontext=system_u:system_r:svirt_lxc_net_t:s0:c449,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:07:09.857000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=53 a1=c00481daa0 a2=fc6 a3=0 items=0 ppid=1694 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c449,c780 key=(null)
Oct  2 19:07:09.857000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E
Oct  2 19:07:09.857000 audit[1864]: AVC avc:  denied  { watch } for  pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6787 scontext=system_u:system_r:svirt_lxc_net_t:s0:c449,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:07:09.857000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c007642820 a2=fc6 a3=0 items=0 ppid=1694 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c449,c780 key=(null)
Oct  2 19:07:09.857000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E
Oct  2 19:07:09.857000 audit[1864]: AVC avc:  denied  { watch } for  pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=6798 scontext=system_u:system_r:svirt_lxc_net_t:s0:c449,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:07:09.857000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0043cc180 a2=fc6 a3=0 items=0 ppid=1694 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c449,c780 key=(null)
Oct  2 19:07:09.857000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E
Oct  2 19:07:09.850000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00426c000 a2=fc6 a3=0 items=0 ppid=1694 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c449,c780 key=(null)
Oct  2 19:07:09.850000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E
Oct  2 19:07:09.911290 kubelet[1645]: E1002 19:07:09.911231    1645 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost"
Oct  2 19:07:09.992098 kubelet[1645]: I1002 19:07:09.992057    1645 kubelet_node_status.go:73] "Successfully registered node" node="localhost"
Oct  2 19:07:10.793738 kubelet[1645]: I1002 19:07:10.793684    1645 apiserver.go:52] "Watching apiserver"
Oct  2 19:07:10.797527 kubelet[1645]: I1002 19:07:10.797506    1645 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world"
Oct  2 19:07:10.825240 kubelet[1645]: I1002 19:07:10.825181    1645 reconciler.go:41] "Reconciler: start to sync state"
Oct  2 19:07:10.840812 kubelet[1645]: E1002 19:07:10.840775    1645 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost"
Oct  2 19:07:10.841342 kubelet[1645]: E1002 19:07:10.841309    1645 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:12.747994 systemd[1]: Reloading.
Oct  2 19:07:12.824009 /usr/lib/systemd/system-generators/torcx-generator[1938]: time="2023-10-02T19:07:12Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]"
Oct  2 19:07:12.824039 /usr/lib/systemd/system-generators/torcx-generator[1938]: time="2023-10-02T19:07:12Z" level=info msg="torcx already run"
Oct  2 19:07:12.884255 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Oct  2 19:07:12.884274 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Oct  2 19:07:12.904105 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Oct  2 19:07:12.919158 kubelet[1645]: E1002 19:07:12.919101    1645 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:12.970000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.970000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.970000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.970000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.970000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.970000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.970000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.970000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.970000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.970000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.970000 audit: BPF prog-id=91 op=LOAD
Oct  2 19:07:12.970000 audit: BPF prog-id=52 op=UNLOAD
Oct  2 19:07:12.970000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.970000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.970000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.970000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.970000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.970000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.970000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.970000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.970000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.970000 audit: BPF prog-id=92 op=LOAD
Oct  2 19:07:12.970000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.970000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.970000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.970000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.970000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.970000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.970000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.970000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.970000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.971000 audit: BPF prog-id=93 op=LOAD
Oct  2 19:07:12.971000 audit: BPF prog-id=53 op=UNLOAD
Oct  2 19:07:12.971000 audit: BPF prog-id=54 op=UNLOAD
Oct  2 19:07:12.972000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.972000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.972000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.972000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.972000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.972000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.972000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.972000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.972000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.973000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.973000 audit: BPF prog-id=94 op=LOAD
Oct  2 19:07:12.973000 audit: BPF prog-id=55 op=UNLOAD
Oct  2 19:07:12.973000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.973000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.973000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.973000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.973000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.973000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.973000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.973000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.973000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.973000 audit: BPF prog-id=95 op=LOAD
Oct  2 19:07:12.973000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.973000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.973000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.973000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.973000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.973000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.973000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.973000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.973000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.973000 audit: BPF prog-id=96 op=LOAD
Oct  2 19:07:12.973000 audit: BPF prog-id=56 op=UNLOAD
Oct  2 19:07:12.973000 audit: BPF prog-id=57 op=UNLOAD
Oct  2 19:07:12.976000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.976000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.976000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.976000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.976000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.976000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.976000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.976000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.976000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.976000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.976000 audit: BPF prog-id=97 op=LOAD
Oct  2 19:07:12.976000 audit: BPF prog-id=79 op=UNLOAD
Oct  2 19:07:12.977000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.977000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.977000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.977000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.977000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.977000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.977000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.977000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.977000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.977000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.977000 audit: BPF prog-id=98 op=LOAD
Oct  2 19:07:12.977000 audit: BPF prog-id=58 op=UNLOAD
Oct  2 19:07:12.978000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.978000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.978000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.978000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.978000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.978000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.978000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.978000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.978000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.979000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.979000 audit: BPF prog-id=99 op=LOAD
Oct  2 19:07:12.979000 audit: BPF prog-id=59 op=UNLOAD
Oct  2 19:07:12.979000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.979000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.979000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.979000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.979000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.980000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.980000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.980000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.980000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.980000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.980000 audit: BPF prog-id=100 op=LOAD
Oct  2 19:07:12.980000 audit: BPF prog-id=71 op=UNLOAD
Oct  2 19:07:12.980000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.980000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.980000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.980000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.980000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.980000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.980000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.980000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.980000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.981000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.981000 audit: BPF prog-id=101 op=LOAD
Oct  2 19:07:12.981000 audit: BPF prog-id=83 op=UNLOAD
Oct  2 19:07:12.981000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.981000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.981000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.981000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.981000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.981000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.981000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.981000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.981000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.981000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.981000 audit: BPF prog-id=102 op=LOAD
Oct  2 19:07:12.981000 audit: BPF prog-id=67 op=UNLOAD
Oct  2 19:07:12.982000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.982000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.982000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.982000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.982000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.982000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.982000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.982000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.982000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.982000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.982000 audit: BPF prog-id=103 op=LOAD
Oct  2 19:07:12.982000 audit: BPF prog-id=60 op=UNLOAD
Oct  2 19:07:12.983000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.983000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.983000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.983000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.983000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.983000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.983000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.983000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.983000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.983000 audit: BPF prog-id=104 op=LOAD
Oct  2 19:07:12.983000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.983000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.983000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.983000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.983000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.983000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.983000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.983000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.983000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.983000 audit: BPF prog-id=105 op=LOAD
Oct  2 19:07:12.983000 audit: BPF prog-id=61 op=UNLOAD
Oct  2 19:07:12.983000 audit: BPF prog-id=62 op=UNLOAD
Oct  2 19:07:12.983000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.983000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.983000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.983000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.983000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.983000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.983000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.983000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.983000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.983000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.983000 audit: BPF prog-id=106 op=LOAD
Oct  2 19:07:12.983000 audit: BPF prog-id=75 op=UNLOAD
Oct  2 19:07:12.984000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.984000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.984000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.984000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.984000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.984000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.984000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.984000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.984000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.984000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.984000 audit: BPF prog-id=107 op=LOAD
Oct  2 19:07:12.984000 audit: BPF prog-id=63 op=UNLOAD
Oct  2 19:07:12.985000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.985000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.985000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.985000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.985000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.985000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.985000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.985000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.985000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.985000 audit: BPF prog-id=108 op=LOAD
Oct  2 19:07:12.985000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.985000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.985000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.985000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.985000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.985000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.985000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.985000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.985000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.985000 audit: BPF prog-id=109 op=LOAD
Oct  2 19:07:12.985000 audit: BPF prog-id=64 op=UNLOAD
Oct  2 19:07:12.985000 audit: BPF prog-id=65 op=UNLOAD
Oct  2 19:07:12.985000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.985000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.985000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.985000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.985000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.985000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.985000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.985000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.985000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.985000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.985000 audit: BPF prog-id=110 op=LOAD
Oct  2 19:07:12.985000 audit: BPF prog-id=66 op=UNLOAD
Oct  2 19:07:12.986000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.986000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.986000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.986000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.986000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.986000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.986000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.986000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.986000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.986000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:12.986000 audit: BPF prog-id=111 op=LOAD
Oct  2 19:07:12.986000 audit: BPF prog-id=87 op=UNLOAD
Oct  2 19:07:12.997477 systemd[1]: Stopping kubelet.service...
Oct  2 19:07:12.999881 kubelet[1645]: I1002 19:07:12.997468    1645 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt"
Oct  2 19:07:13.021533 systemd[1]: kubelet.service: Deactivated successfully.
Oct  2 19:07:13.021748 systemd[1]: Stopped kubelet.service.
Oct  2 19:07:13.020000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:07:13.021807 systemd[1]: kubelet.service: Consumed 1.237s CPU time.
Oct  2 19:07:13.023545 systemd[1]: Started kubelet.service.
Oct  2 19:07:13.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:07:13.073792 kubelet[1978]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Oct  2 19:07:13.073792 kubelet[1978]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI.
Oct  2 19:07:13.073792 kubelet[1978]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Oct  2 19:07:13.074261 kubelet[1978]: I1002 19:07:13.073814    1978 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime"
Oct  2 19:07:13.077709 kubelet[1978]: I1002 19:07:13.077687    1978 server.go:415] "Kubelet version" kubeletVersion="v1.27.2"
Oct  2 19:07:13.077709 kubelet[1978]: I1002 19:07:13.077708    1978 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK=""
Oct  2 19:07:13.077866 kubelet[1978]: I1002 19:07:13.077852    1978 server.go:837] "Client rotation is on, will bootstrap in background"
Oct  2 19:07:13.079390 kubelet[1978]: I1002 19:07:13.079357    1978 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem".
Oct  2 19:07:13.080624 kubelet[1978]: I1002 19:07:13.080601    1978 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt"
Oct  2 19:07:13.084274 kubelet[1978]: I1002 19:07:13.084248    1978 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified.  defaulting to /"
Oct  2 19:07:13.084477 kubelet[1978]: I1002 19:07:13.084449    1978 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[]
Oct  2 19:07:13.084556 kubelet[1978]: I1002 19:07:13.084537    1978 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.1} GracePeriod:0s MinReclaim:<nil>} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity:<nil> Percentage:0.05} GracePeriod:0s MinReclaim:<nil>} {Signal:imagefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.15} GracePeriod:0s MinReclaim:<nil>} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:<nil>}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}
Oct  2 19:07:13.084650 kubelet[1978]: I1002 19:07:13.084558    1978 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container"
Oct  2 19:07:13.084650 kubelet[1978]: I1002 19:07:13.084571    1978 container_manager_linux.go:302] "Creating device plugin manager"
Oct  2 19:07:13.084650 kubelet[1978]: I1002 19:07:13.084602    1978 state_mem.go:36] "Initialized new in-memory state store"
Oct  2 19:07:13.087498 kubelet[1978]: I1002 19:07:13.087466    1978 kubelet.go:405] "Attempting to sync node with API server"
Oct  2 19:07:13.087498 kubelet[1978]: I1002 19:07:13.087490    1978 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests"
Oct  2 19:07:13.087592 kubelet[1978]: I1002 19:07:13.087507    1978 kubelet.go:309] "Adding apiserver pod source"
Oct  2 19:07:13.087592 kubelet[1978]: I1002 19:07:13.087521    1978 apiserver.go:42] "Waiting for node sync before watching apiserver pods"
Oct  2 19:07:13.091751 kubelet[1978]: I1002 19:07:13.091729    1978 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1"
Oct  2 19:07:13.092281 kubelet[1978]: I1002 19:07:13.092267    1978 server.go:1168] "Started kubelet"
Oct  2 19:07:13.092576 kubelet[1978]: I1002 19:07:13.092557    1978 server.go:162] "Starting to listen" address="0.0.0.0" port=10250
Oct  2 19:07:13.093095 kubelet[1978]: E1002 19:07:13.093080    1978 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs"
Oct  2 19:07:13.093176 kubelet[1978]: E1002 19:07:13.093161    1978 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem"
Oct  2 19:07:13.093271 kubelet[1978]: I1002 19:07:13.093243    1978 server.go:461] "Adding debug handlers to kubelet server"
Oct  2 19:07:13.094378 kubelet[1978]: I1002 19:07:13.092564    1978 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10
Oct  2 19:07:13.093000 audit[1978]: AVC avc:  denied  { mac_admin } for  pid=1978 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:13.093000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Oct  2 19:07:13.093000 audit[1978]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c81050 a1=c0008d98c0 a2=c000c81020 a3=25 items=0 ppid=1 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:13.093000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Oct  2 19:07:13.093000 audit[1978]: AVC avc:  denied  { mac_admin } for  pid=1978 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:13.093000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Oct  2 19:07:13.093000 audit[1978]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008f8b20 a1=c0008d98d8 a2=c000c810e0 a3=25 items=0 ppid=1 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:13.093000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Oct  2 19:07:13.097626 kubelet[1978]: I1002 19:07:13.094501    1978 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument"
Oct  2 19:07:13.097626 kubelet[1978]: I1002 19:07:13.094542    1978 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument"
Oct  2 19:07:13.097626 kubelet[1978]: I1002 19:07:13.094564    1978 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer"
Oct  2 19:07:13.102031 kubelet[1978]: E1002 19:07:13.102016    1978 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found"
Oct  2 19:07:13.102140 kubelet[1978]: I1002 19:07:13.102123    1978 volume_manager.go:284] "Starting Kubelet Volume Manager"
Oct  2 19:07:13.102340 kubelet[1978]: I1002 19:07:13.102325    1978 desired_state_of_world_populator.go:145] "Desired state populator starts to run"
Oct  2 19:07:13.127311 kubelet[1978]: I1002 19:07:13.127267    1978 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4
Oct  2 19:07:13.128309 kubelet[1978]: I1002 19:07:13.128283    1978 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6
Oct  2 19:07:13.128309 kubelet[1978]: I1002 19:07:13.128309    1978 status_manager.go:207] "Starting to sync pod status with apiserver"
Oct  2 19:07:13.128379 kubelet[1978]: I1002 19:07:13.128339    1978 kubelet.go:2257] "Starting kubelet main sync loop"
Oct  2 19:07:13.128404 kubelet[1978]: E1002 19:07:13.128384    1978 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]"
Oct  2 19:07:13.159860 kubelet[1978]: I1002 19:07:13.159824    1978 cpu_manager.go:214] "Starting CPU manager" policy="none"
Oct  2 19:07:13.159860 kubelet[1978]: I1002 19:07:13.159845    1978 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s"
Oct  2 19:07:13.159860 kubelet[1978]: I1002 19:07:13.159859    1978 state_mem.go:36] "Initialized new in-memory state store"
Oct  2 19:07:13.160184 kubelet[1978]: I1002 19:07:13.160027    1978 state_mem.go:88] "Updated default CPUSet" cpuSet=""
Oct  2 19:07:13.160184 kubelet[1978]: I1002 19:07:13.160041    1978 state_mem.go:96] "Updated CPUSet assignments" assignments=map[]
Oct  2 19:07:13.160184 kubelet[1978]: I1002 19:07:13.160047    1978 policy_none.go:49] "None policy: Start"
Oct  2 19:07:13.160585 kubelet[1978]: I1002 19:07:13.160560    1978 memory_manager.go:169] "Starting memorymanager" policy="None"
Oct  2 19:07:13.160585 kubelet[1978]: I1002 19:07:13.160580    1978 state_mem.go:35] "Initializing new in-memory state store"
Oct  2 19:07:13.160698 kubelet[1978]: I1002 19:07:13.160680    1978 state_mem.go:75] "Updated machine memory state"
Oct  2 19:07:13.164493 kubelet[1978]: I1002 19:07:13.164474    1978 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found"
Oct  2 19:07:13.163000 audit[1978]: AVC avc:  denied  { mac_admin } for  pid=1978 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:13.163000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Oct  2 19:07:13.163000 audit[1978]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0013848d0 a1=c001380c30 a2=c0013848a0 a3=25 items=0 ppid=1 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:13.163000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Oct  2 19:07:13.165268 kubelet[1978]: I1002 19:07:13.165252    1978 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument"
Oct  2 19:07:13.167985 kubelet[1978]: I1002 19:07:13.167972    1978 plugin_manager.go:118] "Starting Kubelet Plugin Manager"
Oct  2 19:07:13.211254 kubelet[1978]: I1002 19:07:13.206172    1978 kubelet_node_status.go:70] "Attempting to register node" node="localhost"
Oct  2 19:07:13.228825 kubelet[1978]: I1002 19:07:13.228801    1978 topology_manager.go:212] "Topology Admit Handler"
Oct  2 19:07:13.229103 kubelet[1978]: I1002 19:07:13.229069    1978 topology_manager.go:212] "Topology Admit Handler"
Oct  2 19:07:13.229392 kubelet[1978]: I1002 19:07:13.229376    1978 topology_manager.go:212] "Topology Admit Handler"
Oct  2 19:07:13.309851 kubelet[1978]: I1002 19:07:13.304037    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f9e636e26f0a1c809e1732b85072f0ed-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"f9e636e26f0a1c809e1732b85072f0ed\") " pod="kube-system/kube-apiserver-localhost"
Oct  2 19:07:13.309851 kubelet[1978]: I1002 19:07:13.304105    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/80b8b8966aa7d1c422f3be2bfac9c13f-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"80b8b8966aa7d1c422f3be2bfac9c13f\") " pod="kube-system/kube-controller-manager-localhost"
Oct  2 19:07:13.309851 kubelet[1978]: I1002 19:07:13.304169    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/80b8b8966aa7d1c422f3be2bfac9c13f-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"80b8b8966aa7d1c422f3be2bfac9c13f\") " pod="kube-system/kube-controller-manager-localhost"
Oct  2 19:07:13.309851 kubelet[1978]: I1002 19:07:13.304215    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/80b8b8966aa7d1c422f3be2bfac9c13f-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"80b8b8966aa7d1c422f3be2bfac9c13f\") " pod="kube-system/kube-controller-manager-localhost"
Oct  2 19:07:13.309851 kubelet[1978]: I1002 19:07:13.304274    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f9e636e26f0a1c809e1732b85072f0ed-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"f9e636e26f0a1c809e1732b85072f0ed\") " pod="kube-system/kube-apiserver-localhost"
Oct  2 19:07:13.310294 kubelet[1978]: I1002 19:07:13.304320    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f9e636e26f0a1c809e1732b85072f0ed-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"f9e636e26f0a1c809e1732b85072f0ed\") " pod="kube-system/kube-apiserver-localhost"
Oct  2 19:07:13.310294 kubelet[1978]: I1002 19:07:13.304379    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/80b8b8966aa7d1c422f3be2bfac9c13f-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"80b8b8966aa7d1c422f3be2bfac9c13f\") " pod="kube-system/kube-controller-manager-localhost"
Oct  2 19:07:13.310294 kubelet[1978]: I1002 19:07:13.304453    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/80b8b8966aa7d1c422f3be2bfac9c13f-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"80b8b8966aa7d1c422f3be2bfac9c13f\") " pod="kube-system/kube-controller-manager-localhost"
Oct  2 19:07:13.310294 kubelet[1978]: I1002 19:07:13.304567    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/24fef87020af50fba838138f9686fc61-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"24fef87020af50fba838138f9686fc61\") " pod="kube-system/kube-scheduler-localhost"
Oct  2 19:07:13.386717 kubelet[1978]: I1002 19:07:13.386680    1978 kubelet_node_status.go:108] "Node was previously registered" node="localhost"
Oct  2 19:07:13.386976 kubelet[1978]: I1002 19:07:13.386962    1978 kubelet_node_status.go:73] "Successfully registered node" node="localhost"
Oct  2 19:07:13.387527 kubelet[1978]: E1002 19:07:13.387480    1978 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost"
Oct  2 19:07:13.685174 kubelet[1978]: E1002 19:07:13.685024    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:13.687052 kubelet[1978]: E1002 19:07:13.687019    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:13.688075 kubelet[1978]: E1002 19:07:13.688043    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:14.092312 kubelet[1978]: I1002 19:07:14.092243    1978 apiserver.go:52] "Watching apiserver"
Oct  2 19:07:14.102942 kubelet[1978]: I1002 19:07:14.102897    1978 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world"
Oct  2 19:07:14.111076 kubelet[1978]: I1002 19:07:14.111042    1978 reconciler.go:41] "Reconciler: start to sync state"
Oct  2 19:07:14.137461 kubelet[1978]: E1002 19:07:14.137419    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:14.137638 kubelet[1978]: E1002 19:07:14.137608    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:14.511182 kubelet[1978]: E1002 19:07:14.511113    1978 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost"
Oct  2 19:07:14.511720 kubelet[1978]: E1002 19:07:14.511691    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:14.528016 kubelet[1978]: I1002 19:07:14.527954    1978 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=2.527856448 podCreationTimestamp="2023-10-02 19:07:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:07:14.51256084 +0000 UTC m=+1.485079682" watchObservedRunningTime="2023-10-02 19:07:14.527856448 +0000 UTC m=+1.500375401"
Oct  2 19:07:14.581541 kubelet[1978]: I1002 19:07:14.581491    1978 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.581448507 podCreationTimestamp="2023-10-02 19:07:13 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:07:14.529508153 +0000 UTC m=+1.502026995" watchObservedRunningTime="2023-10-02 19:07:14.581448507 +0000 UTC m=+1.553967349"
Oct  2 19:07:14.686937 kubelet[1978]: I1002 19:07:14.686905    1978 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.6868404510000001 podCreationTimestamp="2023-10-02 19:07:13 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:07:14.581638962 +0000 UTC m=+1.554157804" watchObservedRunningTime="2023-10-02 19:07:14.686840451 +0000 UTC m=+1.659359293"
Oct  2 19:07:15.138300 kubelet[1978]: E1002 19:07:15.138261    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:15.138753 kubelet[1978]: E1002 19:07:15.138674    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:15.139299 kubelet[1978]: E1002 19:07:15.139192    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:18.657808 sudo[1233]: pam_unix(sudo:session): session closed for user root
Oct  2 19:07:18.657000 audit[1233]: USER_END pid=1233 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 19:07:18.658514 kernel: kauditd_printk_skb: 272 callbacks suppressed
Oct  2 19:07:18.658576 kernel: audit: type=1106 audit(1696273638.657:948): pid=1233 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 19:07:18.659247 sshd[1230]: pam_unix(sshd:session): session closed for user core
Oct  2 19:07:18.657000 audit[1233]: CRED_DISP pid=1233 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 19:07:18.663325 kernel: audit: type=1104 audit(1696273638.657:949): pid=1233 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 19:07:18.663384 kernel: audit: type=1106 audit(1696273638.659:950): pid=1230 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:07:18.659000 audit[1230]: USER_END pid=1230 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:07:18.661629 systemd[1]: sshd@6-10.0.0.30:22-10.0.0.1:40266.service: Deactivated successfully.
Oct  2 19:07:18.662544 systemd[1]: session-7.scope: Deactivated successfully.
Oct  2 19:07:18.662765 systemd[1]: session-7.scope: Consumed 3.763s CPU time.
Oct  2 19:07:18.664115 systemd-logind[1090]: Session 7 logged out. Waiting for processes to exit.
Oct  2 19:07:18.665133 systemd-logind[1090]: Removed session 7.
Oct  2 19:07:18.660000 audit[1230]: CRED_DISP pid=1230 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:07:18.668348 kernel: audit: type=1104 audit(1696273638.660:951): pid=1230 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:07:18.668378 kernel: audit: type=1131 audit(1696273638.661:952): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.30:22-10.0.0.1:40266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:07:18.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.30:22-10.0.0.1:40266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:07:18.685372 kubelet[1978]: E1002 19:07:18.685329    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:19.144118 kubelet[1978]: E1002 19:07:19.144073    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:22.128598 kubelet[1978]: E1002 19:07:22.128515    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:22.149203 kubelet[1978]: E1002 19:07:22.149162    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:23.150183 kubelet[1978]: E1002 19:07:23.150139    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:24.381000 audit[1862]: AVC avc:  denied  { watch } for  pid=1862 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=32591 scontext=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0
Oct  2 19:07:24.381000 audit[1862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f64580 a2=fc6 a3=0 items=0 ppid=1716 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 key=(null)
Oct  2 19:07:24.388702 kernel: audit: type=1400 audit(1696273644.381:953): avc:  denied  { watch } for  pid=1862 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=32591 scontext=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0
Oct  2 19:07:24.388845 kernel: audit: type=1300 audit(1696273644.381:953): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f64580 a2=fc6 a3=0 items=0 ppid=1716 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 key=(null)
Oct  2 19:07:24.388882 kernel: audit: type=1327 audit(1696273644.381:953): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:07:24.381000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:07:24.409000 audit[1862]: AVC avc:  denied  { watch } for  pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6787 scontext=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:07:24.409000 audit[1862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f16680 a2=fc6 a3=0 items=0 ppid=1716 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 key=(null)
Oct  2 19:07:24.417669 kernel: audit: type=1400 audit(1696273644.409:954): avc:  denied  { watch } for  pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6787 scontext=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:07:24.417819 kernel: audit: type=1300 audit(1696273644.409:954): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f16680 a2=fc6 a3=0 items=0 ppid=1716 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 key=(null)
Oct  2 19:07:24.417841 kernel: audit: type=1327 audit(1696273644.409:954): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:07:24.409000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:07:24.410000 audit[1862]: AVC avc:  denied  { watch } for  pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6787 scontext=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:07:24.424642 kernel: audit: type=1400 audit(1696273644.410:955): avc:  denied  { watch } for  pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6787 scontext=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:07:24.424747 kernel: audit: type=1300 audit(1696273644.410:955): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000faa120 a2=fc6 a3=0 items=0 ppid=1716 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 key=(null)
Oct  2 19:07:24.410000 audit[1862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000faa120 a2=fc6 a3=0 items=0 ppid=1716 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 key=(null)
Oct  2 19:07:24.410000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:07:24.432534 kernel: audit: type=1327 audit(1696273644.410:955): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:07:24.432599 kernel: audit: type=1400 audit(1696273644.410:956): avc:  denied  { watch } for  pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6787 scontext=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:07:24.410000 audit[1862]: AVC avc:  denied  { watch } for  pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6787 scontext=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:07:24.410000 audit[1862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000faa260 a2=fc6 a3=0 items=0 ppid=1716 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 key=(null)
Oct  2 19:07:24.410000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:07:24.411000 audit[1862]: AVC avc:  denied  { watch } for  pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6787 scontext=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:07:24.411000 audit[1862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000eeb0c0 a2=fc6 a3=0 items=0 ppid=1716 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 key=(null)
Oct  2 19:07:24.411000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:07:24.634569 update_engine[1095]: I1002 19:07:24.634377  1095 update_attempter.cc:505] Updating boot flags...
Oct  2 19:07:24.761245 kubelet[1978]: E1002 19:07:24.761193    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:28.333634 kubelet[1978]: I1002 19:07:28.333595    1978 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24"
Oct  2 19:07:28.334098 env[1104]: time="2023-10-02T19:07:28.333980531Z" level=info msg="No cni config template is specified, wait for other system components to drop the config."
Oct  2 19:07:28.334472 kubelet[1978]: I1002 19:07:28.334151    1978 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24"
Oct  2 19:07:29.156090 kubelet[1978]: I1002 19:07:29.156052    1978 topology_manager.go:212] "Topology Admit Handler"
Oct  2 19:07:29.162002 systemd[1]: Created slice kubepods-besteffort-pod251bdfb5_c82a_44d8_8de3_9bcd4bc6ee50.slice.
Oct  2 19:07:29.210363 kubelet[1978]: I1002 19:07:29.210294    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/251bdfb5-c82a-44d8-8de3-9bcd4bc6ee50-lib-modules\") pod \"kube-proxy-7mshp\" (UID: \"251bdfb5-c82a-44d8-8de3-9bcd4bc6ee50\") " pod="kube-system/kube-proxy-7mshp"
Oct  2 19:07:29.210363 kubelet[1978]: I1002 19:07:29.210352    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gjjnd\" (UniqueName: \"kubernetes.io/projected/251bdfb5-c82a-44d8-8de3-9bcd4bc6ee50-kube-api-access-gjjnd\") pod \"kube-proxy-7mshp\" (UID: \"251bdfb5-c82a-44d8-8de3-9bcd4bc6ee50\") " pod="kube-system/kube-proxy-7mshp"
Oct  2 19:07:29.210363 kubelet[1978]: I1002 19:07:29.210375    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/251bdfb5-c82a-44d8-8de3-9bcd4bc6ee50-kube-proxy\") pod \"kube-proxy-7mshp\" (UID: \"251bdfb5-c82a-44d8-8de3-9bcd4bc6ee50\") " pod="kube-system/kube-proxy-7mshp"
Oct  2 19:07:29.210679 kubelet[1978]: I1002 19:07:29.210395    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/251bdfb5-c82a-44d8-8de3-9bcd4bc6ee50-xtables-lock\") pod \"kube-proxy-7mshp\" (UID: \"251bdfb5-c82a-44d8-8de3-9bcd4bc6ee50\") " pod="kube-system/kube-proxy-7mshp"
Oct  2 19:07:29.376818 kubelet[1978]: I1002 19:07:29.376776    1978 topology_manager.go:212] "Topology Admit Handler"
Oct  2 19:07:29.382470 systemd[1]: Created slice kubepods-besteffort-pode84d9501_31f2_449b_ac16_9e81d1ada923.slice.
Oct  2 19:07:29.412532 kubelet[1978]: I1002 19:07:29.412434    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hbkks\" (UniqueName: \"kubernetes.io/projected/e84d9501-31f2-449b-ac16-9e81d1ada923-kube-api-access-hbkks\") pod \"tigera-operator-59c686f986-w5w5b\" (UID: \"e84d9501-31f2-449b-ac16-9e81d1ada923\") " pod="tigera-operator/tigera-operator-59c686f986-w5w5b"
Oct  2 19:07:29.412532 kubelet[1978]: I1002 19:07:29.412476    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/e84d9501-31f2-449b-ac16-9e81d1ada923-var-lib-calico\") pod \"tigera-operator-59c686f986-w5w5b\" (UID: \"e84d9501-31f2-449b-ac16-9e81d1ada923\") " pod="tigera-operator/tigera-operator-59c686f986-w5w5b"
Oct  2 19:07:29.467371 kubelet[1978]: E1002 19:07:29.467346    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:29.467989 env[1104]: time="2023-10-02T19:07:29.467949869Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7mshp,Uid:251bdfb5-c82a-44d8-8de3-9bcd4bc6ee50,Namespace:kube-system,Attempt:0,}"
Oct  2 19:07:29.482740 env[1104]: time="2023-10-02T19:07:29.482627194Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 19:07:29.482740 env[1104]: time="2023-10-02T19:07:29.482669916Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 19:07:29.482740 env[1104]: time="2023-10-02T19:07:29.482689342Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 19:07:29.483020 env[1104]: time="2023-10-02T19:07:29.482831330Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b206a8e251abc9cc803917fe8000966753f25836c7ea744d8536c6e12dcdbd8f pid=2088 runtime=io.containerd.runc.v2
Oct  2 19:07:29.495733 systemd[1]: Started cri-containerd-b206a8e251abc9cc803917fe8000966753f25836c7ea744d8536c6e12dcdbd8f.scope.
Oct  2 19:07:29.514448 kernel: kauditd_printk_skb: 5 callbacks suppressed
Oct  2 19:07:29.514575 kernel: audit: type=1400 audit(1696273649.503:958): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.514602 kernel: audit: type=1400 audit(1696273649.503:959): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.514625 kernel: audit: type=1400 audit(1696273649.503:960): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.514639 kernel: audit: type=1400 audit(1696273649.503:961): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.503000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.503000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.503000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.503000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.503000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.517243 kernel: audit: type=1400 audit(1696273649.503:962): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.517301 kernel: audit: type=1400 audit(1696273649.503:963): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.503000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.503000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.521518 kernel: audit: type=1400 audit(1696273649.503:964): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.521647 kernel: audit: type=1400 audit(1696273649.503:965): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.503000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.526375 kernel: audit: type=1400 audit(1696273649.503:966): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.503000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.529146 kernel: audit: type=1400 audit(1696273649.506:967): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.506000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.506000 audit: BPF prog-id=112 op=LOAD
Oct  2 19:07:29.507000 audit[2097]: AVC avc:  denied  { bpf } for  pid=2097 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.507000 audit[2097]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2088 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232303661386532353161626339636338303339313766653830303039
Oct  2 19:07:29.507000 audit[2097]: AVC avc:  denied  { perfmon } for  pid=2097 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.507000 audit[2097]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2088 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232303661386532353161626339636338303339313766653830303039
Oct  2 19:07:29.507000 audit[2097]: AVC avc:  denied  { bpf } for  pid=2097 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.507000 audit[2097]: AVC avc:  denied  { bpf } for  pid=2097 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.507000 audit[2097]: AVC avc:  denied  { bpf } for  pid=2097 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.507000 audit[2097]: AVC avc:  denied  { perfmon } for  pid=2097 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.507000 audit[2097]: AVC avc:  denied  { perfmon } for  pid=2097 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.507000 audit[2097]: AVC avc:  denied  { perfmon } for  pid=2097 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.507000 audit[2097]: AVC avc:  denied  { perfmon } for  pid=2097 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.507000 audit[2097]: AVC avc:  denied  { perfmon } for  pid=2097 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.507000 audit[2097]: AVC avc:  denied  { bpf } for  pid=2097 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.507000 audit[2097]: AVC avc:  denied  { bpf } for  pid=2097 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.507000 audit: BPF prog-id=113 op=LOAD
Oct  2 19:07:29.507000 audit[2097]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000304ed0 items=0 ppid=2088 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232303661386532353161626339636338303339313766653830303039
Oct  2 19:07:29.508000 audit[2097]: AVC avc:  denied  { bpf } for  pid=2097 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.508000 audit[2097]: AVC avc:  denied  { bpf } for  pid=2097 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.508000 audit[2097]: AVC avc:  denied  { perfmon } for  pid=2097 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.508000 audit[2097]: AVC avc:  denied  { perfmon } for  pid=2097 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.508000 audit[2097]: AVC avc:  denied  { perfmon } for  pid=2097 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.508000 audit[2097]: AVC avc:  denied  { perfmon } for  pid=2097 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.508000 audit[2097]: AVC avc:  denied  { perfmon } for  pid=2097 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.508000 audit[2097]: AVC avc:  denied  { bpf } for  pid=2097 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.508000 audit[2097]: AVC avc:  denied  { bpf } for  pid=2097 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.508000 audit: BPF prog-id=114 op=LOAD
Oct  2 19:07:29.508000 audit[2097]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000304f18 items=0 ppid=2088 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232303661386532353161626339636338303339313766653830303039
Oct  2 19:07:29.511000 audit: BPF prog-id=114 op=UNLOAD
Oct  2 19:07:29.511000 audit: BPF prog-id=113 op=UNLOAD
Oct  2 19:07:29.511000 audit[2097]: AVC avc:  denied  { bpf } for  pid=2097 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.511000 audit[2097]: AVC avc:  denied  { bpf } for  pid=2097 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.511000 audit[2097]: AVC avc:  denied  { bpf } for  pid=2097 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.511000 audit[2097]: AVC avc:  denied  { perfmon } for  pid=2097 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.511000 audit[2097]: AVC avc:  denied  { perfmon } for  pid=2097 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.511000 audit[2097]: AVC avc:  denied  { perfmon } for  pid=2097 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.511000 audit[2097]: AVC avc:  denied  { perfmon } for  pid=2097 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.511000 audit[2097]: AVC avc:  denied  { perfmon } for  pid=2097 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.511000 audit[2097]: AVC avc:  denied  { bpf } for  pid=2097 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.511000 audit[2097]: AVC avc:  denied  { bpf } for  pid=2097 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.511000 audit: BPF prog-id=115 op=LOAD
Oct  2 19:07:29.511000 audit[2097]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000305328 items=0 ppid=2088 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232303661386532353161626339636338303339313766653830303039
Oct  2 19:07:29.535504 env[1104]: time="2023-10-02T19:07:29.535432783Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7mshp,Uid:251bdfb5-c82a-44d8-8de3-9bcd4bc6ee50,Namespace:kube-system,Attempt:0,} returns sandbox id \"b206a8e251abc9cc803917fe8000966753f25836c7ea744d8536c6e12dcdbd8f\""
Oct  2 19:07:29.536288 kubelet[1978]: E1002 19:07:29.536267    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:29.540595 env[1104]: time="2023-10-02T19:07:29.540542697Z" level=info msg="CreateContainer within sandbox \"b206a8e251abc9cc803917fe8000966753f25836c7ea744d8536c6e12dcdbd8f\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}"
Oct  2 19:07:29.556876 env[1104]: time="2023-10-02T19:07:29.556815810Z" level=info msg="CreateContainer within sandbox \"b206a8e251abc9cc803917fe8000966753f25836c7ea744d8536c6e12dcdbd8f\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"84f4e531b57bb232008a00cb3c5ae24dd5419f7b7ff2489fde846223e4a1659a\""
Oct  2 19:07:29.557426 env[1104]: time="2023-10-02T19:07:29.557353446Z" level=info msg="StartContainer for \"84f4e531b57bb232008a00cb3c5ae24dd5419f7b7ff2489fde846223e4a1659a\""
Oct  2 19:07:29.573128 systemd[1]: Started cri-containerd-84f4e531b57bb232008a00cb3c5ae24dd5419f7b7ff2489fde846223e4a1659a.scope.
Oct  2 19:07:29.586000 audit[2130]: AVC avc:  denied  { perfmon } for  pid=2130 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.586000 audit[2130]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2088 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834663465353331623537626232333230303861303063623363356165
Oct  2 19:07:29.586000 audit[2130]: AVC avc:  denied  { bpf } for  pid=2130 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.586000 audit[2130]: AVC avc:  denied  { bpf } for  pid=2130 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.586000 audit[2130]: AVC avc:  denied  { bpf } for  pid=2130 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.586000 audit[2130]: AVC avc:  denied  { perfmon } for  pid=2130 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.586000 audit[2130]: AVC avc:  denied  { perfmon } for  pid=2130 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.586000 audit[2130]: AVC avc:  denied  { perfmon } for  pid=2130 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.586000 audit[2130]: AVC avc:  denied  { perfmon } for  pid=2130 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.586000 audit[2130]: AVC avc:  denied  { perfmon } for  pid=2130 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.586000 audit[2130]: AVC avc:  denied  { bpf } for  pid=2130 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.586000 audit[2130]: AVC avc:  denied  { bpf } for  pid=2130 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.586000 audit: BPF prog-id=116 op=LOAD
Oct  2 19:07:29.586000 audit[2130]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002988c0 items=0 ppid=2088 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834663465353331623537626232333230303861303063623363356165
Oct  2 19:07:29.586000 audit[2130]: AVC avc:  denied  { bpf } for  pid=2130 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.586000 audit[2130]: AVC avc:  denied  { bpf } for  pid=2130 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.586000 audit[2130]: AVC avc:  denied  { perfmon } for  pid=2130 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.586000 audit[2130]: AVC avc:  denied  { perfmon } for  pid=2130 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.586000 audit[2130]: AVC avc:  denied  { perfmon } for  pid=2130 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.586000 audit[2130]: AVC avc:  denied  { perfmon } for  pid=2130 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.586000 audit[2130]: AVC avc:  denied  { perfmon } for  pid=2130 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.586000 audit[2130]: AVC avc:  denied  { bpf } for  pid=2130 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.586000 audit[2130]: AVC avc:  denied  { bpf } for  pid=2130 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.586000 audit: BPF prog-id=117 op=LOAD
Oct  2 19:07:29.586000 audit[2130]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000298908 items=0 ppid=2088 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834663465353331623537626232333230303861303063623363356165
Oct  2 19:07:29.586000 audit: BPF prog-id=117 op=UNLOAD
Oct  2 19:07:29.586000 audit: BPF prog-id=116 op=UNLOAD
Oct  2 19:07:29.586000 audit[2130]: AVC avc:  denied  { bpf } for  pid=2130 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.586000 audit[2130]: AVC avc:  denied  { bpf } for  pid=2130 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.586000 audit[2130]: AVC avc:  denied  { bpf } for  pid=2130 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.586000 audit[2130]: AVC avc:  denied  { perfmon } for  pid=2130 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.586000 audit[2130]: AVC avc:  denied  { perfmon } for  pid=2130 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.586000 audit[2130]: AVC avc:  denied  { perfmon } for  pid=2130 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.586000 audit[2130]: AVC avc:  denied  { perfmon } for  pid=2130 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.586000 audit[2130]: AVC avc:  denied  { perfmon } for  pid=2130 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.586000 audit[2130]: AVC avc:  denied  { bpf } for  pid=2130 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.586000 audit[2130]: AVC avc:  denied  { bpf } for  pid=2130 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.586000 audit: BPF prog-id=118 op=LOAD
Oct  2 19:07:29.586000 audit[2130]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000298998 items=0 ppid=2088 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834663465353331623537626232333230303861303063623363356165
Oct  2 19:07:29.601180 env[1104]: time="2023-10-02T19:07:29.601116094Z" level=info msg="StartContainer for \"84f4e531b57bb232008a00cb3c5ae24dd5419f7b7ff2489fde846223e4a1659a\" returns successfully"
Oct  2 19:07:29.644000 audit[2180]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2180 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:07:29.644000 audit[2180]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcf8a31ac0 a2=0 a3=7ffcf8a31aac items=0 ppid=2141 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.644000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65
Oct  2 19:07:29.645000 audit[2181]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2181 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:07:29.645000 audit[2181]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcb6130db0 a2=0 a3=7ffcb6130d9c items=0 ppid=2141 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.645000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65
Oct  2 19:07:29.647000 audit[2182]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2182 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:07:29.647000 audit[2182]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffffdfc4510 a2=0 a3=7ffffdfc44fc items=0 ppid=2141 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.647000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174
Oct  2 19:07:29.648000 audit[2184]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2184 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:07:29.648000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc5d1d4c0 a2=0 a3=7ffdc5d1d4ac items=0 ppid=2141 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.648000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174
Oct  2 19:07:29.648000 audit[2185]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2185 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:07:29.648000 audit[2185]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc58c6e390 a2=0 a3=7ffc58c6e37c items=0 ppid=2141 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.648000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572
Oct  2 19:07:29.650000 audit[2186]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2186 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:07:29.650000 audit[2186]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff1e1124b0 a2=0 a3=7fff1e11249c items=0 ppid=2141 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.650000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572
Oct  2 19:07:29.686259 env[1104]: time="2023-10-02T19:07:29.686140490Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-59c686f986-w5w5b,Uid:e84d9501-31f2-449b-ac16-9e81d1ada923,Namespace:tigera-operator,Attempt:0,}"
Oct  2 19:07:29.702604 env[1104]: time="2023-10-02T19:07:29.702494237Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 19:07:29.702604 env[1104]: time="2023-10-02T19:07:29.702542698Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 19:07:29.702604 env[1104]: time="2023-10-02T19:07:29.702556044Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 19:07:29.703122 env[1104]: time="2023-10-02T19:07:29.703053003Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e58a960921adecfb71f46db8229d19f03c17398cafa7464653628e3189393ccc pid=2193 runtime=io.containerd.runc.v2
Oct  2 19:07:29.713824 systemd[1]: Started cri-containerd-e58a960921adecfb71f46db8229d19f03c17398cafa7464653628e3189393ccc.scope.
Oct  2 19:07:29.722000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.722000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.722000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.722000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.722000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.722000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.722000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.722000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.722000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.722000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.722000 audit: BPF prog-id=119 op=LOAD
Oct  2 19:07:29.723000 audit[2203]: AVC avc:  denied  { bpf } for  pid=2203 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.723000 audit[2203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2193 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535386139363039323161646563666237316634366462383232396431
Oct  2 19:07:29.723000 audit[2203]: AVC avc:  denied  { perfmon } for  pid=2203 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.723000 audit[2203]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2193 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535386139363039323161646563666237316634366462383232396431
Oct  2 19:07:29.723000 audit[2203]: AVC avc:  denied  { bpf } for  pid=2203 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.723000 audit[2203]: AVC avc:  denied  { bpf } for  pid=2203 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.723000 audit[2203]: AVC avc:  denied  { bpf } for  pid=2203 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.723000 audit[2203]: AVC avc:  denied  { perfmon } for  pid=2203 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.723000 audit[2203]: AVC avc:  denied  { perfmon } for  pid=2203 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.723000 audit[2203]: AVC avc:  denied  { perfmon } for  pid=2203 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.723000 audit[2203]: AVC avc:  denied  { perfmon } for  pid=2203 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.723000 audit[2203]: AVC avc:  denied  { perfmon } for  pid=2203 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.723000 audit[2203]: AVC avc:  denied  { bpf } for  pid=2203 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.723000 audit[2203]: AVC avc:  denied  { bpf } for  pid=2203 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.723000 audit: BPF prog-id=120 op=LOAD
Oct  2 19:07:29.723000 audit[2203]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a0b20 items=0 ppid=2193 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535386139363039323161646563666237316634366462383232396431
Oct  2 19:07:29.723000 audit[2203]: AVC avc:  denied  { bpf } for  pid=2203 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.723000 audit[2203]: AVC avc:  denied  { bpf } for  pid=2203 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.723000 audit[2203]: AVC avc:  denied  { perfmon } for  pid=2203 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.723000 audit[2203]: AVC avc:  denied  { perfmon } for  pid=2203 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.723000 audit[2203]: AVC avc:  denied  { perfmon } for  pid=2203 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.723000 audit[2203]: AVC avc:  denied  { perfmon } for  pid=2203 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.723000 audit[2203]: AVC avc:  denied  { perfmon } for  pid=2203 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.723000 audit[2203]: AVC avc:  denied  { bpf } for  pid=2203 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.723000 audit[2203]: AVC avc:  denied  { bpf } for  pid=2203 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.723000 audit: BPF prog-id=121 op=LOAD
Oct  2 19:07:29.723000 audit[2203]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a0b68 items=0 ppid=2193 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535386139363039323161646563666237316634366462383232396431
Oct  2 19:07:29.723000 audit: BPF prog-id=121 op=UNLOAD
Oct  2 19:07:29.723000 audit: BPF prog-id=120 op=UNLOAD
Oct  2 19:07:29.723000 audit[2203]: AVC avc:  denied  { bpf } for  pid=2203 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.723000 audit[2203]: AVC avc:  denied  { bpf } for  pid=2203 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.723000 audit[2203]: AVC avc:  denied  { bpf } for  pid=2203 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.723000 audit[2203]: AVC avc:  denied  { perfmon } for  pid=2203 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.723000 audit[2203]: AVC avc:  denied  { perfmon } for  pid=2203 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.723000 audit[2203]: AVC avc:  denied  { perfmon } for  pid=2203 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.723000 audit[2203]: AVC avc:  denied  { perfmon } for  pid=2203 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.723000 audit[2203]: AVC avc:  denied  { perfmon } for  pid=2203 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.723000 audit[2203]: AVC avc:  denied  { bpf } for  pid=2203 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.723000 audit[2203]: AVC avc:  denied  { bpf } for  pid=2203 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:29.723000 audit: BPF prog-id=122 op=LOAD
Oct  2 19:07:29.723000 audit[2203]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a0f78 items=0 ppid=2193 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535386139363039323161646563666237316634366462383232396431
Oct  2 19:07:29.749435 env[1104]: time="2023-10-02T19:07:29.749346367Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-59c686f986-w5w5b,Uid:e84d9501-31f2-449b-ac16-9e81d1ada923,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"e58a960921adecfb71f46db8229d19f03c17398cafa7464653628e3189393ccc\""
Oct  2 19:07:29.750000 audit[2228]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:07:29.750000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd10836310 a2=0 a3=7ffd108362fc items=0 ppid=2141 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.750000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572
Oct  2 19:07:29.752035 env[1104]: time="2023-10-02T19:07:29.751273862Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\""
Oct  2 19:07:29.754000 audit[2230]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2230 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:07:29.754000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe837a8580 a2=0 a3=7ffe837a856c items=0 ppid=2141 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.754000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365
Oct  2 19:07:29.758000 audit[2233]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:07:29.758000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd97643e30 a2=0 a3=7ffd97643e1c items=0 ppid=2141 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.758000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669
Oct  2 19:07:29.759000 audit[2234]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:07:29.759000 audit[2234]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff00e43d70 a2=0 a3=7fff00e43d5c items=0 ppid=2141 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.759000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572
Oct  2 19:07:29.761000 audit[2236]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2236 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:07:29.761000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc9573b0d0 a2=0 a3=7ffc9573b0bc items=0 ppid=2141 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.761000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453
Oct  2 19:07:29.762000 audit[2237]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:07:29.762000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb12341b0 a2=0 a3=7ffdb123419c items=0 ppid=2141 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.762000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572
Oct  2 19:07:29.764000 audit[2239]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2239 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:07:29.764000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc548c4250 a2=0 a3=7ffc548c423c items=0 ppid=2141 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.764000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D
Oct  2 19:07:29.767000 audit[2242]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:07:29.767000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc09dc5b40 a2=0 a3=7ffc09dc5b2c items=0 ppid=2141 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.767000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53
Oct  2 19:07:29.769000 audit[2243]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:07:29.769000 audit[2243]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc14b85e0 a2=0 a3=7fffc14b85cc items=0 ppid=2141 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.769000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572
Oct  2 19:07:29.772000 audit[2245]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:07:29.772000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffff931e4e0 a2=0 a3=7ffff931e4cc items=0 ppid=2141 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.772000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244
Oct  2 19:07:29.773000 audit[2246]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:07:29.773000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc327247d0 a2=0 a3=7ffc327247bc items=0 ppid=2141 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.773000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572
Oct  2 19:07:29.775000 audit[2248]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:07:29.775000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd2f00d4b0 a2=0 a3=7ffd2f00d49c items=0 ppid=2141 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.775000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Oct  2 19:07:29.778000 audit[2251]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2251 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:07:29.778000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc75170bd0 a2=0 a3=7ffc75170bbc items=0 ppid=2141 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.778000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Oct  2 19:07:29.782000 audit[2254]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2254 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:07:29.782000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe09f160f0 a2=0 a3=7ffe09f160dc items=0 ppid=2141 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.782000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D
Oct  2 19:07:29.783000 audit[2255]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:07:29.783000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffefe3136b0 a2=0 a3=7ffefe31369c items=0 ppid=2141 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.783000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174
Oct  2 19:07:29.785000 audit[2257]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2257 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:07:29.785000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc451c14d0 a2=0 a3=7ffc451c14bc items=0 ppid=2141 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.785000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Oct  2 19:07:29.788000 audit[2260]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2260 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:07:29.788000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffc998cfc0 a2=0 a3=7fffc998cfac items=0 ppid=2141 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.788000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Oct  2 19:07:29.793000 audit[2265]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:07:29.793000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc91dd93c0 a2=0 a3=7ffc91dd93ac items=0 ppid=2141 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.793000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174
Oct  2 19:07:29.796000 audit[2267]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2267 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 19:07:29.796000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd1bfeec40 a2=0 a3=7ffd1bfeec2c items=0 ppid=2141 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.796000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47
Oct  2 19:07:29.807000 audit[2269]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2269 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:07:29.807000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fff9aa807b0 a2=0 a3=7fff9aa8079c items=0 ppid=2141 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.807000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:07:29.819000 audit[2269]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2269 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:07:29.819000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fff9aa807b0 a2=0 a3=7fff9aa8079c items=0 ppid=2141 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.819000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:07:29.820000 audit[2275]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:07:29.820000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffc4e8d5b0 a2=0 a3=7fffc4e8d59c items=0 ppid=2141 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.820000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572
Oct  2 19:07:29.823000 audit[2277]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:07:29.823000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc36e5b800 a2=0 a3=7ffc36e5b7ec items=0 ppid=2141 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.823000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963
Oct  2 19:07:29.827000 audit[2280]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:07:29.827000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff887c0900 a2=0 a3=7fff887c08ec items=0 ppid=2141 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.827000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276
Oct  2 19:07:29.828000 audit[2281]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2281 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:07:29.828000 audit[2281]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd8b305050 a2=0 a3=7ffd8b30503c items=0 ppid=2141 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.828000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572
Oct  2 19:07:29.830000 audit[2283]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2283 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:07:29.830000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcc70fef50 a2=0 a3=7ffcc70fef3c items=0 ppid=2141 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.830000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453
Oct  2 19:07:29.831000 audit[2284]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2284 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:07:29.831000 audit[2284]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe07ca63b0 a2=0 a3=7ffe07ca639c items=0 ppid=2141 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.831000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572
Oct  2 19:07:29.834000 audit[2286]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:07:29.834000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc417e3560 a2=0 a3=7ffc417e354c items=0 ppid=2141 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.834000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245
Oct  2 19:07:29.837000 audit[2289]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:07:29.837000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd79677140 a2=0 a3=7ffd7967712c items=0 ppid=2141 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.837000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D
Oct  2 19:07:29.838000 audit[2290]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2290 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:07:29.838000 audit[2290]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd00924e50 a2=0 a3=7ffd00924e3c items=0 ppid=2141 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.838000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572
Oct  2 19:07:29.841000 audit[2292]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2292 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:07:29.841000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffec69d8c70 a2=0 a3=7ffec69d8c5c items=0 ppid=2141 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.841000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244
Oct  2 19:07:29.842000 audit[2293]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2293 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:07:29.842000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcdba0bee0 a2=0 a3=7ffcdba0becc items=0 ppid=2141 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.842000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572
Oct  2 19:07:29.844000 audit[2295]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2295 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:07:29.844000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff76742710 a2=0 a3=7fff767426fc items=0 ppid=2141 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.844000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Oct  2 19:07:29.847000 audit[2298]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2298 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:07:29.847000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffce0b19dc0 a2=0 a3=7ffce0b19dac items=0 ppid=2141 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.847000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D
Oct  2 19:07:29.850000 audit[2301]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:07:29.850000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffd578e420 a2=0 a3=7fffd578e40c items=0 ppid=2141 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.850000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C
Oct  2 19:07:29.851000 audit[2302]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:07:29.851000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffef8888f50 a2=0 a3=7ffef8888f3c items=0 ppid=2141 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.851000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174
Oct  2 19:07:29.853000 audit[2304]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2304 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:07:29.853000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffeccb14e70 a2=0 a3=7ffeccb14e5c items=0 ppid=2141 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.853000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Oct  2 19:07:29.856000 audit[2307]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:07:29.856000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe78b39b50 a2=0 a3=7ffe78b39b3c items=0 ppid=2141 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.856000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Oct  2 19:07:29.857000 audit[2308]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:07:29.857000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef7f6ca10 a2=0 a3=7ffef7f6c9fc items=0 ppid=2141 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.857000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572
Oct  2 19:07:29.859000 audit[2310]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=2310 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:07:29.859000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff163dc9a0 a2=0 a3=7fff163dc98c items=0 ppid=2141 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.859000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Oct  2 19:07:29.862000 audit[2313]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_rule pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:07:29.862000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff48757fd0 a2=0 a3=7fff48757fbc items=0 ppid=2141 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.862000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Oct  2 19:07:29.863000 audit[2314]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:07:29.863000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeface0520 a2=0 a3=7ffeface050c items=0 ppid=2141 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.863000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174
Oct  2 19:07:29.865000 audit[2316]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 19:07:29.865000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd16421fa0 a2=0 a3=7ffd16421f8c items=0 ppid=2141 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.865000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47
Oct  2 19:07:29.868000 audit[2318]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2318 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto"
Oct  2 19:07:29.868000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffea0dd30c0 a2=0 a3=7ffea0dd30ac items=0 ppid=2141 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.868000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:07:29.868000 audit[2318]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2318 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto"
Oct  2 19:07:29.868000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffea0dd30c0 a2=0 a3=7ffea0dd30ac items=0 ppid=2141 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:29.868000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:07:30.163448 kubelet[1978]: E1002 19:07:30.163414    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:30.206913 kubelet[1978]: I1002 19:07:30.206862    1978 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-7mshp" podStartSLOduration=1.206808989 podCreationTimestamp="2023-10-02 19:07:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:07:30.206671198 +0000 UTC m=+17.179190041" watchObservedRunningTime="2023-10-02 19:07:30.206808989 +0000 UTC m=+17.179327831"
Oct  2 19:07:33.322191 env[1104]: time="2023-10-02T19:07:33.322100672Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:33.324510 env[1104]: time="2023-10-02T19:07:33.324448804Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:33.326512 env[1104]: time="2023-10-02T19:07:33.326477624Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:33.328356 env[1104]: time="2023-10-02T19:07:33.328328437Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:89eef35e1bbe8c88792ce69c3f3f38fb9838e58602c570524350b5f3ab127582,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:33.328933 env[1104]: time="2023-10-02T19:07:33.328897781Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\" returns image reference \"sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1\""
Oct  2 19:07:33.330554 env[1104]: time="2023-10-02T19:07:33.330514023Z" level=info msg="CreateContainer within sandbox \"e58a960921adecfb71f46db8229d19f03c17398cafa7464653628e3189393ccc\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}"
Oct  2 19:07:33.344930 env[1104]: time="2023-10-02T19:07:33.344866193Z" level=info msg="CreateContainer within sandbox \"e58a960921adecfb71f46db8229d19f03c17398cafa7464653628e3189393ccc\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"84affad1210b6154d1b11e8bba48128d416fb231715badb5110817a9702be954\""
Oct  2 19:07:33.345477 env[1104]: time="2023-10-02T19:07:33.345455285Z" level=info msg="StartContainer for \"84affad1210b6154d1b11e8bba48128d416fb231715badb5110817a9702be954\""
Oct  2 19:07:33.365179 systemd[1]: Started cri-containerd-84affad1210b6154d1b11e8bba48128d416fb231715badb5110817a9702be954.scope.
Oct  2 19:07:33.376000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.376000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.376000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.376000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.376000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.376000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.376000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.376000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.376000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.377000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.377000 audit: BPF prog-id=123 op=LOAD
Oct  2 19:07:33.377000 audit[2327]: AVC avc:  denied  { bpf } for  pid=2327 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.377000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2193 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:33.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834616666616431323130623631353464316231316538626261343831
Oct  2 19:07:33.377000 audit[2327]: AVC avc:  denied  { perfmon } for  pid=2327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.377000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2193 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:33.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834616666616431323130623631353464316231316538626261343831
Oct  2 19:07:33.378000 audit[2327]: AVC avc:  denied  { bpf } for  pid=2327 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.378000 audit[2327]: AVC avc:  denied  { bpf } for  pid=2327 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.378000 audit[2327]: AVC avc:  denied  { bpf } for  pid=2327 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.378000 audit[2327]: AVC avc:  denied  { perfmon } for  pid=2327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.378000 audit[2327]: AVC avc:  denied  { perfmon } for  pid=2327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.378000 audit[2327]: AVC avc:  denied  { perfmon } for  pid=2327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.378000 audit[2327]: AVC avc:  denied  { perfmon } for  pid=2327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.378000 audit[2327]: AVC avc:  denied  { perfmon } for  pid=2327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.378000 audit[2327]: AVC avc:  denied  { bpf } for  pid=2327 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.378000 audit[2327]: AVC avc:  denied  { bpf } for  pid=2327 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.378000 audit: BPF prog-id=124 op=LOAD
Oct  2 19:07:33.378000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003bc360 items=0 ppid=2193 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:33.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834616666616431323130623631353464316231316538626261343831
Oct  2 19:07:33.378000 audit[2327]: AVC avc:  denied  { bpf } for  pid=2327 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.378000 audit[2327]: AVC avc:  denied  { bpf } for  pid=2327 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.378000 audit[2327]: AVC avc:  denied  { perfmon } for  pid=2327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.378000 audit[2327]: AVC avc:  denied  { perfmon } for  pid=2327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.378000 audit[2327]: AVC avc:  denied  { perfmon } for  pid=2327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.378000 audit[2327]: AVC avc:  denied  { perfmon } for  pid=2327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.378000 audit[2327]: AVC avc:  denied  { perfmon } for  pid=2327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.378000 audit[2327]: AVC avc:  denied  { bpf } for  pid=2327 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.378000 audit[2327]: AVC avc:  denied  { bpf } for  pid=2327 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.378000 audit: BPF prog-id=125 op=LOAD
Oct  2 19:07:33.378000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003bc3a8 items=0 ppid=2193 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:33.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834616666616431323130623631353464316231316538626261343831
Oct  2 19:07:33.378000 audit: BPF prog-id=125 op=UNLOAD
Oct  2 19:07:33.378000 audit: BPF prog-id=124 op=UNLOAD
Oct  2 19:07:33.378000 audit[2327]: AVC avc:  denied  { bpf } for  pid=2327 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.378000 audit[2327]: AVC avc:  denied  { bpf } for  pid=2327 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.378000 audit[2327]: AVC avc:  denied  { bpf } for  pid=2327 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.378000 audit[2327]: AVC avc:  denied  { perfmon } for  pid=2327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.378000 audit[2327]: AVC avc:  denied  { perfmon } for  pid=2327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.378000 audit[2327]: AVC avc:  denied  { perfmon } for  pid=2327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.378000 audit[2327]: AVC avc:  denied  { perfmon } for  pid=2327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.378000 audit[2327]: AVC avc:  denied  { perfmon } for  pid=2327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.378000 audit[2327]: AVC avc:  denied  { bpf } for  pid=2327 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.378000 audit[2327]: AVC avc:  denied  { bpf } for  pid=2327 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:33.378000 audit: BPF prog-id=126 op=LOAD
Oct  2 19:07:33.378000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003bc7b8 items=0 ppid=2193 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:33.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834616666616431323130623631353464316231316538626261343831
Oct  2 19:07:33.413510 env[1104]: time="2023-10-02T19:07:33.413439430Z" level=info msg="StartContainer for \"84affad1210b6154d1b11e8bba48128d416fb231715badb5110817a9702be954\" returns successfully"
Oct  2 19:07:34.181179 kubelet[1978]: I1002 19:07:34.181119    1978 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-59c686f986-w5w5b" podStartSLOduration=1.602442265 podCreationTimestamp="2023-10-02 19:07:29 +0000 UTC" firstStartedPulling="2023-10-02 19:07:29.750620897 +0000 UTC m=+16.723139739" lastFinishedPulling="2023-10-02 19:07:33.329249005 +0000 UTC m=+20.301767847" observedRunningTime="2023-10-02 19:07:34.180532057 +0000 UTC m=+21.153050899" watchObservedRunningTime="2023-10-02 19:07:34.181070373 +0000 UTC m=+21.153589215"
Oct  2 19:07:35.324000 audit[2361]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:07:35.328567 kernel: kauditd_printk_skb: 357 callbacks suppressed
Oct  2 19:07:35.328649 kernel: audit: type=1325 audit(1696273655.324:1069): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:07:35.328673 kernel: audit: type=1300 audit(1696273655.324:1069): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffded0cdb20 a2=0 a3=7ffded0cdb0c items=0 ppid=2141 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:35.324000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffded0cdb20 a2=0 a3=7ffded0cdb0c items=0 ppid=2141 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:35.324000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:07:35.333550 kernel: audit: type=1327 audit(1696273655.324:1069): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:07:35.325000 audit[2361]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:07:35.335244 kernel: audit: type=1325 audit(1696273655.325:1070): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:07:35.335388 kernel: audit: type=1300 audit(1696273655.325:1070): arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffded0cdb20 a2=0 a3=31030 items=0 ppid=2141 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:35.325000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffded0cdb20 a2=0 a3=31030 items=0 ppid=2141 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:35.325000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:07:35.339935 kernel: audit: type=1327 audit(1696273655.325:1070): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:07:35.337000 audit[2363]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2363 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:07:35.337000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffd2d1aa020 a2=0 a3=7ffd2d1aa00c items=0 ppid=2141 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:35.345260 kernel: audit: type=1325 audit(1696273655.337:1071): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2363 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:07:35.345323 kernel: audit: type=1300 audit(1696273655.337:1071): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffd2d1aa020 a2=0 a3=7ffd2d1aa00c items=0 ppid=2141 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:35.345346 kernel: audit: type=1327 audit(1696273655.337:1071): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:07:35.337000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:07:35.339000 audit[2363]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2363 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:07:35.348529 kernel: audit: type=1325 audit(1696273655.339:1072): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2363 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:07:35.339000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffd2d1aa020 a2=0 a3=31030 items=0 ppid=2141 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:35.339000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:07:35.556645 kubelet[1978]: I1002 19:07:35.556594    1978 topology_manager.go:212] "Topology Admit Handler"
Oct  2 19:07:35.562490 systemd[1]: Created slice kubepods-besteffort-pod59d0df59_b3ff_41a4_a553_b69d37484658.slice.
Oct  2 19:07:35.594118 kubelet[1978]: I1002 19:07:35.593979    1978 topology_manager.go:212] "Topology Admit Handler"
Oct  2 19:07:35.600210 systemd[1]: Created slice kubepods-besteffort-pod3f96e7c1_0234_4789_b96c_c4d49cc029a6.slice.
Oct  2 19:07:35.664433 kubelet[1978]: I1002 19:07:35.664374    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/3f96e7c1-0234-4789-b96c-c4d49cc029a6-var-lib-calico\") pod \"calico-node-66rxx\" (UID: \"3f96e7c1-0234-4789-b96c-c4d49cc029a6\") " pod="calico-system/calico-node-66rxx"
Oct  2 19:07:35.664433 kubelet[1978]: I1002 19:07:35.664431    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/3f96e7c1-0234-4789-b96c-c4d49cc029a6-var-run-calico\") pod \"calico-node-66rxx\" (UID: \"3f96e7c1-0234-4789-b96c-c4d49cc029a6\") " pod="calico-system/calico-node-66rxx"
Oct  2 19:07:35.664433 kubelet[1978]: I1002 19:07:35.664450    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/3f96e7c1-0234-4789-b96c-c4d49cc029a6-lib-modules\") pod \"calico-node-66rxx\" (UID: \"3f96e7c1-0234-4789-b96c-c4d49cc029a6\") " pod="calico-system/calico-node-66rxx"
Oct  2 19:07:35.664737 kubelet[1978]: I1002 19:07:35.664473    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/3f96e7c1-0234-4789-b96c-c4d49cc029a6-node-certs\") pod \"calico-node-66rxx\" (UID: \"3f96e7c1-0234-4789-b96c-c4d49cc029a6\") " pod="calico-system/calico-node-66rxx"
Oct  2 19:07:35.664737 kubelet[1978]: I1002 19:07:35.664495    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4bq56\" (UniqueName: \"kubernetes.io/projected/3f96e7c1-0234-4789-b96c-c4d49cc029a6-kube-api-access-4bq56\") pod \"calico-node-66rxx\" (UID: \"3f96e7c1-0234-4789-b96c-c4d49cc029a6\") " pod="calico-system/calico-node-66rxx"
Oct  2 19:07:35.664737 kubelet[1978]: I1002 19:07:35.664512    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/3f96e7c1-0234-4789-b96c-c4d49cc029a6-flexvol-driver-host\") pod \"calico-node-66rxx\" (UID: \"3f96e7c1-0234-4789-b96c-c4d49cc029a6\") " pod="calico-system/calico-node-66rxx"
Oct  2 19:07:35.664737 kubelet[1978]: I1002 19:07:35.664531    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/59d0df59-b3ff-41a4-a553-b69d37484658-tigera-ca-bundle\") pod \"calico-typha-68ff5b7b94-4ks4r\" (UID: \"59d0df59-b3ff-41a4-a553-b69d37484658\") " pod="calico-system/calico-typha-68ff5b7b94-4ks4r"
Oct  2 19:07:35.664737 kubelet[1978]: I1002 19:07:35.664548    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/3f96e7c1-0234-4789-b96c-c4d49cc029a6-policysync\") pod \"calico-node-66rxx\" (UID: \"3f96e7c1-0234-4789-b96c-c4d49cc029a6\") " pod="calico-system/calico-node-66rxx"
Oct  2 19:07:35.664869 kubelet[1978]: I1002 19:07:35.664567    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/3f96e7c1-0234-4789-b96c-c4d49cc029a6-xtables-lock\") pod \"calico-node-66rxx\" (UID: \"3f96e7c1-0234-4789-b96c-c4d49cc029a6\") " pod="calico-system/calico-node-66rxx"
Oct  2 19:07:35.664869 kubelet[1978]: I1002 19:07:35.664583    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/3f96e7c1-0234-4789-b96c-c4d49cc029a6-cni-log-dir\") pod \"calico-node-66rxx\" (UID: \"3f96e7c1-0234-4789-b96c-c4d49cc029a6\") " pod="calico-system/calico-node-66rxx"
Oct  2 19:07:35.664869 kubelet[1978]: I1002 19:07:35.664601    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/3f96e7c1-0234-4789-b96c-c4d49cc029a6-cni-bin-dir\") pod \"calico-node-66rxx\" (UID: \"3f96e7c1-0234-4789-b96c-c4d49cc029a6\") " pod="calico-system/calico-node-66rxx"
Oct  2 19:07:35.664869 kubelet[1978]: I1002 19:07:35.664622    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/59d0df59-b3ff-41a4-a553-b69d37484658-typha-certs\") pod \"calico-typha-68ff5b7b94-4ks4r\" (UID: \"59d0df59-b3ff-41a4-a553-b69d37484658\") " pod="calico-system/calico-typha-68ff5b7b94-4ks4r"
Oct  2 19:07:35.664869 kubelet[1978]: I1002 19:07:35.664643    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g5l29\" (UniqueName: \"kubernetes.io/projected/59d0df59-b3ff-41a4-a553-b69d37484658-kube-api-access-g5l29\") pod \"calico-typha-68ff5b7b94-4ks4r\" (UID: \"59d0df59-b3ff-41a4-a553-b69d37484658\") " pod="calico-system/calico-typha-68ff5b7b94-4ks4r"
Oct  2 19:07:35.665006 kubelet[1978]: I1002 19:07:35.664675    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3f96e7c1-0234-4789-b96c-c4d49cc029a6-tigera-ca-bundle\") pod \"calico-node-66rxx\" (UID: \"3f96e7c1-0234-4789-b96c-c4d49cc029a6\") " pod="calico-system/calico-node-66rxx"
Oct  2 19:07:35.665006 kubelet[1978]: I1002 19:07:35.664703    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/3f96e7c1-0234-4789-b96c-c4d49cc029a6-cni-net-dir\") pod \"calico-node-66rxx\" (UID: \"3f96e7c1-0234-4789-b96c-c4d49cc029a6\") " pod="calico-system/calico-node-66rxx"
Oct  2 19:07:35.771842 kubelet[1978]: E1002 19:07:35.769659    1978 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:07:35.771842 kubelet[1978]: W1002 19:07:35.769680    1978 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:07:35.771842 kubelet[1978]: E1002 19:07:35.769702    1978 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:07:35.772591 kubelet[1978]: E1002 19:07:35.772571    1978 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:07:35.772682 kubelet[1978]: W1002 19:07:35.772662    1978 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:07:35.772780 kubelet[1978]: E1002 19:07:35.772762    1978 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:07:35.866865 kubelet[1978]: E1002 19:07:35.866726    1978 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:07:35.866865 kubelet[1978]: W1002 19:07:35.866744    1978 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:07:35.866865 kubelet[1978]: E1002 19:07:35.866762    1978 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:07:35.867478 kubelet[1978]: E1002 19:07:35.867453    1978 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:07:35.867618 kubelet[1978]: W1002 19:07:35.867543    1978 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:07:35.867618 kubelet[1978]: E1002 19:07:35.867584    1978 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:07:35.875277 kubelet[1978]: E1002 19:07:35.875219    1978 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:07:35.875277 kubelet[1978]: W1002 19:07:35.875257    1978 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:07:35.875277 kubelet[1978]: E1002 19:07:35.875282    1978 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:07:35.903503 kubelet[1978]: E1002 19:07:35.903456    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:35.904352 env[1104]: time="2023-10-02T19:07:35.904289464Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-66rxx,Uid:3f96e7c1-0234-4789-b96c-c4d49cc029a6,Namespace:calico-system,Attempt:0,}"
Oct  2 19:07:35.969061 kubelet[1978]: E1002 19:07:35.969017    1978 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:07:35.969061 kubelet[1978]: W1002 19:07:35.969042    1978 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:07:35.969061 kubelet[1978]: E1002 19:07:35.969073    1978 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:07:35.989878 kubelet[1978]: E1002 19:07:35.989845    1978 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 19:07:35.989878 kubelet[1978]: W1002 19:07:35.989866    1978 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 19:07:35.989878 kubelet[1978]: E1002 19:07:35.989889    1978 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 19:07:36.102183 env[1104]: time="2023-10-02T19:07:36.102096760Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 19:07:36.102183 env[1104]: time="2023-10-02T19:07:36.102143398Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 19:07:36.102183 env[1104]: time="2023-10-02T19:07:36.102153567Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 19:07:36.102402 env[1104]: time="2023-10-02T19:07:36.102340278Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f7b36ba002382ce6d8da6dae61606e5311e952cb0dd12425def9bd22a4b9dce0 pid=2383 runtime=io.containerd.runc.v2
Oct  2 19:07:36.121877 systemd[1]: Started cri-containerd-f7b36ba002382ce6d8da6dae61606e5311e952cb0dd12425def9bd22a4b9dce0.scope.
Oct  2 19:07:36.139000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.139000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.139000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.139000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.139000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.139000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.139000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.139000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.139000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.139000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.139000 audit: BPF prog-id=127 op=LOAD
Oct  2 19:07:36.142000 audit[2393]: AVC avc:  denied  { bpf } for  pid=2393 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.142000 audit[2393]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2383 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:36.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637623336626130303233383263653664386461366461653631363036
Oct  2 19:07:36.142000 audit[2393]: AVC avc:  denied  { perfmon } for  pid=2393 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.142000 audit[2393]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2383 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:36.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637623336626130303233383263653664386461366461653631363036
Oct  2 19:07:36.142000 audit[2393]: AVC avc:  denied  { bpf } for  pid=2393 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.142000 audit[2393]: AVC avc:  denied  { bpf } for  pid=2393 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.142000 audit[2393]: AVC avc:  denied  { bpf } for  pid=2393 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.142000 audit[2393]: AVC avc:  denied  { perfmon } for  pid=2393 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.142000 audit[2393]: AVC avc:  denied  { perfmon } for  pid=2393 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.142000 audit[2393]: AVC avc:  denied  { perfmon } for  pid=2393 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.142000 audit[2393]: AVC avc:  denied  { perfmon } for  pid=2393 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.142000 audit[2393]: AVC avc:  denied  { perfmon } for  pid=2393 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.142000 audit[2393]: AVC avc:  denied  { bpf } for  pid=2393 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.142000 audit[2393]: AVC avc:  denied  { bpf } for  pid=2393 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.142000 audit: BPF prog-id=128 op=LOAD
Oct  2 19:07:36.142000 audit[2393]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000185aa0 items=0 ppid=2383 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:36.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637623336626130303233383263653664386461366461653631363036
Oct  2 19:07:36.142000 audit[2393]: AVC avc:  denied  { bpf } for  pid=2393 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.142000 audit[2393]: AVC avc:  denied  { bpf } for  pid=2393 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.142000 audit[2393]: AVC avc:  denied  { perfmon } for  pid=2393 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.142000 audit[2393]: AVC avc:  denied  { perfmon } for  pid=2393 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.142000 audit[2393]: AVC avc:  denied  { perfmon } for  pid=2393 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.142000 audit[2393]: AVC avc:  denied  { perfmon } for  pid=2393 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.142000 audit[2393]: AVC avc:  denied  { perfmon } for  pid=2393 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.142000 audit[2393]: AVC avc:  denied  { bpf } for  pid=2393 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.142000 audit[2393]: AVC avc:  denied  { bpf } for  pid=2393 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.142000 audit: BPF prog-id=129 op=LOAD
Oct  2 19:07:36.142000 audit[2393]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000185ae8 items=0 ppid=2383 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:36.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637623336626130303233383263653664386461366461653631363036
Oct  2 19:07:36.142000 audit: BPF prog-id=129 op=UNLOAD
Oct  2 19:07:36.142000 audit: BPF prog-id=128 op=UNLOAD
Oct  2 19:07:36.142000 audit[2393]: AVC avc:  denied  { bpf } for  pid=2393 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.142000 audit[2393]: AVC avc:  denied  { bpf } for  pid=2393 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.142000 audit[2393]: AVC avc:  denied  { bpf } for  pid=2393 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.142000 audit[2393]: AVC avc:  denied  { perfmon } for  pid=2393 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.142000 audit[2393]: AVC avc:  denied  { perfmon } for  pid=2393 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.142000 audit[2393]: AVC avc:  denied  { perfmon } for  pid=2393 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.142000 audit[2393]: AVC avc:  denied  { perfmon } for  pid=2393 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.142000 audit[2393]: AVC avc:  denied  { perfmon } for  pid=2393 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.142000 audit[2393]: AVC avc:  denied  { bpf } for  pid=2393 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.142000 audit[2393]: AVC avc:  denied  { bpf } for  pid=2393 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.142000 audit: BPF prog-id=130 op=LOAD
Oct  2 19:07:36.142000 audit[2393]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000185ef8 items=0 ppid=2383 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:36.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637623336626130303233383263653664386461366461653631363036
Oct  2 19:07:36.161498 env[1104]: time="2023-10-02T19:07:36.160369782Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-66rxx,Uid:3f96e7c1-0234-4789-b96c-c4d49cc029a6,Namespace:calico-system,Attempt:0,} returns sandbox id \"f7b36ba002382ce6d8da6dae61606e5311e952cb0dd12425def9bd22a4b9dce0\""
Oct  2 19:07:36.161647 kubelet[1978]: E1002 19:07:36.161300    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:36.162998 env[1104]: time="2023-10-02T19:07:36.162960127Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\""
Oct  2 19:07:36.168215 kubelet[1978]: E1002 19:07:36.168182    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:36.168680 env[1104]: time="2023-10-02T19:07:36.168647610Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-68ff5b7b94-4ks4r,Uid:59d0df59-b3ff-41a4-a553-b69d37484658,Namespace:calico-system,Attempt:0,}"
Oct  2 19:07:36.351000 audit[2416]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2416 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:07:36.351000 audit[2416]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffd442e9390 a2=0 a3=7ffd442e937c items=0 ppid=2141 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:36.351000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:07:36.352000 audit[2416]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2416 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:07:36.352000 audit[2416]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffd442e9390 a2=0 a3=31030 items=0 ppid=2141 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:36.352000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:07:36.447999 env[1104]: time="2023-10-02T19:07:36.447901969Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 19:07:36.447999 env[1104]: time="2023-10-02T19:07:36.447959317Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 19:07:36.447999 env[1104]: time="2023-10-02T19:07:36.447992450Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 19:07:36.448258 env[1104]: time="2023-10-02T19:07:36.448190172Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6a18cbe32f46e4e9d5e4540b76ce23d4b6036586637790f5771dd78f70994cfa pid=2425 runtime=io.containerd.runc.v2
Oct  2 19:07:36.460404 systemd[1]: Started cri-containerd-6a18cbe32f46e4e9d5e4540b76ce23d4b6036586637790f5771dd78f70994cfa.scope.
Oct  2 19:07:36.475000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.475000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.475000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.475000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.475000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.475000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.475000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.475000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.475000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.475000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.475000 audit: BPF prog-id=131 op=LOAD
Oct  2 19:07:36.476000 audit[2433]: AVC avc:  denied  { bpf } for  pid=2433 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.476000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2425 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:36.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661313863626533326634366534653964356534353430623736636532
Oct  2 19:07:36.476000 audit[2433]: AVC avc:  denied  { perfmon } for  pid=2433 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.476000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2425 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:36.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661313863626533326634366534653964356534353430623736636532
Oct  2 19:07:36.476000 audit[2433]: AVC avc:  denied  { bpf } for  pid=2433 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.476000 audit[2433]: AVC avc:  denied  { bpf } for  pid=2433 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.476000 audit[2433]: AVC avc:  denied  { bpf } for  pid=2433 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.476000 audit[2433]: AVC avc:  denied  { perfmon } for  pid=2433 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.476000 audit[2433]: AVC avc:  denied  { perfmon } for  pid=2433 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.476000 audit[2433]: AVC avc:  denied  { perfmon } for  pid=2433 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.476000 audit[2433]: AVC avc:  denied  { perfmon } for  pid=2433 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.476000 audit[2433]: AVC avc:  denied  { perfmon } for  pid=2433 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.476000 audit[2433]: AVC avc:  denied  { bpf } for  pid=2433 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.476000 audit[2433]: AVC avc:  denied  { bpf } for  pid=2433 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.476000 audit: BPF prog-id=132 op=LOAD
Oct  2 19:07:36.476000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000024c80 items=0 ppid=2425 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:36.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661313863626533326634366534653964356534353430623736636532
Oct  2 19:07:36.476000 audit[2433]: AVC avc:  denied  { bpf } for  pid=2433 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.476000 audit[2433]: AVC avc:  denied  { bpf } for  pid=2433 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.476000 audit[2433]: AVC avc:  denied  { perfmon } for  pid=2433 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.476000 audit[2433]: AVC avc:  denied  { perfmon } for  pid=2433 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.476000 audit[2433]: AVC avc:  denied  { perfmon } for  pid=2433 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.476000 audit[2433]: AVC avc:  denied  { perfmon } for  pid=2433 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.476000 audit[2433]: AVC avc:  denied  { perfmon } for  pid=2433 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.476000 audit[2433]: AVC avc:  denied  { bpf } for  pid=2433 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.476000 audit[2433]: AVC avc:  denied  { bpf } for  pid=2433 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.476000 audit: BPF prog-id=133 op=LOAD
Oct  2 19:07:36.476000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000024cc8 items=0 ppid=2425 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:36.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661313863626533326634366534653964356534353430623736636532
Oct  2 19:07:36.476000 audit: BPF prog-id=133 op=UNLOAD
Oct  2 19:07:36.476000 audit: BPF prog-id=132 op=UNLOAD
Oct  2 19:07:36.476000 audit[2433]: AVC avc:  denied  { bpf } for  pid=2433 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.476000 audit[2433]: AVC avc:  denied  { bpf } for  pid=2433 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.476000 audit[2433]: AVC avc:  denied  { bpf } for  pid=2433 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.476000 audit[2433]: AVC avc:  denied  { perfmon } for  pid=2433 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.476000 audit[2433]: AVC avc:  denied  { perfmon } for  pid=2433 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.476000 audit[2433]: AVC avc:  denied  { perfmon } for  pid=2433 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.476000 audit[2433]: AVC avc:  denied  { perfmon } for  pid=2433 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.476000 audit[2433]: AVC avc:  denied  { perfmon } for  pid=2433 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.476000 audit[2433]: AVC avc:  denied  { bpf } for  pid=2433 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.476000 audit[2433]: AVC avc:  denied  { bpf } for  pid=2433 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:36.476000 audit: BPF prog-id=134 op=LOAD
Oct  2 19:07:36.476000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000250d8 items=0 ppid=2425 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:36.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661313863626533326634366534653964356534353430623736636532
Oct  2 19:07:36.504898 env[1104]: time="2023-10-02T19:07:36.504839894Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-68ff5b7b94-4ks4r,Uid:59d0df59-b3ff-41a4-a553-b69d37484658,Namespace:calico-system,Attempt:0,} returns sandbox id \"6a18cbe32f46e4e9d5e4540b76ce23d4b6036586637790f5771dd78f70994cfa\""
Oct  2 19:07:36.505650 kubelet[1978]: E1002 19:07:36.505585    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:39.490168 env[1104]: time="2023-10-02T19:07:39.490092412Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:39.492383 env[1104]: time="2023-10-02T19:07:39.492345506Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:39.494693 env[1104]: time="2023-10-02T19:07:39.494654586Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:39.496707 env[1104]: time="2023-10-02T19:07:39.496676024Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:39.497583 env[1104]: time="2023-10-02T19:07:39.497553246Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72\""
Oct  2 19:07:39.498372 env[1104]: time="2023-10-02T19:07:39.498159127Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\""
Oct  2 19:07:39.499670 env[1104]: time="2023-10-02T19:07:39.499623687Z" level=info msg="CreateContainer within sandbox \"f7b36ba002382ce6d8da6dae61606e5311e952cb0dd12425def9bd22a4b9dce0\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}"
Oct  2 19:07:39.512404 env[1104]: time="2023-10-02T19:07:39.512345873Z" level=info msg="CreateContainer within sandbox \"f7b36ba002382ce6d8da6dae61606e5311e952cb0dd12425def9bd22a4b9dce0\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"5e35044b95a7e73b6b22df61fba908ee4bf1578a297b3275adf289f8026a7d82\""
Oct  2 19:07:39.512967 env[1104]: time="2023-10-02T19:07:39.512938228Z" level=info msg="StartContainer for \"5e35044b95a7e73b6b22df61fba908ee4bf1578a297b3275adf289f8026a7d82\""
Oct  2 19:07:39.540240 systemd[1]: Started cri-containerd-5e35044b95a7e73b6b22df61fba908ee4bf1578a297b3275adf289f8026a7d82.scope.
Oct  2 19:07:39.551000 audit[2468]: AVC avc:  denied  { perfmon } for  pid=2468 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:39.551000 audit[2468]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=2383 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:39.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565333530343462393561376537336236623232646636316662613930
Oct  2 19:07:39.551000 audit[2468]: AVC avc:  denied  { bpf } for  pid=2468 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:39.551000 audit[2468]: AVC avc:  denied  { bpf } for  pid=2468 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:39.551000 audit[2468]: AVC avc:  denied  { bpf } for  pid=2468 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:39.551000 audit[2468]: AVC avc:  denied  { perfmon } for  pid=2468 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:39.551000 audit[2468]: AVC avc:  denied  { perfmon } for  pid=2468 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:39.551000 audit[2468]: AVC avc:  denied  { perfmon } for  pid=2468 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:39.551000 audit[2468]: AVC avc:  denied  { perfmon } for  pid=2468 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:39.551000 audit[2468]: AVC avc:  denied  { perfmon } for  pid=2468 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:39.551000 audit[2468]: AVC avc:  denied  { bpf } for  pid=2468 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:39.551000 audit[2468]: AVC avc:  denied  { bpf } for  pid=2468 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:39.551000 audit: BPF prog-id=135 op=LOAD
Oct  2 19:07:39.551000 audit[2468]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c00029ad80 items=0 ppid=2383 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:39.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565333530343462393561376537336236623232646636316662613930
Oct  2 19:07:39.552000 audit[2468]: AVC avc:  denied  { bpf } for  pid=2468 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:39.552000 audit[2468]: AVC avc:  denied  { bpf } for  pid=2468 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:39.552000 audit[2468]: AVC avc:  denied  { perfmon } for  pid=2468 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:39.552000 audit[2468]: AVC avc:  denied  { perfmon } for  pid=2468 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:39.552000 audit[2468]: AVC avc:  denied  { perfmon } for  pid=2468 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:39.552000 audit[2468]: AVC avc:  denied  { perfmon } for  pid=2468 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:39.552000 audit[2468]: AVC avc:  denied  { perfmon } for  pid=2468 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:39.552000 audit[2468]: AVC avc:  denied  { bpf } for  pid=2468 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:39.552000 audit[2468]: AVC avc:  denied  { bpf } for  pid=2468 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:39.552000 audit: BPF prog-id=136 op=LOAD
Oct  2 19:07:39.552000 audit[2468]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c00029adc8 items=0 ppid=2383 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:39.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565333530343462393561376537336236623232646636316662613930
Oct  2 19:07:39.552000 audit: BPF prog-id=136 op=UNLOAD
Oct  2 19:07:39.552000 audit: BPF prog-id=135 op=UNLOAD
Oct  2 19:07:39.552000 audit[2468]: AVC avc:  denied  { bpf } for  pid=2468 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:39.552000 audit[2468]: AVC avc:  denied  { bpf } for  pid=2468 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:39.552000 audit[2468]: AVC avc:  denied  { bpf } for  pid=2468 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:39.552000 audit[2468]: AVC avc:  denied  { perfmon } for  pid=2468 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:39.552000 audit[2468]: AVC avc:  denied  { perfmon } for  pid=2468 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:39.552000 audit[2468]: AVC avc:  denied  { perfmon } for  pid=2468 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:39.552000 audit[2468]: AVC avc:  denied  { perfmon } for  pid=2468 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:39.552000 audit[2468]: AVC avc:  denied  { perfmon } for  pid=2468 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:39.552000 audit[2468]: AVC avc:  denied  { bpf } for  pid=2468 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:39.552000 audit[2468]: AVC avc:  denied  { bpf } for  pid=2468 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:39.552000 audit: BPF prog-id=137 op=LOAD
Oct  2 19:07:39.552000 audit[2468]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c00029ae58 items=0 ppid=2383 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:39.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565333530343462393561376537336236623232646636316662613930
Oct  2 19:07:39.576859 systemd[1]: cri-containerd-5e35044b95a7e73b6b22df61fba908ee4bf1578a297b3275adf289f8026a7d82.scope: Deactivated successfully.
Oct  2 19:07:39.582000 audit: BPF prog-id=137 op=UNLOAD
Oct  2 19:07:39.592159 env[1104]: time="2023-10-02T19:07:39.592100341Z" level=info msg="StartContainer for \"5e35044b95a7e73b6b22df61fba908ee4bf1578a297b3275adf289f8026a7d82\" returns successfully"
Oct  2 19:07:39.608490 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5e35044b95a7e73b6b22df61fba908ee4bf1578a297b3275adf289f8026a7d82-rootfs.mount: Deactivated successfully.
Oct  2 19:07:39.624562 env[1104]: time="2023-10-02T19:07:39.624501537Z" level=info msg="shim disconnected" id=5e35044b95a7e73b6b22df61fba908ee4bf1578a297b3275adf289f8026a7d82
Oct  2 19:07:39.624562 env[1104]: time="2023-10-02T19:07:39.624561450Z" level=warning msg="cleaning up after shim disconnected" id=5e35044b95a7e73b6b22df61fba908ee4bf1578a297b3275adf289f8026a7d82 namespace=k8s.io
Oct  2 19:07:39.624562 env[1104]: time="2023-10-02T19:07:39.624580336Z" level=info msg="cleaning up dead shim"
Oct  2 19:07:39.632258 env[1104]: time="2023-10-02T19:07:39.632202123Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:07:39Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2506 runtime=io.containerd.runc.v2\n"
Oct  2 19:07:40.184859 kubelet[1978]: E1002 19:07:40.184826    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:40.877875 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3352857332.mount: Deactivated successfully.
Oct  2 19:07:43.699069 env[1104]: time="2023-10-02T19:07:43.697957861Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:43.700068 env[1104]: time="2023-10-02T19:07:43.700016465Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:43.702128 env[1104]: time="2023-10-02T19:07:43.702085870Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:43.704412 env[1104]: time="2023-10-02T19:07:43.704381710Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:7fb0e011ffae9f88333b7a7488dae37f1d534b46d2b11a0fe2b5d129df58789c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:43.705205 env[1104]: time="2023-10-02T19:07:43.705167549Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\" returns image reference \"sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f\""
Oct  2 19:07:43.705957 env[1104]: time="2023-10-02T19:07:43.705914555Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\""
Oct  2 19:07:43.707328 env[1104]: time="2023-10-02T19:07:43.707297948Z" level=info msg="CreateContainer within sandbox \"6a18cbe32f46e4e9d5e4540b76ce23d4b6036586637790f5771dd78f70994cfa\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}"
Oct  2 19:07:43.718413 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3560187285.mount: Deactivated successfully.
Oct  2 19:07:43.721873 env[1104]: time="2023-10-02T19:07:43.721816922Z" level=info msg="CreateContainer within sandbox \"6a18cbe32f46e4e9d5e4540b76ce23d4b6036586637790f5771dd78f70994cfa\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"2a5e302f581594656934b8fccb747050972606fd63012d8318ac6c3be50fb02c\""
Oct  2 19:07:43.722451 env[1104]: time="2023-10-02T19:07:43.722427360Z" level=info msg="StartContainer for \"2a5e302f581594656934b8fccb747050972606fd63012d8318ac6c3be50fb02c\""
Oct  2 19:07:43.746328 systemd[1]: Started cri-containerd-2a5e302f581594656934b8fccb747050972606fd63012d8318ac6c3be50fb02c.scope.
Oct  2 19:07:43.756000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.760603 kernel: kauditd_printk_skb: 166 callbacks suppressed
Oct  2 19:07:43.760690 kernel: audit: type=1400 audit(1696273663.756:1118): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.760723 kernel: audit: type=1400 audit(1696273663.756:1119): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.756000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.759000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.765004 kernel: audit: type=1400 audit(1696273663.759:1120): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.765065 kernel: audit: type=1400 audit(1696273663.759:1121): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.759000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.759000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.769288 kernel: audit: type=1400 audit(1696273663.759:1122): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.769350 kernel: audit: type=1400 audit(1696273663.759:1123): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.759000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.759000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.773426 kernel: audit: type=1400 audit(1696273663.759:1124): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.773489 kernel: audit: type=1400 audit(1696273663.759:1125): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.759000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.759000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.777949 kernel: audit: type=1400 audit(1696273663.759:1126): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.778024 kernel: audit: type=1400 audit(1696273663.761:1127): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.761000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.761000 audit: BPF prog-id=138 op=LOAD
Oct  2 19:07:43.762000 audit[2531]: AVC avc:  denied  { bpf } for  pid=2531 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.762000 audit[2531]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2425 pid=2531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:43.762000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261356533303266353831353934363536393334623866636362373437
Oct  2 19:07:43.762000 audit[2531]: AVC avc:  denied  { perfmon } for  pid=2531 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.762000 audit[2531]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2425 pid=2531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:43.762000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261356533303266353831353934363536393334623866636362373437
Oct  2 19:07:43.762000 audit[2531]: AVC avc:  denied  { bpf } for  pid=2531 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.762000 audit[2531]: AVC avc:  denied  { bpf } for  pid=2531 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.762000 audit[2531]: AVC avc:  denied  { bpf } for  pid=2531 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.762000 audit[2531]: AVC avc:  denied  { perfmon } for  pid=2531 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.762000 audit[2531]: AVC avc:  denied  { perfmon } for  pid=2531 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.762000 audit[2531]: AVC avc:  denied  { perfmon } for  pid=2531 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.762000 audit[2531]: AVC avc:  denied  { perfmon } for  pid=2531 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.762000 audit[2531]: AVC avc:  denied  { perfmon } for  pid=2531 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.762000 audit[2531]: AVC avc:  denied  { bpf } for  pid=2531 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.762000 audit[2531]: AVC avc:  denied  { bpf } for  pid=2531 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.762000 audit: BPF prog-id=139 op=LOAD
Oct  2 19:07:43.762000 audit[2531]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003b8370 items=0 ppid=2425 pid=2531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:43.762000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261356533303266353831353934363536393334623866636362373437
Oct  2 19:07:43.763000 audit[2531]: AVC avc:  denied  { bpf } for  pid=2531 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.763000 audit[2531]: AVC avc:  denied  { bpf } for  pid=2531 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.763000 audit[2531]: AVC avc:  denied  { perfmon } for  pid=2531 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.763000 audit[2531]: AVC avc:  denied  { perfmon } for  pid=2531 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.763000 audit[2531]: AVC avc:  denied  { perfmon } for  pid=2531 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.763000 audit[2531]: AVC avc:  denied  { perfmon } for  pid=2531 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.763000 audit[2531]: AVC avc:  denied  { perfmon } for  pid=2531 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.763000 audit[2531]: AVC avc:  denied  { bpf } for  pid=2531 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.763000 audit[2531]: AVC avc:  denied  { bpf } for  pid=2531 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.763000 audit: BPF prog-id=140 op=LOAD
Oct  2 19:07:43.763000 audit[2531]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003b83b8 items=0 ppid=2425 pid=2531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:43.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261356533303266353831353934363536393334623866636362373437
Oct  2 19:07:43.768000 audit: BPF prog-id=140 op=UNLOAD
Oct  2 19:07:43.768000 audit: BPF prog-id=139 op=UNLOAD
Oct  2 19:07:43.768000 audit[2531]: AVC avc:  denied  { bpf } for  pid=2531 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.768000 audit[2531]: AVC avc:  denied  { bpf } for  pid=2531 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.768000 audit[2531]: AVC avc:  denied  { bpf } for  pid=2531 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.768000 audit[2531]: AVC avc:  denied  { perfmon } for  pid=2531 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.768000 audit[2531]: AVC avc:  denied  { perfmon } for  pid=2531 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.768000 audit[2531]: AVC avc:  denied  { perfmon } for  pid=2531 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.768000 audit[2531]: AVC avc:  denied  { perfmon } for  pid=2531 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.768000 audit[2531]: AVC avc:  denied  { perfmon } for  pid=2531 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.768000 audit[2531]: AVC avc:  denied  { bpf } for  pid=2531 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.768000 audit[2531]: AVC avc:  denied  { bpf } for  pid=2531 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:43.768000 audit: BPF prog-id=141 op=LOAD
Oct  2 19:07:43.768000 audit[2531]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003b87c8 items=0 ppid=2425 pid=2531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:43.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261356533303266353831353934363536393334623866636362373437
Oct  2 19:07:43.850287 env[1104]: time="2023-10-02T19:07:43.850207654Z" level=info msg="StartContainer for \"2a5e302f581594656934b8fccb747050972606fd63012d8318ac6c3be50fb02c\" returns successfully"
Oct  2 19:07:44.196031 kubelet[1978]: E1002 19:07:44.196001    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:44.208711 kubelet[1978]: I1002 19:07:44.208658    1978 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-68ff5b7b94-4ks4r" podStartSLOduration=2.009400907 podCreationTimestamp="2023-10-02 19:07:35 +0000 UTC" firstStartedPulling="2023-10-02 19:07:36.50632264 +0000 UTC m=+23.478841482" lastFinishedPulling="2023-10-02 19:07:43.705543907 +0000 UTC m=+30.678062749" observedRunningTime="2023-10-02 19:07:44.208294698 +0000 UTC m=+31.180813550" watchObservedRunningTime="2023-10-02 19:07:44.208622174 +0000 UTC m=+31.181141016"
Oct  2 19:07:44.236000 audit[2566]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=2566 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:07:44.236000 audit[2566]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffea7ce21e0 a2=0 a3=7ffea7ce21cc items=0 ppid=2141 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:44.236000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:07:44.236000 audit[2566]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2566 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:07:44.236000 audit[2566]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffea7ce21e0 a2=0 a3=7ffea7ce21cc items=0 ppid=2141 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:44.236000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:07:45.102811 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount244581519.mount: Deactivated successfully.
Oct  2 19:07:45.198366 kubelet[1978]: E1002 19:07:45.198335    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:46.199844 kubelet[1978]: E1002 19:07:46.199796    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:48.155061 env[1104]: time="2023-10-02T19:07:48.154989736Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:48.156965 env[1104]: time="2023-10-02T19:07:48.156895810Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:48.159494 env[1104]: time="2023-10-02T19:07:48.159430856Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:48.161326 env[1104]: time="2023-10-02T19:07:48.161262581Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:07:48.162344 env[1104]: time="2023-10-02T19:07:48.162304780Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7\""
Oct  2 19:07:48.164338 env[1104]: time="2023-10-02T19:07:48.164292237Z" level=info msg="CreateContainer within sandbox \"f7b36ba002382ce6d8da6dae61606e5311e952cb0dd12425def9bd22a4b9dce0\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}"
Oct  2 19:07:48.178785 env[1104]: time="2023-10-02T19:07:48.178723421Z" level=info msg="CreateContainer within sandbox \"f7b36ba002382ce6d8da6dae61606e5311e952cb0dd12425def9bd22a4b9dce0\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"544b1b1027467dbd83038748f881f931ec444653c8c5fa2e9e7e029e90342313\""
Oct  2 19:07:48.179314 env[1104]: time="2023-10-02T19:07:48.179268726Z" level=info msg="StartContainer for \"544b1b1027467dbd83038748f881f931ec444653c8c5fa2e9e7e029e90342313\""
Oct  2 19:07:48.200842 systemd[1]: Started cri-containerd-544b1b1027467dbd83038748f881f931ec444653c8c5fa2e9e7e029e90342313.scope.
Oct  2 19:07:48.217000 audit[2574]: AVC avc:  denied  { perfmon } for  pid=2574 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:48.217000 audit[2574]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2383 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:48.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534346231623130323734363764626438333033383734386638383166
Oct  2 19:07:48.217000 audit[2574]: AVC avc:  denied  { bpf } for  pid=2574 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:48.217000 audit[2574]: AVC avc:  denied  { bpf } for  pid=2574 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:48.217000 audit[2574]: AVC avc:  denied  { bpf } for  pid=2574 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:48.217000 audit[2574]: AVC avc:  denied  { perfmon } for  pid=2574 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:48.217000 audit[2574]: AVC avc:  denied  { perfmon } for  pid=2574 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:48.217000 audit[2574]: AVC avc:  denied  { perfmon } for  pid=2574 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:48.217000 audit[2574]: AVC avc:  denied  { perfmon } for  pid=2574 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:48.217000 audit[2574]: AVC avc:  denied  { perfmon } for  pid=2574 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:48.217000 audit[2574]: AVC avc:  denied  { bpf } for  pid=2574 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:48.217000 audit[2574]: AVC avc:  denied  { bpf } for  pid=2574 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:48.217000 audit: BPF prog-id=142 op=LOAD
Oct  2 19:07:48.217000 audit[2574]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000b8f90 items=0 ppid=2383 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:48.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534346231623130323734363764626438333033383734386638383166
Oct  2 19:07:48.217000 audit[2574]: AVC avc:  denied  { bpf } for  pid=2574 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:48.217000 audit[2574]: AVC avc:  denied  { bpf } for  pid=2574 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:48.217000 audit[2574]: AVC avc:  denied  { perfmon } for  pid=2574 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:48.217000 audit[2574]: AVC avc:  denied  { perfmon } for  pid=2574 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:48.217000 audit[2574]: AVC avc:  denied  { perfmon } for  pid=2574 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:48.217000 audit[2574]: AVC avc:  denied  { perfmon } for  pid=2574 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:48.217000 audit[2574]: AVC avc:  denied  { perfmon } for  pid=2574 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:48.217000 audit[2574]: AVC avc:  denied  { bpf } for  pid=2574 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:48.217000 audit[2574]: AVC avc:  denied  { bpf } for  pid=2574 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:48.217000 audit: BPF prog-id=143 op=LOAD
Oct  2 19:07:48.217000 audit[2574]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000b8fd8 items=0 ppid=2383 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:48.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534346231623130323734363764626438333033383734386638383166
Oct  2 19:07:48.217000 audit: BPF prog-id=143 op=UNLOAD
Oct  2 19:07:48.217000 audit: BPF prog-id=142 op=UNLOAD
Oct  2 19:07:48.218000 audit[2574]: AVC avc:  denied  { bpf } for  pid=2574 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:48.218000 audit[2574]: AVC avc:  denied  { bpf } for  pid=2574 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:48.218000 audit[2574]: AVC avc:  denied  { bpf } for  pid=2574 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:48.218000 audit[2574]: AVC avc:  denied  { perfmon } for  pid=2574 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:48.218000 audit[2574]: AVC avc:  denied  { perfmon } for  pid=2574 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:48.218000 audit[2574]: AVC avc:  denied  { perfmon } for  pid=2574 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:48.218000 audit[2574]: AVC avc:  denied  { perfmon } for  pid=2574 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:48.218000 audit[2574]: AVC avc:  denied  { perfmon } for  pid=2574 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:48.218000 audit[2574]: AVC avc:  denied  { bpf } for  pid=2574 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:48.218000 audit[2574]: AVC avc:  denied  { bpf } for  pid=2574 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:07:48.218000 audit: BPF prog-id=144 op=LOAD
Oct  2 19:07:48.218000 audit[2574]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000b9068 items=0 ppid=2383 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:48.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534346231623130323734363764626438333033383734386638383166
Oct  2 19:07:48.236394 env[1104]: time="2023-10-02T19:07:48.236344721Z" level=info msg="StartContainer for \"544b1b1027467dbd83038748f881f931ec444653c8c5fa2e9e7e029e90342313\" returns successfully"
Oct  2 19:07:49.208038 kubelet[1978]: E1002 19:07:49.207990    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:49.307832 systemd[1]: cri-containerd-544b1b1027467dbd83038748f881f931ec444653c8c5fa2e9e7e029e90342313.scope: Deactivated successfully.
Oct  2 19:07:49.314747 kernel: kauditd_printk_skb: 96 callbacks suppressed
Oct  2 19:07:49.314902 kernel: audit: type=1334 audit(1696273669.312:1144): prog-id=144 op=UNLOAD
Oct  2 19:07:49.312000 audit: BPF prog-id=144 op=UNLOAD
Oct  2 19:07:49.326851 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-544b1b1027467dbd83038748f881f931ec444653c8c5fa2e9e7e029e90342313-rootfs.mount: Deactivated successfully.
Oct  2 19:07:49.330082 env[1104]: time="2023-10-02T19:07:49.330032189Z" level=info msg="shim disconnected" id=544b1b1027467dbd83038748f881f931ec444653c8c5fa2e9e7e029e90342313
Oct  2 19:07:49.330363 env[1104]: time="2023-10-02T19:07:49.330087282Z" level=warning msg="cleaning up after shim disconnected" id=544b1b1027467dbd83038748f881f931ec444653c8c5fa2e9e7e029e90342313 namespace=k8s.io
Oct  2 19:07:49.330363 env[1104]: time="2023-10-02T19:07:49.330096409Z" level=info msg="cleaning up dead shim"
Oct  2 19:07:49.337301 env[1104]: time="2023-10-02T19:07:49.337265577Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:07:49Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2622 runtime=io.containerd.runc.v2\n"
Oct  2 19:07:49.342526 kubelet[1978]: I1002 19:07:49.342493    1978 kubelet_node_status.go:493] "Fast updating node status as it just became ready"
Oct  2 19:07:49.360480 kubelet[1978]: I1002 19:07:49.360418    1978 topology_manager.go:212] "Topology Admit Handler"
Oct  2 19:07:49.364939 kubelet[1978]: I1002 19:07:49.364890    1978 topology_manager.go:212] "Topology Admit Handler"
Oct  2 19:07:49.366060 systemd[1]: Created slice kubepods-burstable-pode901c2bb_1cd6_4e03_9551_a9853ecda2d5.slice.
Oct  2 19:07:49.368301 kubelet[1978]: I1002 19:07:49.368271    1978 topology_manager.go:212] "Topology Admit Handler"
Oct  2 19:07:49.371780 systemd[1]: Created slice kubepods-besteffort-poda3345632_ea98_4598_a37e_30c3bad83cdd.slice.
Oct  2 19:07:49.373793 kubelet[1978]: I1002 19:07:49.373383    1978 topology_manager.go:212] "Topology Admit Handler"
Oct  2 19:07:49.376466 systemd[1]: Created slice kubepods-burstable-pod45dbd647_0143_42f4_92f9_e54c68348a9c.slice.
Oct  2 19:07:49.383126 systemd[1]: Created slice kubepods-besteffort-pod2bce08ea_b764_40b2_b139_323c1778a319.slice.
Oct  2 19:07:49.460530 kubelet[1978]: I1002 19:07:49.460374    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/2bce08ea-b764-40b2-b139-323c1778a319-kubelet-dir\") pod \"csi-node-driver-v789s\" (UID: \"2bce08ea-b764-40b2-b139-323c1778a319\") " pod="calico-system/csi-node-driver-v789s"
Oct  2 19:07:49.460530 kubelet[1978]: I1002 19:07:49.460425    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/2bce08ea-b764-40b2-b139-323c1778a319-socket-dir\") pod \"csi-node-driver-v789s\" (UID: \"2bce08ea-b764-40b2-b139-323c1778a319\") " pod="calico-system/csi-node-driver-v789s"
Oct  2 19:07:49.460530 kubelet[1978]: I1002 19:07:49.460452    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xwklt\" (UniqueName: \"kubernetes.io/projected/a3345632-ea98-4598-a37e-30c3bad83cdd-kube-api-access-xwklt\") pod \"calico-kube-controllers-7bd445fdb4-mjchx\" (UID: \"a3345632-ea98-4598-a37e-30c3bad83cdd\") " pod="calico-system/calico-kube-controllers-7bd445fdb4-mjchx"
Oct  2 19:07:49.460530 kubelet[1978]: I1002 19:07:49.460474    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/e901c2bb-1cd6-4e03-9551-a9853ecda2d5-config-volume\") pod \"coredns-5d78c9869d-szml2\" (UID: \"e901c2bb-1cd6-4e03-9551-a9853ecda2d5\") " pod="kube-system/coredns-5d78c9869d-szml2"
Oct  2 19:07:49.460530 kubelet[1978]: I1002 19:07:49.460514    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/2bce08ea-b764-40b2-b139-323c1778a319-etccalico\") pod \"csi-node-driver-v789s\" (UID: \"2bce08ea-b764-40b2-b139-323c1778a319\") " pod="calico-system/csi-node-driver-v789s"
Oct  2 19:07:49.460863 kubelet[1978]: I1002 19:07:49.460537    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nt5nn\" (UniqueName: \"kubernetes.io/projected/e901c2bb-1cd6-4e03-9551-a9853ecda2d5-kube-api-access-nt5nn\") pod \"coredns-5d78c9869d-szml2\" (UID: \"e901c2bb-1cd6-4e03-9551-a9853ecda2d5\") " pod="kube-system/coredns-5d78c9869d-szml2"
Oct  2 19:07:49.460863 kubelet[1978]: I1002 19:07:49.460557    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/2bce08ea-b764-40b2-b139-323c1778a319-varrun\") pod \"csi-node-driver-v789s\" (UID: \"2bce08ea-b764-40b2-b139-323c1778a319\") " pod="calico-system/csi-node-driver-v789s"
Oct  2 19:07:49.460863 kubelet[1978]: I1002 19:07:49.460574    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/45dbd647-0143-42f4-92f9-e54c68348a9c-config-volume\") pod \"coredns-5d78c9869d-8pvzx\" (UID: \"45dbd647-0143-42f4-92f9-e54c68348a9c\") " pod="kube-system/coredns-5d78c9869d-8pvzx"
Oct  2 19:07:49.460863 kubelet[1978]: I1002 19:07:49.460597    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mk7r4\" (UniqueName: \"kubernetes.io/projected/45dbd647-0143-42f4-92f9-e54c68348a9c-kube-api-access-mk7r4\") pod \"coredns-5d78c9869d-8pvzx\" (UID: \"45dbd647-0143-42f4-92f9-e54c68348a9c\") " pod="kube-system/coredns-5d78c9869d-8pvzx"
Oct  2 19:07:49.460863 kubelet[1978]: I1002 19:07:49.460615    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/2bce08ea-b764-40b2-b139-323c1778a319-registration-dir\") pod \"csi-node-driver-v789s\" (UID: \"2bce08ea-b764-40b2-b139-323c1778a319\") " pod="calico-system/csi-node-driver-v789s"
Oct  2 19:07:49.461031 kubelet[1978]: I1002 19:07:49.460694    1978 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7stcj\" (UniqueName: \"kubernetes.io/projected/2bce08ea-b764-40b2-b139-323c1778a319-kube-api-access-7stcj\") pod \"csi-node-driver-v789s\" (UID: \"2bce08ea-b764-40b2-b139-323c1778a319\") " pod="calico-system/csi-node-driver-v789s"
Oct  2 19:07:49.669466 kubelet[1978]: E1002 19:07:49.669409    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:49.670260 env[1104]: time="2023-10-02T19:07:49.670174554Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-szml2,Uid:e901c2bb-1cd6-4e03-9551-a9853ecda2d5,Namespace:kube-system,Attempt:0,}"
Oct  2 19:07:49.675915 env[1104]: time="2023-10-02T19:07:49.675840706Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bd445fdb4-mjchx,Uid:a3345632-ea98-4598-a37e-30c3bad83cdd,Namespace:calico-system,Attempt:0,}"
Oct  2 19:07:49.680266 kubelet[1978]: E1002 19:07:49.680239    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:49.680744 env[1104]: time="2023-10-02T19:07:49.680706724Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-8pvzx,Uid:45dbd647-0143-42f4-92f9-e54c68348a9c,Namespace:kube-system,Attempt:0,}"
Oct  2 19:07:49.686660 env[1104]: time="2023-10-02T19:07:49.686628276Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-v789s,Uid:2bce08ea-b764-40b2-b139-323c1778a319,Namespace:calico-system,Attempt:0,}"
Oct  2 19:07:49.756902 env[1104]: time="2023-10-02T19:07:49.756724723Z" level=error msg="Failed to destroy network for sandbox \"503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:07:49.757146 env[1104]: time="2023-10-02T19:07:49.757100139Z" level=error msg="encountered an error cleaning up failed sandbox \"503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:07:49.757197 env[1104]: time="2023-10-02T19:07:49.757154531Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-szml2,Uid:e901c2bb-1cd6-4e03-9551-a9853ecda2d5,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:07:49.757843 kubelet[1978]: E1002 19:07:49.757525    1978 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:07:49.757843 kubelet[1978]: E1002 19:07:49.757594    1978 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-szml2"
Oct  2 19:07:49.757843 kubelet[1978]: E1002 19:07:49.757629    1978 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-szml2"
Oct  2 19:07:49.758024 kubelet[1978]: E1002 19:07:49.757729    1978 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-szml2_kube-system(e901c2bb-1cd6-4e03-9551-a9853ecda2d5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-szml2_kube-system(e901c2bb-1cd6-4e03-9551-a9853ecda2d5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-szml2" podUID=e901c2bb-1cd6-4e03-9551-a9853ecda2d5
Oct  2 19:07:49.782075 env[1104]: time="2023-10-02T19:07:49.782005439Z" level=error msg="Failed to destroy network for sandbox \"2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:07:49.782302 env[1104]: time="2023-10-02T19:07:49.782040445Z" level=error msg="Failed to destroy network for sandbox \"704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:07:49.782468 env[1104]: time="2023-10-02T19:07:49.782353915Z" level=error msg="encountered an error cleaning up failed sandbox \"2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:07:49.782523 env[1104]: time="2023-10-02T19:07:49.782491883Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-v789s,Uid:2bce08ea-b764-40b2-b139-323c1778a319,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:07:49.782729 env[1104]: time="2023-10-02T19:07:49.782699043Z" level=error msg="encountered an error cleaning up failed sandbox \"704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:07:49.782862 kubelet[1978]: E1002 19:07:49.782817    1978 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:07:49.782928 env[1104]: time="2023-10-02T19:07:49.782819500Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-8pvzx,Uid:45dbd647-0143-42f4-92f9-e54c68348a9c,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:07:49.782965 kubelet[1978]: E1002 19:07:49.782900    1978 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-v789s"
Oct  2 19:07:49.782965 kubelet[1978]: E1002 19:07:49.782921    1978 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-v789s"
Oct  2 19:07:49.783016 kubelet[1978]: E1002 19:07:49.782985    1978 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-v789s_calico-system(2bce08ea-b764-40b2-b139-323c1778a319)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-v789s_calico-system(2bce08ea-b764-40b2-b139-323c1778a319)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-v789s" podUID=2bce08ea-b764-40b2-b139-323c1778a319
Oct  2 19:07:49.783382 kubelet[1978]: E1002 19:07:49.783345    1978 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:07:49.783627 kubelet[1978]: E1002 19:07:49.783420    1978 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-8pvzx"
Oct  2 19:07:49.783627 kubelet[1978]: E1002 19:07:49.783441    1978 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-8pvzx"
Oct  2 19:07:49.783627 kubelet[1978]: E1002 19:07:49.783498    1978 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-8pvzx_kube-system(45dbd647-0143-42f4-92f9-e54c68348a9c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-8pvzx_kube-system(45dbd647-0143-42f4-92f9-e54c68348a9c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-8pvzx" podUID=45dbd647-0143-42f4-92f9-e54c68348a9c
Oct  2 19:07:49.785805 env[1104]: time="2023-10-02T19:07:49.785733908Z" level=error msg="Failed to destroy network for sandbox \"f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:07:49.786212 env[1104]: time="2023-10-02T19:07:49.786178925Z" level=error msg="encountered an error cleaning up failed sandbox \"f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:07:49.786315 env[1104]: time="2023-10-02T19:07:49.786253485Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bd445fdb4-mjchx,Uid:a3345632-ea98-4598-a37e-30c3bad83cdd,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:07:49.787718 kubelet[1978]: E1002 19:07:49.786424    1978 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:07:49.787718 kubelet[1978]: E1002 19:07:49.786460    1978 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7bd445fdb4-mjchx"
Oct  2 19:07:49.787718 kubelet[1978]: E1002 19:07:49.786479    1978 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7bd445fdb4-mjchx"
Oct  2 19:07:49.787834 kubelet[1978]: E1002 19:07:49.786519    1978 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7bd445fdb4-mjchx_calico-system(a3345632-ea98-4598-a37e-30c3bad83cdd)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7bd445fdb4-mjchx_calico-system(a3345632-ea98-4598-a37e-30c3bad83cdd)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7bd445fdb4-mjchx" podUID=a3345632-ea98-4598-a37e-30c3bad83cdd
Oct  2 19:07:50.210446 kubelet[1978]: I1002 19:07:50.210409    1978 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb"
Oct  2 19:07:50.211126 env[1104]: time="2023-10-02T19:07:50.211080718Z" level=info msg="StopPodSandbox for \"503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb\""
Oct  2 19:07:50.213068 kubelet[1978]: I1002 19:07:50.212348    1978 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc"
Oct  2 19:07:50.213307 env[1104]: time="2023-10-02T19:07:50.213259634Z" level=info msg="StopPodSandbox for \"2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc\""
Oct  2 19:07:50.216929 kubelet[1978]: I1002 19:07:50.216887    1978 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb"
Oct  2 19:07:50.218075 env[1104]: time="2023-10-02T19:07:50.217991618Z" level=info msg="StopPodSandbox for \"704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb\""
Oct  2 19:07:50.223052 kubelet[1978]: E1002 19:07:50.223011    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:50.224087 env[1104]: time="2023-10-02T19:07:50.224045257Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\""
Oct  2 19:07:50.225291 kubelet[1978]: I1002 19:07:50.225242    1978 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb"
Oct  2 19:07:50.226112 env[1104]: time="2023-10-02T19:07:50.226038574Z" level=info msg="StopPodSandbox for \"f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb\""
Oct  2 19:07:50.261031 env[1104]: time="2023-10-02T19:07:50.260953343Z" level=error msg="StopPodSandbox for \"2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc\" failed" error="failed to destroy network for sandbox \"2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:07:50.261384 kubelet[1978]: E1002 19:07:50.261349    1978 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc"
Oct  2 19:07:50.261480 kubelet[1978]: E1002 19:07:50.261420    1978 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc}
Oct  2 19:07:50.261480 kubelet[1978]: E1002 19:07:50.261455    1978 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2bce08ea-b764-40b2-b139-323c1778a319\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Oct  2 19:07:50.261661 kubelet[1978]: E1002 19:07:50.261490    1978 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2bce08ea-b764-40b2-b139-323c1778a319\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-v789s" podUID=2bce08ea-b764-40b2-b139-323c1778a319
Oct  2 19:07:50.271023 env[1104]: time="2023-10-02T19:07:50.270938351Z" level=error msg="StopPodSandbox for \"f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb\" failed" error="failed to destroy network for sandbox \"f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:07:50.271327 kubelet[1978]: E1002 19:07:50.271285    1978 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb"
Oct  2 19:07:50.271401 kubelet[1978]: E1002 19:07:50.271335    1978 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb}
Oct  2 19:07:50.271401 kubelet[1978]: E1002 19:07:50.271383    1978 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a3345632-ea98-4598-a37e-30c3bad83cdd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Oct  2 19:07:50.271514 kubelet[1978]: E1002 19:07:50.271409    1978 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a3345632-ea98-4598-a37e-30c3bad83cdd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7bd445fdb4-mjchx" podUID=a3345632-ea98-4598-a37e-30c3bad83cdd
Oct  2 19:07:50.271566 env[1104]: time="2023-10-02T19:07:50.271475470Z" level=error msg="StopPodSandbox for \"704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb\" failed" error="failed to destroy network for sandbox \"704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:07:50.271612 kubelet[1978]: E1002 19:07:50.271596    1978 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb"
Oct  2 19:07:50.271612 kubelet[1978]: E1002 19:07:50.271613    1978 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb}
Oct  2 19:07:50.271705 kubelet[1978]: E1002 19:07:50.271638    1978 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"45dbd647-0143-42f4-92f9-e54c68348a9c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Oct  2 19:07:50.271705 kubelet[1978]: E1002 19:07:50.271679    1978 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"45dbd647-0143-42f4-92f9-e54c68348a9c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-8pvzx" podUID=45dbd647-0143-42f4-92f9-e54c68348a9c
Oct  2 19:07:50.274904 env[1104]: time="2023-10-02T19:07:50.274824927Z" level=error msg="StopPodSandbox for \"503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb\" failed" error="failed to destroy network for sandbox \"503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:07:50.275090 kubelet[1978]: E1002 19:07:50.275058    1978 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb"
Oct  2 19:07:50.275160 kubelet[1978]: E1002 19:07:50.275098    1978 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb}
Oct  2 19:07:50.275160 kubelet[1978]: E1002 19:07:50.275141    1978 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e901c2bb-1cd6-4e03-9551-a9853ecda2d5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Oct  2 19:07:50.275315 kubelet[1978]: E1002 19:07:50.275172    1978 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e901c2bb-1cd6-4e03-9551-a9853ecda2d5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-szml2" podUID=e901c2bb-1cd6-4e03-9551-a9853ecda2d5
Oct  2 19:07:50.328381 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb-shm.mount: Deactivated successfully.
Oct  2 19:07:51.955577 env[1104]: time="2023-10-02T19:07:51.955473007Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node:v3.25.0\": failed to copy: write /var/lib/containerd/io.containerd.content.v1.content/ingest/1fab65342f334b157e44a223ac8e0e976bd457c317624c7bcd0e8c67ccd95131/data: no space left on device"
Oct  2 19:07:51.956193 kubelet[1978]: E1002 19:07:51.955907    1978 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node:v3.25.0\": failed to copy: write /var/lib/containerd/io.containerd.content.v1.content/ingest/1fab65342f334b157e44a223ac8e0e976bd457c317624c7bcd0e8c67ccd95131/data: no space left on device" image="ghcr.io/flatcar/calico/node:v3.25.0"
Oct  2 19:07:51.956193 kubelet[1978]: E1002 19:07:51.955962    1978 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node:v3.25.0\": failed to copy: write /var/lib/containerd/io.containerd.content.v1.content/ingest/1fab65342f334b157e44a223ac8e0e976bd457c317624c7bcd0e8c67ccd95131/data: no space left on device" image="ghcr.io/flatcar/calico/node:v3.25.0"
Oct  2 19:07:51.956664 kubelet[1978]: E1002 19:07:51.956369    1978 kuberuntime_manager.go:1212] container &Container{Name:calico-node,Image:ghcr.io/flatcar/calico/node:v3.25.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:WAIT_FOR_DATASTORE,Value:true,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:k8s,operator,bgp,ValueFrom:nil,},EnvVar{Name:CALICO_DISABLE_FILE_LOGGING,Value:false,ValueFrom:nil,},EnvVar{Name:FELIX_DEFAULTENDPOINTTOHOSTACTION,Value:ACCEPT,ValueFrom:nil,},EnvVar{Name:FELIX_HEALTHENABLED,Value:true,ValueFrom:nil,},EnvVar{Name:FELIX_HEALTHPORT,Value:9099,ValueFrom:nil,},EnvVar{Name:NODENAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},EnvVar{Name:NAMESPACE,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:metadata.namespace,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},EnvVar{Name:FELIX_TYPHAK8SNAMESPACE,Value:calico-system,ValueFrom:nil,},EnvVar{Name:FELIX_TYPHAK8SSERVICENAME,Value:calico-typha,ValueFrom:nil,},EnvVar{Name:FELIX_TYPHACAFILE,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:FELIX_TYPHACERTFILE,Value:/node-certs/tls.crt,ValueFrom:nil,},EnvVar{Name:FELIX_TYPHAKEYFILE,Value:/node-certs/tls.key,ValueFrom:nil,},EnvVar{Name:FIPS_MODE_ENABLED,Value:false,ValueFrom:nil,},EnvVar{Name:FELIX_TYPHACN,Value:typha-server,ValueFrom:nil,},EnvVar{Name:CALICO_MANAGE_CNI,Value:true,ValueFrom:nil,},EnvVar{Name:CALICO_IPV4POOL_CIDR,Value:192.168.0.0/17,ValueFrom:nil,},EnvVar{Name:CALICO_IPV4POOL_VXLAN,Value:CrossSubnet,ValueFrom:nil,},EnvVar{Name:CALICO_IPV4POOL_BLOCK_SIZE,Value:26,ValueFrom:nil,},EnvVar{Name:CALICO_IPV4POOL_NODE_SELECTOR,Value:all(),ValueFrom:nil,},EnvVar{Name:CALICO_IPV4POOL_DISABLE_BGP_EXPORT,Value:false,ValueFrom:nil,},EnvVar{Name:CALICO_NETWORKING_BACKEND,Value:bird,ValueFrom:nil,},EnvVar{Name:IP,Value:autodetect,ValueFrom:nil,},EnvVar{Name:IP_AUTODETECTION_METHOD,Value:first-found,ValueFrom:nil,},EnvVar{Name:IP6,Value:none,ValueFrom:nil,},EnvVar{Name:FELIX_IPV6SUPPORT,Value:false,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:lib-modules,ReadOnly:true,MountPath:/lib/modules,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:xtables-lock,ReadOnly:false,MountPath:/run/xtables.lock,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:policysync,ReadOnly:false,MountPath:/var/run/nodeagent,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs/,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:node-certs,ReadOnly:true,MountPath:/node-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:var-run-calico,ReadOnly:false,MountPath:/var/run/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:var-lib-calico,ReadOnly:false,MountPath:/var/lib/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-log-dir,ReadOnly:false,MountPath:/var/log/calico/cni,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-net-dir,ReadOnly:false,MountPath:/host/etc/cni/net.d,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-4bq56,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/liveness,Port:{0 9099 },Host:localhost,Scheme:HTTP,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:10,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/bin/calico-node -bird-ready -felix-ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:&Lifecycle{PostStart:nil,PreStop:&LifecycleHandler{Exec:&ExecAction{Command:[/bin/calico-node -shutdown],},HTTPGet:nil,TCPSocket:nil,},},TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-node-66rxx_calico-system(3f96e7c1-0234-4789-b96c-c4d49cc029a6): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node:v3.25.0": failed to copy: write /var/lib/containerd/io.containerd.content.v1.content/ingest/1fab65342f334b157e44a223ac8e0e976bd457c317624c7bcd0e8c67ccd95131/data: no space left on device
Oct  2 19:07:51.956664 kubelet[1978]: E1002 19:07:51.956421    1978 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node:v3.25.0\\\": failed to copy: write /var/lib/containerd/io.containerd.content.v1.content/ingest/1fab65342f334b157e44a223ac8e0e976bd457c317624c7bcd0e8c67ccd95131/data: no space left on device\"" pod="calico-system/calico-node-66rxx" podUID=3f96e7c1-0234-4789-b96c-c4d49cc029a6
Oct  2 19:07:52.229749 kubelet[1978]: E1002 19:07:52.229167    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:07:52.229749 kubelet[1978]: E1002 19:07:52.229737    1978 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node:v3.25.0\\\"\"" pod="calico-system/calico-node-66rxx" podUID=3f96e7c1-0234-4789-b96c-c4d49cc029a6
Oct  2 19:07:53.233909 kubelet[1978]: I1002 19:07:53.233860    1978 eviction_manager.go:346] "Eviction manager: attempting to reclaim" resourceName="ephemeral-storage"
Oct  2 19:07:53.233909 kubelet[1978]: I1002 19:07:53.233900    1978 container_gc.go:86] "Attempting to delete unused containers"
Oct  2 19:07:53.237412 kubelet[1978]: I1002 19:07:53.237356    1978 image_gc_manager.go:340] "Attempting to delete unused images"
Oct  2 19:07:53.239313 kubelet[1978]: I1002 19:07:53.239284    1978 image_gc_manager.go:400] "Removing image to free bytes" imageID="sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681" size=101639218
Oct  2 19:07:53.239603 env[1104]: time="2023-10-02T19:07:53.239564180Z" level=info msg="RemoveImage \"sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681\""
Oct  2 19:07:53.240908 env[1104]: time="2023-10-02T19:07:53.240864073Z" level=info msg="ImageDelete event &ImageDelete{Name:registry.k8s.io/etcd:3.5.7-0,XXX_unrecognized:[],}"
Oct  2 19:07:53.242129 env[1104]: time="2023-10-02T19:07:53.242091028Z" level=info msg="ImageDelete event &ImageDelete{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,XXX_unrecognized:[],}"
Oct  2 19:07:53.243249 env[1104]: time="2023-10-02T19:07:53.243210090Z" level=info msg="ImageDelete event &ImageDelete{Name:sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681,XXX_unrecognized:[],}"
Oct  2 19:07:53.283525 env[1104]: time="2023-10-02T19:07:53.283443008Z" level=info msg="RemoveImage \"sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681\" returns successfully"
Oct  2 19:07:53.283926 kubelet[1978]: I1002 19:07:53.283888    1978 image_gc_manager.go:400] "Removing image to free bytes" imageID="sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc" size=16190758
Oct  2 19:07:53.284212 env[1104]: time="2023-10-02T19:07:53.284171155Z" level=info msg="RemoveImage \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\""
Oct  2 19:07:53.324789 env[1104]: time="2023-10-02T19:07:53.324699307Z" level=info msg="ImageDelete event &ImageDelete{Name:registry.k8s.io/coredns/coredns:v1.10.1,XXX_unrecognized:[],}"
Oct  2 19:07:53.329351 env[1104]: time="2023-10-02T19:07:53.329297738Z" level=info msg="ImageDelete event &ImageDelete{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,XXX_unrecognized:[],}"
Oct  2 19:07:53.330419 env[1104]: time="2023-10-02T19:07:53.330371124Z" level=info msg="ImageDelete event &ImageDelete{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,XXX_unrecognized:[],}"
Oct  2 19:07:53.360621 env[1104]: time="2023-10-02T19:07:53.360548377Z" level=info msg="RemoveImage \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\" returns successfully"
Oct  2 19:07:53.360948 kubelet[1978]: I1002 19:07:53.360916    1978 image_gc_manager.go:400] "Removing image to free bytes" imageID="sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee" size=301773
Oct  2 19:07:53.362040 env[1104]: time="2023-10-02T19:07:53.361876572Z" level=info msg="RemoveImage \"sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee\""
Oct  2 19:07:53.366325 env[1104]: time="2023-10-02T19:07:53.366086392Z" level=info msg="ImageDelete event &ImageDelete{Name:registry.k8s.io/pause:3.6,XXX_unrecognized:[],}"
Oct  2 19:07:53.366325 env[1104]: time="2023-10-02T19:07:53.366316074Z" level=info msg="ImageDelete event &ImageDelete{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,XXX_unrecognized:[],}"
Oct  2 19:07:53.366705 env[1104]: time="2023-10-02T19:07:53.366668035Z" level=info msg="ImageDelete event &ImageDelete{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,XXX_unrecognized:[],}"
Oct  2 19:07:53.370898 env[1104]: time="2023-10-02T19:07:53.370850605Z" level=info msg="RemoveImage \"sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee\" returns successfully"
Oct  2 19:07:53.387279 kubelet[1978]: I1002 19:07:53.385238    1978 eviction_manager.go:353] "Eviction manager: able to reduce resource pressure without evicting pods." resourceName="ephemeral-storage"
Oct  2 19:07:55.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.30:22-10.0.0.1:41948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:07:55.496122 systemd[1]: Started sshd@7-10.0.0.30:22-10.0.0.1:41948.service.
Oct  2 19:07:55.500249 kernel: audit: type=1130 audit(1696273675.495:1145): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.30:22-10.0.0.1:41948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:07:55.529000 audit[2890]: USER_ACCT pid=2890 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:07:55.530946 sshd[2890]: Accepted publickey for core from 10.0.0.1 port 41948 ssh2: RSA SHA256:9wRqOmzBU7I1L73Sd3XbDPVeoZziQ4I3fHnP0PJ8idM
Oct  2 19:07:55.529000 audit[2890]: CRED_ACQ pid=2890 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:07:55.534342 sshd[2890]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:07:55.537031 kernel: audit: type=1101 audit(1696273675.529:1146): pid=2890 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:07:55.537128 kernel: audit: type=1103 audit(1696273675.529:1147): pid=2890 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:07:55.537156 kernel: audit: type=1006 audit(1696273675.533:1148): pid=2890 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1
Oct  2 19:07:55.541250 kernel: audit: type=1300 audit(1696273675.533:1148): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefdc2ec20 a2=3 a3=0 items=0 ppid=1 pid=2890 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:55.533000 audit[2890]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefdc2ec20 a2=3 a3=0 items=0 ppid=1 pid=2890 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:07:55.538917 systemd-logind[1090]: New session 8 of user core.
Oct  2 19:07:55.540068 systemd[1]: Started session-8.scope.
Oct  2 19:07:55.533000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Oct  2 19:07:55.543303 kernel: audit: type=1327 audit(1696273675.533:1148): proctitle=737368643A20636F7265205B707269765D
Oct  2 19:07:55.550000 audit[2890]: USER_START pid=2890 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:07:55.555262 kernel: audit: type=1105 audit(1696273675.550:1149): pid=2890 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:07:55.554000 audit[2892]: CRED_ACQ pid=2892 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:07:55.559259 kernel: audit: type=1103 audit(1696273675.554:1150): pid=2892 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:07:55.670754 sshd[2890]: pam_unix(sshd:session): session closed for user core
Oct  2 19:07:55.670000 audit[2890]: USER_END pid=2890 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:07:55.673549 systemd[1]: sshd@7-10.0.0.30:22-10.0.0.1:41948.service: Deactivated successfully.
Oct  2 19:07:55.674401 systemd[1]: session-8.scope: Deactivated successfully.
Oct  2 19:07:55.670000 audit[2890]: CRED_DISP pid=2890 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:07:55.675034 systemd-logind[1090]: Session 8 logged out. Waiting for processes to exit.
Oct  2 19:07:55.675671 systemd-logind[1090]: Removed session 8.
Oct  2 19:07:55.677094 kernel: audit: type=1106 audit(1696273675.670:1151): pid=2890 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:07:55.677160 kernel: audit: type=1104 audit(1696273675.670:1152): pid=2890 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:07:55.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.30:22-10.0.0.1:41948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:02.130060 env[1104]: time="2023-10-02T19:08:02.129994602Z" level=info msg="StopPodSandbox for \"2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc\""
Oct  2 19:08:02.130479 env[1104]: time="2023-10-02T19:08:02.130247517Z" level=info msg="StopPodSandbox for \"704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb\""
Oct  2 19:08:02.153600 env[1104]: time="2023-10-02T19:08:02.153518068Z" level=error msg="StopPodSandbox for \"704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb\" failed" error="failed to destroy network for sandbox \"704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:08:02.153867 kubelet[1978]: E1002 19:08:02.153818    1978 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb"
Oct  2 19:08:02.154136 kubelet[1978]: E1002 19:08:02.153884    1978 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb}
Oct  2 19:08:02.154136 kubelet[1978]: E1002 19:08:02.153944    1978 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"45dbd647-0143-42f4-92f9-e54c68348a9c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Oct  2 19:08:02.154136 kubelet[1978]: E1002 19:08:02.153993    1978 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"45dbd647-0143-42f4-92f9-e54c68348a9c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-8pvzx" podUID=45dbd647-0143-42f4-92f9-e54c68348a9c
Oct  2 19:08:02.157462 env[1104]: time="2023-10-02T19:08:02.157371713Z" level=error msg="StopPodSandbox for \"2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc\" failed" error="failed to destroy network for sandbox \"2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:08:02.157705 kubelet[1978]: E1002 19:08:02.157680    1978 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc"
Oct  2 19:08:02.157758 kubelet[1978]: E1002 19:08:02.157735    1978 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc}
Oct  2 19:08:02.157807 kubelet[1978]: E1002 19:08:02.157791    1978 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2bce08ea-b764-40b2-b139-323c1778a319\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Oct  2 19:08:02.157866 kubelet[1978]: E1002 19:08:02.157836    1978 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2bce08ea-b764-40b2-b139-323c1778a319\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-v789s" podUID=2bce08ea-b764-40b2-b139-323c1778a319
Oct  2 19:08:04.129687 env[1104]: time="2023-10-02T19:08:04.129595687Z" level=info msg="StopPodSandbox for \"503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb\""
Oct  2 19:08:04.157324 env[1104]: time="2023-10-02T19:08:04.157005825Z" level=error msg="StopPodSandbox for \"503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb\" failed" error="failed to destroy network for sandbox \"503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:08:04.157703 kubelet[1978]: E1002 19:08:04.157664    1978 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb"
Oct  2 19:08:04.158024 kubelet[1978]: E1002 19:08:04.157728    1978 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb}
Oct  2 19:08:04.158024 kubelet[1978]: E1002 19:08:04.157787    1978 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e901c2bb-1cd6-4e03-9551-a9853ecda2d5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Oct  2 19:08:04.158024 kubelet[1978]: E1002 19:08:04.157833    1978 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e901c2bb-1cd6-4e03-9551-a9853ecda2d5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-szml2" podUID=e901c2bb-1cd6-4e03-9551-a9853ecda2d5
Oct  2 19:08:05.129632 env[1104]: time="2023-10-02T19:08:05.129575665Z" level=info msg="StopPodSandbox for \"f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb\""
Oct  2 19:08:05.155273 env[1104]: time="2023-10-02T19:08:05.155185930Z" level=error msg="StopPodSandbox for \"f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb\" failed" error="failed to destroy network for sandbox \"f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 19:08:05.155666 kubelet[1978]: E1002 19:08:05.155492    1978 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb"
Oct  2 19:08:05.155666 kubelet[1978]: E1002 19:08:05.155539    1978 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb}
Oct  2 19:08:05.155666 kubelet[1978]: E1002 19:08:05.155572    1978 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a3345632-ea98-4598-a37e-30c3bad83cdd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Oct  2 19:08:05.155666 kubelet[1978]: E1002 19:08:05.155599    1978 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a3345632-ea98-4598-a37e-30c3bad83cdd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7bd445fdb4-mjchx" podUID=a3345632-ea98-4598-a37e-30c3bad83cdd
Oct  2 19:08:05.675370 systemd[1]: Started sshd@8-10.0.0.30:22-10.0.0.1:55980.service.
Oct  2 19:08:05.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.30:22-10.0.0.1:55980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:05.678388 kernel: kauditd_printk_skb: 1 callbacks suppressed
Oct  2 19:08:05.678545 kernel: audit: type=1130 audit(1696273685.674:1154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.30:22-10.0.0.1:55980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:05.705000 audit[3001]: USER_ACCT pid=3001 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:05.707522 sshd[3001]: Accepted publickey for core from 10.0.0.1 port 55980 ssh2: RSA SHA256:9wRqOmzBU7I1L73Sd3XbDPVeoZziQ4I3fHnP0PJ8idM
Oct  2 19:08:05.709000 audit[3001]: CRED_ACQ pid=3001 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:05.711202 sshd[3001]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:08:05.713133 kernel: audit: type=1101 audit(1696273685.705:1155): pid=3001 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:05.713292 kernel: audit: type=1103 audit(1696273685.709:1156): pid=3001 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:05.713333 kernel: audit: type=1006 audit(1696273685.709:1157): pid=3001 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1
Oct  2 19:08:05.714565 kernel: audit: type=1300 audit(1696273685.709:1157): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8c7ef4b0 a2=3 a3=0 items=0 ppid=1 pid=3001 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:05.709000 audit[3001]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8c7ef4b0 a2=3 a3=0 items=0 ppid=1 pid=3001 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:05.715631 systemd-logind[1090]: New session 9 of user core.
Oct  2 19:08:05.716602 systemd[1]: Started session-9.scope.
Oct  2 19:08:05.709000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Oct  2 19:08:05.718061 kernel: audit: type=1327 audit(1696273685.709:1157): proctitle=737368643A20636F7265205B707269765D
Oct  2 19:08:05.720000 audit[3001]: USER_START pid=3001 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:05.720000 audit[3003]: CRED_ACQ pid=3003 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:05.726821 kernel: audit: type=1105 audit(1696273685.720:1158): pid=3001 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:05.726875 kernel: audit: type=1103 audit(1696273685.720:1159): pid=3003 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:05.829149 sshd[3001]: pam_unix(sshd:session): session closed for user core
Oct  2 19:08:05.828000 audit[3001]: USER_END pid=3001 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:05.831776 systemd[1]: sshd@8-10.0.0.30:22-10.0.0.1:55980.service: Deactivated successfully.
Oct  2 19:08:05.832511 systemd[1]: session-9.scope: Deactivated successfully.
Oct  2 19:08:05.833073 systemd-logind[1090]: Session 9 logged out. Waiting for processes to exit.
Oct  2 19:08:05.828000 audit[3001]: CRED_DISP pid=3001 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:05.833788 systemd-logind[1090]: Removed session 9.
Oct  2 19:08:05.835468 kernel: audit: type=1106 audit(1696273685.828:1160): pid=3001 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:05.835530 kernel: audit: type=1104 audit(1696273685.828:1161): pid=3001 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:05.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.30:22-10.0.0.1:55980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:06.129720 kubelet[1978]: E1002 19:08:06.129674    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:08:06.130994 env[1104]: time="2023-10-02T19:08:06.130927507Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\""
Oct  2 19:08:09.116000 audit[1862]: AVC avc:  denied  { watch } for  pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6787 scontext=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:08:09.116000 audit[1862]: AVC avc:  denied  { watch } for  pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=6798 scontext=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:08:09.116000 audit[1862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00199eb70 a2=fc6 a3=0 items=0 ppid=1716 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 key=(null)
Oct  2 19:08:09.116000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:08:09.116000 audit[1862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ce9fc0 a2=fc6 a3=0 items=0 ppid=1716 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 key=(null)
Oct  2 19:08:09.116000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:08:09.854000 audit[1864]: AVC avc:  denied  { watch } for  pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=6793 scontext=system_u:system_r:svirt_lxc_net_t:s0:c449,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:08:09.854000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c003708660 a2=fc6 a3=0 items=0 ppid=1694 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c449,c780 key=(null)
Oct  2 19:08:09.854000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E
Oct  2 19:08:09.857000 audit[1864]: AVC avc:  denied  { watch } for  pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=6800 scontext=system_u:system_r:svirt_lxc_net_t:s0:c449,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:08:09.857000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c003708690 a2=fc6 a3=0 items=0 ppid=1694 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c449,c780 key=(null)
Oct  2 19:08:09.857000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E
Oct  2 19:08:09.857000 audit[1864]: AVC avc:  denied  { watch } for  pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=6798 scontext=system_u:system_r:svirt_lxc_net_t:s0:c449,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:08:09.857000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c003708b10 a2=fc6 a3=0 items=0 ppid=1694 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c449,c780 key=(null)
Oct  2 19:08:09.857000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E
Oct  2 19:08:09.858000 audit[1864]: AVC avc:  denied  { watch } for  pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6787 scontext=system_u:system_r:svirt_lxc_net_t:s0:c449,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:08:09.858000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00b0fd960 a2=fc6 a3=0 items=0 ppid=1694 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c449,c780 key=(null)
Oct  2 19:08:09.858000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E
Oct  2 19:08:09.861000 audit[1864]: AVC avc:  denied  { watch } for  pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=6798 scontext=system_u:system_r:svirt_lxc_net_t:s0:c449,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:08:09.861000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0039d5560 a2=fc6 a3=0 items=0 ppid=1694 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c449,c780 key=(null)
Oct  2 19:08:09.861000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E
Oct  2 19:08:09.868000 audit[1864]: AVC avc:  denied  { watch } for  pid=1864 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6787 scontext=system_u:system_r:svirt_lxc_net_t:s0:c449,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:08:09.868000 audit[1864]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00a519880 a2=fc6 a3=0 items=0 ppid=1694 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c449,c780 key=(null)
Oct  2 19:08:09.868000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E
Oct  2 19:08:10.951321 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1302338260.mount: Deactivated successfully.
Oct  2 19:08:11.401450 env[1104]: time="2023-10-02T19:08:11.401311324Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:08:11.403600 env[1104]: time="2023-10-02T19:08:11.403548834Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:08:11.405105 env[1104]: time="2023-10-02T19:08:11.405042697Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:08:11.406596 env[1104]: time="2023-10-02T19:08:11.406509671Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:08:11.406912 env[1104]: time="2023-10-02T19:08:11.406875688Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e\""
Oct  2 19:08:11.409268 env[1104]: time="2023-10-02T19:08:11.409202614Z" level=info msg="CreateContainer within sandbox \"f7b36ba002382ce6d8da6dae61606e5311e952cb0dd12425def9bd22a4b9dce0\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}"
Oct  2 19:08:11.430475 env[1104]: time="2023-10-02T19:08:11.430402832Z" level=info msg="CreateContainer within sandbox \"f7b36ba002382ce6d8da6dae61606e5311e952cb0dd12425def9bd22a4b9dce0\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"f4389e87c3c7dc2ab4872df8d6b25b68e37a9c335a2e42826dd53060f1638b98\""
Oct  2 19:08:11.431154 env[1104]: time="2023-10-02T19:08:11.431113025Z" level=info msg="StartContainer for \"f4389e87c3c7dc2ab4872df8d6b25b68e37a9c335a2e42826dd53060f1638b98\""
Oct  2 19:08:11.457172 systemd[1]: Started cri-containerd-f4389e87c3c7dc2ab4872df8d6b25b68e37a9c335a2e42826dd53060f1638b98.scope.
Oct  2 19:08:11.469000 audit[3020]: AVC avc:  denied  { perfmon } for  pid=3020 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.473064 kernel: kauditd_printk_skb: 25 callbacks suppressed
Oct  2 19:08:11.473158 kernel: audit: type=1400 audit(1696273691.469:1171): avc:  denied  { perfmon } for  pid=3020 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.473205 kernel: audit: type=1300 audit(1696273691.469:1171): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2383 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:11.469000 audit[3020]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2383 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:11.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634333839653837633363376463326162343837326466386436623235
Oct  2 19:08:11.506462 kernel: audit: type=1327 audit(1696273691.469:1171): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634333839653837633363376463326162343837326466386436623235
Oct  2 19:08:11.506643 kernel: audit: type=1400 audit(1696273691.469:1172): avc:  denied  { bpf } for  pid=3020 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.469000 audit[3020]: AVC avc:  denied  { bpf } for  pid=3020 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.469000 audit[3020]: AVC avc:  denied  { bpf } for  pid=3020 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.510790 kernel: audit: type=1400 audit(1696273691.469:1172): avc:  denied  { bpf } for  pid=3020 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.469000 audit[3020]: AVC avc:  denied  { bpf } for  pid=3020 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.513161 kernel: audit: type=1400 audit(1696273691.469:1172): avc:  denied  { bpf } for  pid=3020 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.515447 kernel: audit: type=1400 audit(1696273691.469:1172): avc:  denied  { perfmon } for  pid=3020 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.515500 kernel: audit: type=1400 audit(1696273691.469:1172): avc:  denied  { perfmon } for  pid=3020 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.469000 audit[3020]: AVC avc:  denied  { perfmon } for  pid=3020 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.469000 audit[3020]: AVC avc:  denied  { perfmon } for  pid=3020 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.469000 audit[3020]: AVC avc:  denied  { perfmon } for  pid=3020 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.519649 kernel: audit: type=1400 audit(1696273691.469:1172): avc:  denied  { perfmon } for  pid=3020 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.519814 kernel: audit: type=1400 audit(1696273691.469:1172): avc:  denied  { perfmon } for  pid=3020 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.469000 audit[3020]: AVC avc:  denied  { perfmon } for  pid=3020 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.469000 audit[3020]: AVC avc:  denied  { perfmon } for  pid=3020 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.469000 audit[3020]: AVC avc:  denied  { bpf } for  pid=3020 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.469000 audit[3020]: AVC avc:  denied  { bpf } for  pid=3020 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.469000 audit: BPF prog-id=145 op=LOAD
Oct  2 19:08:11.469000 audit[3020]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003a60d0 items=0 ppid=2383 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:11.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634333839653837633363376463326162343837326466386436623235
Oct  2 19:08:11.472000 audit[3020]: AVC avc:  denied  { bpf } for  pid=3020 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.472000 audit[3020]: AVC avc:  denied  { bpf } for  pid=3020 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.472000 audit[3020]: AVC avc:  denied  { perfmon } for  pid=3020 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.472000 audit[3020]: AVC avc:  denied  { perfmon } for  pid=3020 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.472000 audit[3020]: AVC avc:  denied  { perfmon } for  pid=3020 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.472000 audit[3020]: AVC avc:  denied  { perfmon } for  pid=3020 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.472000 audit[3020]: AVC avc:  denied  { perfmon } for  pid=3020 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.472000 audit[3020]: AVC avc:  denied  { bpf } for  pid=3020 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.472000 audit[3020]: AVC avc:  denied  { bpf } for  pid=3020 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.472000 audit: BPF prog-id=146 op=LOAD
Oct  2 19:08:11.472000 audit[3020]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003a6118 items=0 ppid=2383 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:11.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634333839653837633363376463326162343837326466386436623235
Oct  2 19:08:11.475000 audit: BPF prog-id=146 op=UNLOAD
Oct  2 19:08:11.475000 audit: BPF prog-id=145 op=UNLOAD
Oct  2 19:08:11.475000 audit[3020]: AVC avc:  denied  { bpf } for  pid=3020 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.475000 audit[3020]: AVC avc:  denied  { bpf } for  pid=3020 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.475000 audit[3020]: AVC avc:  denied  { bpf } for  pid=3020 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.475000 audit[3020]: AVC avc:  denied  { perfmon } for  pid=3020 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.475000 audit[3020]: AVC avc:  denied  { perfmon } for  pid=3020 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.475000 audit[3020]: AVC avc:  denied  { perfmon } for  pid=3020 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.475000 audit[3020]: AVC avc:  denied  { perfmon } for  pid=3020 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.475000 audit[3020]: AVC avc:  denied  { perfmon } for  pid=3020 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.475000 audit[3020]: AVC avc:  denied  { bpf } for  pid=3020 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.475000 audit[3020]: AVC avc:  denied  { bpf } for  pid=3020 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:11.475000 audit: BPF prog-id=147 op=LOAD
Oct  2 19:08:11.475000 audit[3020]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003a61a8 items=0 ppid=2383 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:11.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634333839653837633363376463326162343837326466386436623235
Oct  2 19:08:11.627098 env[1104]: time="2023-10-02T19:08:11.627030179Z" level=info msg="StartContainer for \"f4389e87c3c7dc2ab4872df8d6b25b68e37a9c335a2e42826dd53060f1638b98\" returns successfully"
Oct  2 19:08:11.661545 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information.
Oct  2 19:08:11.661700 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
Oct  2 19:08:11.951897 systemd[1]: run-containerd-runc-k8s.io-f4389e87c3c7dc2ab4872df8d6b25b68e37a9c335a2e42826dd53060f1638b98-runc.2yEaY3.mount: Deactivated successfully.
Oct  2 19:08:12.268617 kubelet[1978]: E1002 19:08:12.268492    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:08:12.285975 systemd[1]: run-containerd-runc-k8s.io-f4389e87c3c7dc2ab4872df8d6b25b68e37a9c335a2e42826dd53060f1638b98-runc.8cPsFM.mount: Deactivated successfully.
Oct  2 19:08:12.900000 audit[3153]: AVC avc:  denied  { write } for  pid=3153 comm="tee" name="fd" dev="proc" ino=24888 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 19:08:12.900000 audit[3153]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe24b9d990 a2=241 a3=1b6 items=1 ppid=3115 pid=3153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:12.900000 audit: CWD cwd="/etc/service/enabled/bird/log"
Oct  2 19:08:12.900000 audit: PATH item=0 name="/dev/fd/63" inode=25642 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:12.900000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 19:08:12.901000 audit[3155]: AVC avc:  denied  { write } for  pid=3155 comm="tee" name="fd" dev="proc" ino=23958 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 19:08:12.901000 audit[3155]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc0b2c998f a2=241 a3=1b6 items=1 ppid=3122 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:12.901000 audit: CWD cwd="/etc/service/enabled/confd/log"
Oct  2 19:08:12.901000 audit: PATH item=0 name="/dev/fd/63" inode=25643 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:12.901000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 19:08:12.902000 audit[3136]: AVC avc:  denied  { write } for  pid=3136 comm="tee" name="fd" dev="proc" ino=25648 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 19:08:12.902000 audit[3136]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdcded3980 a2=241 a3=1b6 items=1 ppid=3113 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:12.902000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log"
Oct  2 19:08:12.902000 audit: PATH item=0 name="/dev/fd/63" inode=24877 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:12.902000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 19:08:12.918000 audit[3177]: AVC avc:  denied  { write } for  pid=3177 comm="tee" name="fd" dev="proc" ino=24904 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 19:08:12.918000 audit[3177]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe530cf991 a2=241 a3=1b6 items=1 ppid=3127 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:12.918000 audit: CWD cwd="/etc/service/enabled/cni/log"
Oct  2 19:08:12.918000 audit: PATH item=0 name="/dev/fd/63" inode=25657 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:12.918000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 19:08:12.922000 audit[3189]: AVC avc:  denied  { write } for  pid=3189 comm="tee" name="fd" dev="proc" ino=24913 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 19:08:12.922000 audit[3189]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc248ac97f a2=241 a3=1b6 items=1 ppid=3114 pid=3189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:12.922000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log"
Oct  2 19:08:12.922000 audit: PATH item=0 name="/dev/fd/63" inode=23963 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:12.922000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 19:08:12.929000 audit[3183]: AVC avc:  denied  { write } for  pid=3183 comm="tee" name="fd" dev="proc" ino=24917 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 19:08:12.929000 audit[3183]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd9713c98f a2=241 a3=1b6 items=1 ppid=3119 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:12.929000 audit: CWD cwd="/etc/service/enabled/felix/log"
Oct  2 19:08:12.929000 audit: PATH item=0 name="/dev/fd/63" inode=24901 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:12.929000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 19:08:12.956000 audit[3191]: AVC avc:  denied  { write } for  pid=3191 comm="tee" name="fd" dev="proc" ino=24932 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 19:08:12.956000 audit[3191]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc37e3e98f a2=241 a3=1b6 items=1 ppid=3121 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:12.956000 audit: CWD cwd="/etc/service/enabled/bird6/log"
Oct  2 19:08:12.956000 audit: PATH item=0 name="/dev/fd/63" inode=24910 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 19:08:12.956000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 19:08:13.126000 audit[3261]: AVC avc:  denied  { bpf } for  pid=3261 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.126000 audit[3261]: AVC avc:  denied  { bpf } for  pid=3261 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.126000 audit[3261]: AVC avc:  denied  { perfmon } for  pid=3261 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.126000 audit[3261]: AVC avc:  denied  { perfmon } for  pid=3261 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.126000 audit[3261]: AVC avc:  denied  { perfmon } for  pid=3261 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.126000 audit[3261]: AVC avc:  denied  { perfmon } for  pid=3261 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.126000 audit[3261]: AVC avc:  denied  { perfmon } for  pid=3261 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.126000 audit[3261]: AVC avc:  denied  { bpf } for  pid=3261 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.126000 audit[3261]: AVC avc:  denied  { bpf } for  pid=3261 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.126000 audit: BPF prog-id=148 op=LOAD
Oct  2 19:08:13.126000 audit[3261]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb3a52aa0 a2=70 a3=7fd9a50dd000 items=0 ppid=3120 pid=3261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:13.126000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 19:08:13.126000 audit: BPF prog-id=148 op=UNLOAD
Oct  2 19:08:13.126000 audit[3261]: AVC avc:  denied  { bpf } for  pid=3261 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.126000 audit[3261]: AVC avc:  denied  { bpf } for  pid=3261 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.126000 audit[3261]: AVC avc:  denied  { perfmon } for  pid=3261 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.126000 audit[3261]: AVC avc:  denied  { perfmon } for  pid=3261 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.126000 audit[3261]: AVC avc:  denied  { perfmon } for  pid=3261 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.126000 audit[3261]: AVC avc:  denied  { perfmon } for  pid=3261 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.126000 audit[3261]: AVC avc:  denied  { perfmon } for  pid=3261 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.126000 audit[3261]: AVC avc:  denied  { bpf } for  pid=3261 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.126000 audit[3261]: AVC avc:  denied  { bpf } for  pid=3261 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.126000 audit: BPF prog-id=149 op=LOAD
Oct  2 19:08:13.126000 audit[3261]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb3a52aa0 a2=70 a3=6e items=0 ppid=3120 pid=3261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:13.126000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 19:08:13.126000 audit: BPF prog-id=149 op=UNLOAD
Oct  2 19:08:13.126000 audit[3261]: AVC avc:  denied  { perfmon } for  pid=3261 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.126000 audit[3261]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffeb3a52a50 a2=70 a3=7ffeb3a52aa0 items=0 ppid=3120 pid=3261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:13.126000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 19:08:13.126000 audit[3261]: AVC avc:  denied  { bpf } for  pid=3261 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.126000 audit[3261]: AVC avc:  denied  { bpf } for  pid=3261 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.126000 audit[3261]: AVC avc:  denied  { perfmon } for  pid=3261 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.126000 audit[3261]: AVC avc:  denied  { perfmon } for  pid=3261 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.126000 audit[3261]: AVC avc:  denied  { perfmon } for  pid=3261 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.126000 audit[3261]: AVC avc:  denied  { perfmon } for  pid=3261 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.126000 audit[3261]: AVC avc:  denied  { perfmon } for  pid=3261 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.126000 audit[3261]: AVC avc:  denied  { bpf } for  pid=3261 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.126000 audit[3261]: AVC avc:  denied  { bpf } for  pid=3261 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.126000 audit: BPF prog-id=150 op=LOAD
Oct  2 19:08:13.126000 audit[3261]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffeb3a52a30 a2=70 a3=7ffeb3a52aa0 items=0 ppid=3120 pid=3261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:13.126000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 19:08:13.126000 audit: BPF prog-id=150 op=UNLOAD
Oct  2 19:08:13.126000 audit[3261]: AVC avc:  denied  { bpf } for  pid=3261 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.126000 audit[3261]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb3a52b10 a2=70 a3=0 items=0 ppid=3120 pid=3261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:13.126000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 19:08:13.126000 audit[3261]: AVC avc:  denied  { bpf } for  pid=3261 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.126000 audit[3261]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb3a52b00 a2=70 a3=0 items=0 ppid=3120 pid=3261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:13.126000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 19:08:13.126000 audit[3261]: AVC avc:  denied  { bpf } for  pid=3261 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.126000 audit[3261]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffeb3a52b40 a2=70 a3=0 items=0 ppid=3120 pid=3261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:13.126000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 19:08:13.127000 audit[3261]: AVC avc:  denied  { bpf } for  pid=3261 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.127000 audit[3261]: AVC avc:  denied  { bpf } for  pid=3261 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.127000 audit[3261]: AVC avc:  denied  { bpf } for  pid=3261 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.127000 audit[3261]: AVC avc:  denied  { perfmon } for  pid=3261 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.127000 audit[3261]: AVC avc:  denied  { perfmon } for  pid=3261 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.127000 audit[3261]: AVC avc:  denied  { perfmon } for  pid=3261 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.127000 audit[3261]: AVC avc:  denied  { perfmon } for  pid=3261 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.127000 audit[3261]: AVC avc:  denied  { perfmon } for  pid=3261 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.127000 audit[3261]: AVC avc:  denied  { bpf } for  pid=3261 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.127000 audit[3261]: AVC avc:  denied  { bpf } for  pid=3261 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.127000 audit: BPF prog-id=151 op=LOAD
Oct  2 19:08:13.127000 audit[3261]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffeb3a52a60 a2=70 a3=ffffffff items=0 ppid=3120 pid=3261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:13.127000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 19:08:13.131000 audit[3265]: AVC avc:  denied  { bpf } for  pid=3265 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.131000 audit[3265]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc770e1730 a2=70 a3=208 items=0 ppid=3120 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:13.131000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Oct  2 19:08:13.131000 audit[3265]: AVC avc:  denied  { bpf } for  pid=3265 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:13.131000 audit[3265]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc770e1600 a2=70 a3=3 items=0 ppid=3120 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:13.131000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Oct  2 19:08:13.139000 audit: BPF prog-id=151 op=UNLOAD
Oct  2 19:08:13.206000 audit[3295]: NETFILTER_CFG table=mangle:97 family=2 entries=19 op=nft_register_chain pid=3295 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 19:08:13.206000 audit[3295]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffc46252330 a2=0 a3=7ffc4625231c items=0 ppid=3120 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:13.206000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 19:08:13.209000 audit[3296]: NETFILTER_CFG table=raw:98 family=2 entries=19 op=nft_register_chain pid=3296 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 19:08:13.209000 audit[3296]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffd41d5ba00 a2=0 a3=5588ff5ac000 items=0 ppid=3120 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:13.209000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 19:08:13.212000 audit[3297]: NETFILTER_CFG table=filter:99 family=2 entries=39 op=nft_register_chain pid=3297 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 19:08:13.212000 audit[3297]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffebc1da900 a2=0 a3=5582403f5000 items=0 ppid=3120 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:13.212000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 19:08:13.214000 audit[3301]: NETFILTER_CFG table=nat:100 family=2 entries=16 op=nft_register_chain pid=3301 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 19:08:13.214000 audit[3301]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffc03680d30 a2=0 a3=7ffc03680d1c items=0 ppid=3120 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:13.214000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 19:08:13.271189 kubelet[1978]: E1002 19:08:13.271153    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:08:13.423070 kubelet[1978]: I1002 19:08:13.423027    1978 eviction_manager.go:346] "Eviction manager: attempting to reclaim" resourceName="ephemeral-storage"
Oct  2 19:08:13.423070 kubelet[1978]: I1002 19:08:13.423070    1978 container_gc.go:86] "Attempting to delete unused containers"
Oct  2 19:08:13.424905 kubelet[1978]: I1002 19:08:13.424877    1978 image_gc_manager.go:340] "Attempting to delete unused images"
Oct  2 19:08:13.439778 kubelet[1978]: I1002 19:08:13.439740    1978 eviction_manager.go:357] "Eviction manager: must evict pod(s) to reclaim" resourceName="ephemeral-storage"
Oct  2 19:08:13.439990 kubelet[1978]: I1002 19:08:13.439896    1978 eviction_manager.go:375] "Eviction manager: pods ranked for eviction" pods=[calico-system/calico-kube-controllers-7bd445fdb4-mjchx kube-system/coredns-5d78c9869d-szml2 kube-system/coredns-5d78c9869d-8pvzx calico-system/csi-node-driver-v789s tigera-operator/tigera-operator-59c686f986-w5w5b calico-system/calico-typha-68ff5b7b94-4ks4r calico-system/calico-node-66rxx kube-system/kube-proxy-7mshp kube-system/kube-controller-manager-localhost kube-system/kube-apiserver-localhost kube-system/kube-scheduler-localhost]
Oct  2 19:08:13.439990 kubelet[1978]: E1002 19:08:13.439938    1978 eviction_manager.go:578] "Eviction manager: cannot evict a critical pod" pod="calico-system/calico-kube-controllers-7bd445fdb4-mjchx"
Oct  2 19:08:13.439990 kubelet[1978]: E1002 19:08:13.439951    1978 eviction_manager.go:578] "Eviction manager: cannot evict a critical pod" pod="kube-system/coredns-5d78c9869d-szml2"
Oct  2 19:08:13.439990 kubelet[1978]: E1002 19:08:13.439962    1978 eviction_manager.go:578] "Eviction manager: cannot evict a critical pod" pod="kube-system/coredns-5d78c9869d-8pvzx"
Oct  2 19:08:13.439990 kubelet[1978]: E1002 19:08:13.439972    1978 eviction_manager.go:578] "Eviction manager: cannot evict a critical pod" pod="calico-system/csi-node-driver-v789s"
Oct  2 19:08:13.440860 env[1104]: time="2023-10-02T19:08:13.440794596Z" level=info msg="StopContainer for \"84affad1210b6154d1b11e8bba48128d416fb231715badb5110817a9702be954\" with timeout 30 (s)"
Oct  2 19:08:13.441638 env[1104]: time="2023-10-02T19:08:13.441565734Z" level=info msg="Stop container \"84affad1210b6154d1b11e8bba48128d416fb231715badb5110817a9702be954\" with signal terminated"
Oct  2 19:08:13.451000 audit: BPF prog-id=123 op=UNLOAD
Oct  2 19:08:13.452080 systemd[1]: cri-containerd-84affad1210b6154d1b11e8bba48128d416fb231715badb5110817a9702be954.scope: Deactivated successfully.
Oct  2 19:08:13.452373 systemd[1]: cri-containerd-84affad1210b6154d1b11e8bba48128d416fb231715badb5110817a9702be954.scope: Consumed 1.454s CPU time.
Oct  2 19:08:13.454000 audit: BPF prog-id=126 op=UNLOAD
Oct  2 19:08:13.474398 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-84affad1210b6154d1b11e8bba48128d416fb231715badb5110817a9702be954-rootfs.mount: Deactivated successfully.
Oct  2 19:08:13.577581 env[1104]: time="2023-10-02T19:08:13.577501142Z" level=info msg="shim disconnected" id=84affad1210b6154d1b11e8bba48128d416fb231715badb5110817a9702be954
Oct  2 19:08:13.577581 env[1104]: time="2023-10-02T19:08:13.577554021Z" level=warning msg="cleaning up after shim disconnected" id=84affad1210b6154d1b11e8bba48128d416fb231715badb5110817a9702be954 namespace=k8s.io
Oct  2 19:08:13.577581 env[1104]: time="2023-10-02T19:08:13.577563769Z" level=info msg="cleaning up dead shim"
Oct  2 19:08:13.585551 env[1104]: time="2023-10-02T19:08:13.585495914Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:08:13Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3344 runtime=io.containerd.runc.v2\n"
Oct  2 19:08:13.589991 env[1104]: time="2023-10-02T19:08:13.589943591Z" level=info msg="StopContainer for \"84affad1210b6154d1b11e8bba48128d416fb231715badb5110817a9702be954\" returns successfully"
Oct  2 19:08:13.590661 env[1104]: time="2023-10-02T19:08:13.590610763Z" level=info msg="StopPodSandbox for \"e58a960921adecfb71f46db8229d19f03c17398cafa7464653628e3189393ccc\""
Oct  2 19:08:13.590841 env[1104]: time="2023-10-02T19:08:13.590688619Z" level=info msg="Container to stop \"84affad1210b6154d1b11e8bba48128d416fb231715badb5110817a9702be954\" must be in running or unknown state, current state \"CONTAINER_EXITED\""
Oct  2 19:08:13.592981 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e58a960921adecfb71f46db8229d19f03c17398cafa7464653628e3189393ccc-shm.mount: Deactivated successfully.
Oct  2 19:08:13.596000 audit: BPF prog-id=119 op=UNLOAD
Oct  2 19:08:13.597486 systemd[1]: cri-containerd-e58a960921adecfb71f46db8229d19f03c17398cafa7464653628e3189393ccc.scope: Deactivated successfully.
Oct  2 19:08:13.603000 audit: BPF prog-id=122 op=UNLOAD
Oct  2 19:08:13.615071 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e58a960921adecfb71f46db8229d19f03c17398cafa7464653628e3189393ccc-rootfs.mount: Deactivated successfully.
Oct  2 19:08:13.618917 env[1104]: time="2023-10-02T19:08:13.618853734Z" level=info msg="shim disconnected" id=e58a960921adecfb71f46db8229d19f03c17398cafa7464653628e3189393ccc
Oct  2 19:08:13.619028 env[1104]: time="2023-10-02T19:08:13.618921952Z" level=warning msg="cleaning up after shim disconnected" id=e58a960921adecfb71f46db8229d19f03c17398cafa7464653628e3189393ccc namespace=k8s.io
Oct  2 19:08:13.619028 env[1104]: time="2023-10-02T19:08:13.618933874Z" level=info msg="cleaning up dead shim"
Oct  2 19:08:13.627193 env[1104]: time="2023-10-02T19:08:13.627138532Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:08:13Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3375 runtime=io.containerd.runc.v2\n"
Oct  2 19:08:13.627594 env[1104]: time="2023-10-02T19:08:13.627557598Z" level=info msg="TearDown network for sandbox \"e58a960921adecfb71f46db8229d19f03c17398cafa7464653628e3189393ccc\" successfully"
Oct  2 19:08:13.627594 env[1104]: time="2023-10-02T19:08:13.627584769Z" level=info msg="StopPodSandbox for \"e58a960921adecfb71f46db8229d19f03c17398cafa7464653628e3189393ccc\" returns successfully"
Oct  2 19:08:13.632407 kubelet[1978]: I1002 19:08:13.632387    1978 eviction_manager.go:596] "Eviction manager: pod is evicted successfully" pod="tigera-operator/tigera-operator-59c686f986-w5w5b"
Oct  2 19:08:13.632407 kubelet[1978]: I1002 19:08:13.632412    1978 eviction_manager.go:205] "Eviction manager: pods evicted, waiting for pod to be cleaned up" pods=[tigera-operator/tigera-operator-59c686f986-w5w5b]
Oct  2 19:08:13.640398 kubelet[1978]: I1002 19:08:13.640330    1978 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-66rxx" podStartSLOduration=3.395806312 podCreationTimestamp="2023-10-02 19:07:35 +0000 UTC" firstStartedPulling="2023-10-02 19:07:36.162687262 +0000 UTC m=+23.135206104" lastFinishedPulling="2023-10-02 19:08:11.407171512 +0000 UTC m=+58.379690354" observedRunningTime="2023-10-02 19:08:12.286932053 +0000 UTC m=+59.259450895" watchObservedRunningTime="2023-10-02 19:08:13.640290562 +0000 UTC m=+60.612809405"
Oct  2 19:08:13.714751 kubelet[1978]: I1002 19:08:13.714703    1978 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/e84d9501-31f2-449b-ac16-9e81d1ada923-var-lib-calico\") pod \"e84d9501-31f2-449b-ac16-9e81d1ada923\" (UID: \"e84d9501-31f2-449b-ac16-9e81d1ada923\") "
Oct  2 19:08:13.714952 kubelet[1978]: I1002 19:08:13.714776    1978 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-hbkks\" (UniqueName: \"kubernetes.io/projected/e84d9501-31f2-449b-ac16-9e81d1ada923-kube-api-access-hbkks\") pod \"e84d9501-31f2-449b-ac16-9e81d1ada923\" (UID: \"e84d9501-31f2-449b-ac16-9e81d1ada923\") "
Oct  2 19:08:13.714952 kubelet[1978]: I1002 19:08:13.714858    1978 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/e84d9501-31f2-449b-ac16-9e81d1ada923-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "e84d9501-31f2-449b-ac16-9e81d1ada923" (UID: "e84d9501-31f2-449b-ac16-9e81d1ada923"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue ""
Oct  2 19:08:13.718478 kubelet[1978]: I1002 19:08:13.718440    1978 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/e84d9501-31f2-449b-ac16-9e81d1ada923-kube-api-access-hbkks" (OuterVolumeSpecName: "kube-api-access-hbkks") pod "e84d9501-31f2-449b-ac16-9e81d1ada923" (UID: "e84d9501-31f2-449b-ac16-9e81d1ada923"). InnerVolumeSpecName "kube-api-access-hbkks". PluginName "kubernetes.io/projected", VolumeGidValue ""
Oct  2 19:08:13.719930 systemd[1]: var-lib-kubelet-pods-e84d9501\x2d31f2\x2d449b\x2dac16\x2d9e81d1ada923-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dhbkks.mount: Deactivated successfully.
Oct  2 19:08:13.816106 kubelet[1978]: I1002 19:08:13.815938    1978 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-hbkks\" (UniqueName: \"kubernetes.io/projected/e84d9501-31f2-449b-ac16-9e81d1ada923-kube-api-access-hbkks\") on node \"localhost\" DevicePath \"\""
Oct  2 19:08:13.816106 kubelet[1978]: I1002 19:08:13.815981    1978 reconciler_common.go:300] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/e84d9501-31f2-449b-ac16-9e81d1ada923-var-lib-calico\") on node \"localhost\" DevicePath \"\""
Oct  2 19:08:14.064640 systemd-networkd[1003]: vxlan.calico: Link UP
Oct  2 19:08:14.064650 systemd-networkd[1003]: vxlan.calico: Gained carrier
Oct  2 19:08:14.130336 env[1104]: time="2023-10-02T19:08:14.130019397Z" level=info msg="StopPodSandbox for \"704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb\""
Oct  2 19:08:14.274816 kubelet[1978]: I1002 19:08:14.274482    1978 scope.go:115] "RemoveContainer" containerID="84affad1210b6154d1b11e8bba48128d416fb231715badb5110817a9702be954"
Oct  2 19:08:14.276261 env[1104]: time="2023-10-02T19:08:14.276216874Z" level=info msg="RemoveContainer for \"84affad1210b6154d1b11e8bba48128d416fb231715badb5110817a9702be954\""
Oct  2 19:08:14.277767 systemd[1]: Removed slice kubepods-besteffort-pode84d9501_31f2_449b_ac16_9e81d1ada923.slice.
Oct  2 19:08:14.277844 systemd[1]: kubepods-besteffort-pode84d9501_31f2_449b_ac16_9e81d1ada923.slice: Consumed 1.481s CPU time.
Oct  2 19:08:14.281527 env[1104]: time="2023-10-02T19:08:14.281471966Z" level=info msg="RemoveContainer for \"84affad1210b6154d1b11e8bba48128d416fb231715badb5110817a9702be954\" returns successfully"
Oct  2 19:08:14.281773 kubelet[1978]: I1002 19:08:14.281746    1978 scope.go:115] "RemoveContainer" containerID="84affad1210b6154d1b11e8bba48128d416fb231715badb5110817a9702be954"
Oct  2 19:08:14.282352 env[1104]: time="2023-10-02T19:08:14.282188861Z" level=error msg="ContainerStatus for \"84affad1210b6154d1b11e8bba48128d416fb231715badb5110817a9702be954\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"84affad1210b6154d1b11e8bba48128d416fb231715badb5110817a9702be954\": not found"
Oct  2 19:08:14.282619 kubelet[1978]: E1002 19:08:14.282577    1978 remote_runtime.go:415] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"84affad1210b6154d1b11e8bba48128d416fb231715badb5110817a9702be954\": not found" containerID="84affad1210b6154d1b11e8bba48128d416fb231715badb5110817a9702be954"
Oct  2 19:08:14.282619 kubelet[1978]: I1002 19:08:14.282619    1978 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={Type:containerd ID:84affad1210b6154d1b11e8bba48128d416fb231715badb5110817a9702be954} err="failed to get container status \"84affad1210b6154d1b11e8bba48128d416fb231715badb5110817a9702be954\": rpc error: code = NotFound desc = an error occurred when try to find container \"84affad1210b6154d1b11e8bba48128d416fb231715badb5110817a9702be954\": not found"
Oct  2 19:08:14.340889 env[1104]: 2023-10-02 19:08:14.220 [INFO][3408] k8s.go 576: Cleaning up netns ContainerID="704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb"
Oct  2 19:08:14.340889 env[1104]: 2023-10-02 19:08:14.221 [INFO][3408] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb" iface="eth0" netns="/var/run/netns/cni-9c920a74-7a91-08ea-f035-e7b10bc6d010"
Oct  2 19:08:14.340889 env[1104]: 2023-10-02 19:08:14.222 [INFO][3408] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb" iface="eth0" netns="/var/run/netns/cni-9c920a74-7a91-08ea-f035-e7b10bc6d010"
Oct  2 19:08:14.340889 env[1104]: 2023-10-02 19:08:14.222 [INFO][3408] dataplane_linux.go 562: Workload's veth was already gone.  Nothing to do. ContainerID="704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb" iface="eth0" netns="/var/run/netns/cni-9c920a74-7a91-08ea-f035-e7b10bc6d010"
Oct  2 19:08:14.340889 env[1104]: 2023-10-02 19:08:14.222 [INFO][3408] k8s.go 583: Releasing IP address(es) ContainerID="704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb"
Oct  2 19:08:14.340889 env[1104]: 2023-10-02 19:08:14.222 [INFO][3408] utils.go 196: Calico CNI releasing IP address ContainerID="704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb"
Oct  2 19:08:14.340889 env[1104]: 2023-10-02 19:08:14.322 [INFO][3415] ipam_plugin.go 416: Releasing address using handleID ContainerID="704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb" HandleID="k8s-pod-network.704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb" Workload="localhost-k8s-coredns--5d78c9869d--8pvzx-eth0"
Oct  2 19:08:14.340889 env[1104]: time="2023-10-02T19:08:14Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:08:14.340889 env[1104]: time="2023-10-02T19:08:14Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:08:14.340889 env[1104]: 2023-10-02 19:08:14.336 [WARNING][3415] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb" HandleID="k8s-pod-network.704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb" Workload="localhost-k8s-coredns--5d78c9869d--8pvzx-eth0"
Oct  2 19:08:14.340889 env[1104]: 2023-10-02 19:08:14.336 [INFO][3415] ipam_plugin.go 444: Releasing address using workloadID ContainerID="704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb" HandleID="k8s-pod-network.704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb" Workload="localhost-k8s-coredns--5d78c9869d--8pvzx-eth0"
Oct  2 19:08:14.340889 env[1104]: time="2023-10-02T19:08:14Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:08:14.340889 env[1104]: 2023-10-02 19:08:14.339 [INFO][3408] k8s.go 589: Teardown processing complete. ContainerID="704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb"
Oct  2 19:08:14.341439 env[1104]: time="2023-10-02T19:08:14.341055939Z" level=info msg="TearDown network for sandbox \"704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb\" successfully"
Oct  2 19:08:14.341439 env[1104]: time="2023-10-02T19:08:14.341092748Z" level=info msg="StopPodSandbox for \"704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb\" returns successfully"
Oct  2 19:08:14.341493 kubelet[1978]: E1002 19:08:14.341438    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:08:14.342994 env[1104]: time="2023-10-02T19:08:14.342079790Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-8pvzx,Uid:45dbd647-0143-42f4-92f9-e54c68348a9c,Namespace:kube-system,Attempt:1,}"
Oct  2 19:08:14.342642 systemd[1]: run-netns-cni\x2d9c920a74\x2d7a91\x2d08ea\x2df035\x2de7b10bc6d010.mount: Deactivated successfully.
Oct  2 19:08:14.633453 kubelet[1978]: I1002 19:08:14.633375    1978 eviction_manager.go:427] "Eviction manager: pods successfully cleaned up" pods=[tigera-operator/tigera-operator-59c686f986-w5w5b]
Oct  2 19:08:14.644115 kubelet[1978]: I1002 19:08:14.644083    1978 eviction_manager.go:346] "Eviction manager: attempting to reclaim" resourceName="ephemeral-storage"
Oct  2 19:08:14.644115 kubelet[1978]: I1002 19:08:14.644122    1978 container_gc.go:86] "Attempting to delete unused containers"
Oct  2 19:08:14.645526 env[1104]: time="2023-10-02T19:08:14.645489084Z" level=info msg="StopPodSandbox for \"e58a960921adecfb71f46db8229d19f03c17398cafa7464653628e3189393ccc\""
Oct  2 19:08:14.645792 env[1104]: time="2023-10-02T19:08:14.645587388Z" level=info msg="TearDown network for sandbox \"e58a960921adecfb71f46db8229d19f03c17398cafa7464653628e3189393ccc\" successfully"
Oct  2 19:08:14.645792 env[1104]: time="2023-10-02T19:08:14.645622244Z" level=info msg="StopPodSandbox for \"e58a960921adecfb71f46db8229d19f03c17398cafa7464653628e3189393ccc\" returns successfully"
Oct  2 19:08:14.645954 env[1104]: time="2023-10-02T19:08:14.645931565Z" level=info msg="RemovePodSandbox for \"e58a960921adecfb71f46db8229d19f03c17398cafa7464653628e3189393ccc\""
Oct  2 19:08:14.646006 env[1104]: time="2023-10-02T19:08:14.645953436Z" level=info msg="Forcibly stopping sandbox \"e58a960921adecfb71f46db8229d19f03c17398cafa7464653628e3189393ccc\""
Oct  2 19:08:14.646006 env[1104]: time="2023-10-02T19:08:14.646001286Z" level=info msg="TearDown network for sandbox \"e58a960921adecfb71f46db8229d19f03c17398cafa7464653628e3189393ccc\" successfully"
Oct  2 19:08:14.650378 env[1104]: time="2023-10-02T19:08:14.650343493Z" level=info msg="RemovePodSandbox \"e58a960921adecfb71f46db8229d19f03c17398cafa7464653628e3189393ccc\" returns successfully"
Oct  2 19:08:14.650905 kubelet[1978]: I1002 19:08:14.650864    1978 image_gc_manager.go:340] "Attempting to delete unused images"
Oct  2 19:08:14.663650 kubelet[1978]: I1002 19:08:14.663608    1978 eviction_manager.go:357] "Eviction manager: must evict pod(s) to reclaim" resourceName="ephemeral-storage"
Oct  2 19:08:14.663814 kubelet[1978]: I1002 19:08:14.663756    1978 eviction_manager.go:375] "Eviction manager: pods ranked for eviction" pods=[kube-system/coredns-5d78c9869d-szml2 kube-system/coredns-5d78c9869d-8pvzx calico-system/calico-kube-controllers-7bd445fdb4-mjchx calico-system/csi-node-driver-v789s calico-system/calico-typha-68ff5b7b94-4ks4r calico-system/calico-node-66rxx kube-system/kube-proxy-7mshp kube-system/kube-controller-manager-localhost kube-system/kube-apiserver-localhost kube-system/kube-scheduler-localhost]
Oct  2 19:08:14.663814 kubelet[1978]: E1002 19:08:14.663783    1978 eviction_manager.go:578] "Eviction manager: cannot evict a critical pod" pod="kube-system/coredns-5d78c9869d-szml2"
Oct  2 19:08:14.663814 kubelet[1978]: E1002 19:08:14.663791    1978 eviction_manager.go:578] "Eviction manager: cannot evict a critical pod" pod="kube-system/coredns-5d78c9869d-8pvzx"
Oct  2 19:08:14.663814 kubelet[1978]: E1002 19:08:14.663800    1978 eviction_manager.go:578] "Eviction manager: cannot evict a critical pod" pod="calico-system/calico-kube-controllers-7bd445fdb4-mjchx"
Oct  2 19:08:14.663814 kubelet[1978]: E1002 19:08:14.663807    1978 eviction_manager.go:578] "Eviction manager: cannot evict a critical pod" pod="calico-system/csi-node-driver-v789s"
Oct  2 19:08:14.663814 kubelet[1978]: E1002 19:08:14.663817    1978 eviction_manager.go:578] "Eviction manager: cannot evict a critical pod" pod="calico-system/calico-typha-68ff5b7b94-4ks4r"
Oct  2 19:08:14.663987 kubelet[1978]: E1002 19:08:14.663826    1978 eviction_manager.go:578] "Eviction manager: cannot evict a critical pod" pod="calico-system/calico-node-66rxx"
Oct  2 19:08:14.663987 kubelet[1978]: E1002 19:08:14.663835    1978 eviction_manager.go:578] "Eviction manager: cannot evict a critical pod" pod="kube-system/kube-proxy-7mshp"
Oct  2 19:08:14.663987 kubelet[1978]: E1002 19:08:14.663845    1978 eviction_manager.go:578] "Eviction manager: cannot evict a critical pod" pod="kube-system/kube-controller-manager-localhost"
Oct  2 19:08:14.663987 kubelet[1978]: E1002 19:08:14.663853    1978 eviction_manager.go:578] "Eviction manager: cannot evict a critical pod" pod="kube-system/kube-apiserver-localhost"
Oct  2 19:08:14.663987 kubelet[1978]: E1002 19:08:14.663861    1978 eviction_manager.go:578] "Eviction manager: cannot evict a critical pod" pod="kube-system/kube-scheduler-localhost"
Oct  2 19:08:14.663987 kubelet[1978]: I1002 19:08:14.663870    1978 eviction_manager.go:407] "Eviction manager: unable to evict any pods from the node"
Oct  2 19:08:14.830607 env[1104]: time="2023-10-02T19:08:14.830539481Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:08:14.832241 env[1104]: time="2023-10-02T19:08:14.832200278Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:08:14.833935 env[1104]: time="2023-10-02T19:08:14.833903414Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:08:14.835621 env[1104]: time="2023-10-02T19:08:14.835581282Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:08:14.936589 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Oct  2 19:08:14.936736 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9cdd6fb8998: link becomes ready
Oct  2 19:08:14.943036 systemd-networkd[1003]: cali9cdd6fb8998: Link UP
Oct  2 19:08:14.943044 systemd-networkd[1003]: cali9cdd6fb8998: Gained carrier
Oct  2 19:08:14.955710 env[1104]: 2023-10-02 19:08:14.874 [INFO][3441] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5d78c9869d--8pvzx-eth0 coredns-5d78c9869d- kube-system  45dbd647-0143-42f4-92f9-e54c68348a9c 860 0 2023-10-02 19:07:29 +0000 UTC <nil> <nil> map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] []  []} {k8s  localhost  coredns-5d78c9869d-8pvzx eth0 coredns [] []   [kns.kube-system ksa.kube-system.coredns] cali9cdd6fb8998  [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="dbf813839a8420050778145fd0249722effe093999f4717a5259e96be7f6e7e1" Namespace="kube-system" Pod="coredns-5d78c9869d-8pvzx" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--8pvzx-"
Oct  2 19:08:14.955710 env[1104]: 2023-10-02 19:08:14.875 [INFO][3441] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="dbf813839a8420050778145fd0249722effe093999f4717a5259e96be7f6e7e1" Namespace="kube-system" Pod="coredns-5d78c9869d-8pvzx" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--8pvzx-eth0"
Oct  2 19:08:14.955710 env[1104]: 2023-10-02 19:08:14.900 [INFO][3450] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dbf813839a8420050778145fd0249722effe093999f4717a5259e96be7f6e7e1" HandleID="k8s-pod-network.dbf813839a8420050778145fd0249722effe093999f4717a5259e96be7f6e7e1" Workload="localhost-k8s-coredns--5d78c9869d--8pvzx-eth0"
Oct  2 19:08:14.955710 env[1104]: 2023-10-02 19:08:14.908 [INFO][3450] ipam_plugin.go 269: Auto assigning IP ContainerID="dbf813839a8420050778145fd0249722effe093999f4717a5259e96be7f6e7e1" HandleID="k8s-pod-network.dbf813839a8420050778145fd0249722effe093999f4717a5259e96be7f6e7e1" Workload="localhost-k8s-coredns--5d78c9869d--8pvzx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000c1500), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5d78c9869d-8pvzx", "timestamp":"2023-10-02 19:08:14.900116717 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Oct  2 19:08:14.955710 env[1104]: time="2023-10-02T19:08:14Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:08:14.955710 env[1104]: time="2023-10-02T19:08:14Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:08:14.955710 env[1104]: 2023-10-02 19:08:14.909 [INFO][3450] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost'
Oct  2 19:08:14.955710 env[1104]: 2023-10-02 19:08:14.911 [INFO][3450] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.dbf813839a8420050778145fd0249722effe093999f4717a5259e96be7f6e7e1" host="localhost"
Oct  2 19:08:14.955710 env[1104]: 2023-10-02 19:08:14.916 [INFO][3450] ipam.go 372: Looking up existing affinities for host host="localhost"
Oct  2 19:08:14.955710 env[1104]: 2023-10-02 19:08:14.919 [INFO][3450] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost"
Oct  2 19:08:14.955710 env[1104]: 2023-10-02 19:08:14.921 [INFO][3450] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost"
Oct  2 19:08:14.955710 env[1104]: 2023-10-02 19:08:14.923 [INFO][3450] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost"
Oct  2 19:08:14.955710 env[1104]: 2023-10-02 19:08:14.923 [INFO][3450] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.dbf813839a8420050778145fd0249722effe093999f4717a5259e96be7f6e7e1" host="localhost"
Oct  2 19:08:14.955710 env[1104]: 2023-10-02 19:08:14.924 [INFO][3450] ipam.go 1682: Creating new handle: k8s-pod-network.dbf813839a8420050778145fd0249722effe093999f4717a5259e96be7f6e7e1
Oct  2 19:08:14.955710 env[1104]: 2023-10-02 19:08:14.927 [INFO][3450] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.dbf813839a8420050778145fd0249722effe093999f4717a5259e96be7f6e7e1" host="localhost"
Oct  2 19:08:14.955710 env[1104]: 2023-10-02 19:08:14.931 [INFO][3450] ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.dbf813839a8420050778145fd0249722effe093999f4717a5259e96be7f6e7e1" host="localhost"
Oct  2 19:08:14.955710 env[1104]: 2023-10-02 19:08:14.931 [INFO][3450] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.dbf813839a8420050778145fd0249722effe093999f4717a5259e96be7f6e7e1" host="localhost"
Oct  2 19:08:14.955710 env[1104]: time="2023-10-02T19:08:14Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:08:14.955710 env[1104]: 2023-10-02 19:08:14.931 [INFO][3450] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="dbf813839a8420050778145fd0249722effe093999f4717a5259e96be7f6e7e1" HandleID="k8s-pod-network.dbf813839a8420050778145fd0249722effe093999f4717a5259e96be7f6e7e1" Workload="localhost-k8s-coredns--5d78c9869d--8pvzx-eth0"
Oct  2 19:08:14.956562 env[1104]: 2023-10-02 19:08:14.933 [INFO][3441] k8s.go 383: Populated endpoint ContainerID="dbf813839a8420050778145fd0249722effe093999f4717a5259e96be7f6e7e1" Namespace="kube-system" Pod="coredns-5d78c9869d-8pvzx" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--8pvzx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--8pvzx-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"45dbd647-0143-42f4-92f9-e54c68348a9c", ResourceVersion:"860", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 29, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5d78c9869d-8pvzx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9cdd6fb8998", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:08:14.956562 env[1104]: 2023-10-02 19:08:14.934 [INFO][3441] k8s.go 384: Calico CNI using IPs: [192.168.88.129/32] ContainerID="dbf813839a8420050778145fd0249722effe093999f4717a5259e96be7f6e7e1" Namespace="kube-system" Pod="coredns-5d78c9869d-8pvzx" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--8pvzx-eth0"
Oct  2 19:08:14.956562 env[1104]: 2023-10-02 19:08:14.934 [INFO][3441] dataplane_linux.go 68: Setting the host side veth name to cali9cdd6fb8998 ContainerID="dbf813839a8420050778145fd0249722effe093999f4717a5259e96be7f6e7e1" Namespace="kube-system" Pod="coredns-5d78c9869d-8pvzx" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--8pvzx-eth0"
Oct  2 19:08:14.956562 env[1104]: 2023-10-02 19:08:14.936 [INFO][3441] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="dbf813839a8420050778145fd0249722effe093999f4717a5259e96be7f6e7e1" Namespace="kube-system" Pod="coredns-5d78c9869d-8pvzx" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--8pvzx-eth0"
Oct  2 19:08:14.956562 env[1104]: 2023-10-02 19:08:14.943 [INFO][3441] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="dbf813839a8420050778145fd0249722effe093999f4717a5259e96be7f6e7e1" Namespace="kube-system" Pod="coredns-5d78c9869d-8pvzx" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--8pvzx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--8pvzx-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"45dbd647-0143-42f4-92f9-e54c68348a9c", ResourceVersion:"860", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 29, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"dbf813839a8420050778145fd0249722effe093999f4717a5259e96be7f6e7e1", Pod:"coredns-5d78c9869d-8pvzx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9cdd6fb8998", MAC:"2e:72:41:7a:b0:0e", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:08:14.956562 env[1104]: 2023-10-02 19:08:14.953 [INFO][3441] k8s.go 489: Wrote updated endpoint to datastore ContainerID="dbf813839a8420050778145fd0249722effe093999f4717a5259e96be7f6e7e1" Namespace="kube-system" Pod="coredns-5d78c9869d-8pvzx" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--8pvzx-eth0"
Oct  2 19:08:14.965797 env[1104]: time="2023-10-02T19:08:14.965730705Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 19:08:14.965797 env[1104]: time="2023-10-02T19:08:14.965794024Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 19:08:14.966019 env[1104]: time="2023-10-02T19:08:14.965815574Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 19:08:14.966019 env[1104]: time="2023-10-02T19:08:14.965954575Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dbf813839a8420050778145fd0249722effe093999f4717a5259e96be7f6e7e1 pid=3483 runtime=io.containerd.runc.v2
Oct  2 19:08:14.974000 audit[3499]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=3499 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 19:08:14.974000 audit[3499]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffd9ce9d900 a2=0 a3=7ffd9ce9d8ec items=0 ppid=3120 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:14.974000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 19:08:14.978955 systemd[1]: Started cri-containerd-dbf813839a8420050778145fd0249722effe093999f4717a5259e96be7f6e7e1.scope.
Oct  2 19:08:14.986000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.986000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.986000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.986000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.986000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.986000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.986000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.986000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.986000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.986000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.986000 audit: BPF prog-id=152 op=LOAD
Oct  2 19:08:14.986000 audit[3492]: AVC avc:  denied  { bpf } for  pid=3492 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.986000 audit[3492]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3483 pid=3492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:14.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462663831333833396138343230303530373738313435666430323439
Oct  2 19:08:14.987000 audit[3492]: AVC avc:  denied  { perfmon } for  pid=3492 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.987000 audit[3492]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=3483 pid=3492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:14.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462663831333833396138343230303530373738313435666430323439
Oct  2 19:08:14.987000 audit[3492]: AVC avc:  denied  { bpf } for  pid=3492 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.987000 audit[3492]: AVC avc:  denied  { bpf } for  pid=3492 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.987000 audit[3492]: AVC avc:  denied  { bpf } for  pid=3492 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.987000 audit[3492]: AVC avc:  denied  { perfmon } for  pid=3492 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.987000 audit[3492]: AVC avc:  denied  { perfmon } for  pid=3492 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.987000 audit[3492]: AVC avc:  denied  { perfmon } for  pid=3492 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.987000 audit[3492]: AVC avc:  denied  { perfmon } for  pid=3492 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.987000 audit[3492]: AVC avc:  denied  { perfmon } for  pid=3492 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.987000 audit[3492]: AVC avc:  denied  { bpf } for  pid=3492 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.987000 audit[3492]: AVC avc:  denied  { bpf } for  pid=3492 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.987000 audit: BPF prog-id=153 op=LOAD
Oct  2 19:08:14.987000 audit[3492]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0003b2720 items=0 ppid=3483 pid=3492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:14.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462663831333833396138343230303530373738313435666430323439
Oct  2 19:08:14.987000 audit[3492]: AVC avc:  denied  { bpf } for  pid=3492 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.987000 audit[3492]: AVC avc:  denied  { bpf } for  pid=3492 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.987000 audit[3492]: AVC avc:  denied  { perfmon } for  pid=3492 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.987000 audit[3492]: AVC avc:  denied  { perfmon } for  pid=3492 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.987000 audit[3492]: AVC avc:  denied  { perfmon } for  pid=3492 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.987000 audit[3492]: AVC avc:  denied  { perfmon } for  pid=3492 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.987000 audit[3492]: AVC avc:  denied  { perfmon } for  pid=3492 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.987000 audit[3492]: AVC avc:  denied  { bpf } for  pid=3492 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.987000 audit[3492]: AVC avc:  denied  { bpf } for  pid=3492 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.987000 audit: BPF prog-id=154 op=LOAD
Oct  2 19:08:14.987000 audit[3492]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0003b2768 items=0 ppid=3483 pid=3492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:14.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462663831333833396138343230303530373738313435666430323439
Oct  2 19:08:14.987000 audit: BPF prog-id=154 op=UNLOAD
Oct  2 19:08:14.987000 audit: BPF prog-id=153 op=UNLOAD
Oct  2 19:08:14.987000 audit[3492]: AVC avc:  denied  { bpf } for  pid=3492 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.987000 audit[3492]: AVC avc:  denied  { bpf } for  pid=3492 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.987000 audit[3492]: AVC avc:  denied  { bpf } for  pid=3492 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.987000 audit[3492]: AVC avc:  denied  { perfmon } for  pid=3492 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.987000 audit[3492]: AVC avc:  denied  { perfmon } for  pid=3492 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.987000 audit[3492]: AVC avc:  denied  { perfmon } for  pid=3492 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.987000 audit[3492]: AVC avc:  denied  { perfmon } for  pid=3492 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.987000 audit[3492]: AVC avc:  denied  { perfmon } for  pid=3492 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.987000 audit[3492]: AVC avc:  denied  { bpf } for  pid=3492 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.987000 audit[3492]: AVC avc:  denied  { bpf } for  pid=3492 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:14.987000 audit: BPF prog-id=155 op=LOAD
Oct  2 19:08:14.987000 audit[3492]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0003b2b78 items=0 ppid=3483 pid=3492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:14.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462663831333833396138343230303530373738313435666430323439
Oct  2 19:08:14.989147 systemd-resolved[1052]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address
Oct  2 19:08:15.013480 env[1104]: time="2023-10-02T19:08:15.013415969Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-8pvzx,Uid:45dbd647-0143-42f4-92f9-e54c68348a9c,Namespace:kube-system,Attempt:1,} returns sandbox id \"dbf813839a8420050778145fd0249722effe093999f4717a5259e96be7f6e7e1\""
Oct  2 19:08:15.014220 kubelet[1978]: E1002 19:08:15.014197    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:08:15.015778 env[1104]: time="2023-10-02T19:08:15.015111861Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\""
Oct  2 19:08:15.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.30:22-10.0.0.1:35108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:15.834601 systemd[1]: Started sshd@9-10.0.0.30:22-10.0.0.1:35108.service.
Oct  2 19:08:15.850324 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3903667635.mount: Deactivated successfully.
Oct  2 19:08:15.874000 audit[3524]: USER_ACCT pid=3524 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:15.875621 sshd[3524]: Accepted publickey for core from 10.0.0.1 port 35108 ssh2: RSA SHA256:9wRqOmzBU7I1L73Sd3XbDPVeoZziQ4I3fHnP0PJ8idM
Oct  2 19:08:15.875000 audit[3524]: CRED_ACQ pid=3524 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:15.876000 audit[3524]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec90d6e40 a2=3 a3=0 items=0 ppid=1 pid=3524 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:15.876000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Oct  2 19:08:15.878723 sshd[3524]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:08:15.884292 systemd-logind[1090]: New session 10 of user core.
Oct  2 19:08:15.885492 systemd[1]: Started session-10.scope.
Oct  2 19:08:15.890000 audit[3524]: USER_START pid=3524 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:15.892000 audit[3526]: CRED_ACQ pid=3526 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:15.914446 systemd-networkd[1003]: vxlan.calico: Gained IPv6LL
Oct  2 19:08:16.060382 sshd[3524]: pam_unix(sshd:session): session closed for user core
Oct  2 19:08:16.061000 audit[3524]: USER_END pid=3524 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:16.061000 audit[3524]: CRED_DISP pid=3524 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:16.065967 systemd[1]: Started sshd@10-10.0.0.30:22-10.0.0.1:35110.service.
Oct  2 19:08:16.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.30:22-10.0.0.1:35110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:16.066722 systemd[1]: sshd@9-10.0.0.30:22-10.0.0.1:35108.service: Deactivated successfully.
Oct  2 19:08:16.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.30:22-10.0.0.1:35108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:16.067518 systemd[1]: session-10.scope: Deactivated successfully.
Oct  2 19:08:16.069367 systemd-logind[1090]: Session 10 logged out. Waiting for processes to exit.
Oct  2 19:08:16.070384 systemd-logind[1090]: Removed session 10.
Oct  2 19:08:16.095000 audit[3582]: USER_ACCT pid=3582 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:16.096929 sshd[3582]: Accepted publickey for core from 10.0.0.1 port 35110 ssh2: RSA SHA256:9wRqOmzBU7I1L73Sd3XbDPVeoZziQ4I3fHnP0PJ8idM
Oct  2 19:08:16.097000 audit[3582]: CRED_ACQ pid=3582 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:16.097000 audit[3582]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7d8c3a50 a2=3 a3=0 items=0 ppid=1 pid=3582 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:16.097000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Oct  2 19:08:16.098685 sshd[3582]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:08:16.102697 systemd-logind[1090]: New session 11 of user core.
Oct  2 19:08:16.103659 systemd[1]: Started session-11.scope.
Oct  2 19:08:16.106000 audit[3582]: USER_START pid=3582 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:16.108000 audit[3585]: CRED_ACQ pid=3585 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:16.129187 env[1104]: time="2023-10-02T19:08:16.129134865Z" level=info msg="StopPodSandbox for \"503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb\""
Oct  2 19:08:16.239118 env[1104]: 2023-10-02 19:08:16.190 [INFO][3601] k8s.go 576: Cleaning up netns ContainerID="503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb"
Oct  2 19:08:16.239118 env[1104]: 2023-10-02 19:08:16.190 [INFO][3601] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb" iface="eth0" netns="/var/run/netns/cni-88584fbd-6b73-6afb-cd48-c368b56df7b1"
Oct  2 19:08:16.239118 env[1104]: 2023-10-02 19:08:16.190 [INFO][3601] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb" iface="eth0" netns="/var/run/netns/cni-88584fbd-6b73-6afb-cd48-c368b56df7b1"
Oct  2 19:08:16.239118 env[1104]: 2023-10-02 19:08:16.191 [INFO][3601] dataplane_linux.go 562: Workload's veth was already gone.  Nothing to do. ContainerID="503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb" iface="eth0" netns="/var/run/netns/cni-88584fbd-6b73-6afb-cd48-c368b56df7b1"
Oct  2 19:08:16.239118 env[1104]: 2023-10-02 19:08:16.191 [INFO][3601] k8s.go 583: Releasing IP address(es) ContainerID="503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb"
Oct  2 19:08:16.239118 env[1104]: 2023-10-02 19:08:16.191 [INFO][3601] utils.go 196: Calico CNI releasing IP address ContainerID="503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb"
Oct  2 19:08:16.239118 env[1104]: 2023-10-02 19:08:16.224 [INFO][3615] ipam_plugin.go 416: Releasing address using handleID ContainerID="503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb" HandleID="k8s-pod-network.503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb" Workload="localhost-k8s-coredns--5d78c9869d--szml2-eth0"
Oct  2 19:08:16.239118 env[1104]: time="2023-10-02T19:08:16Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:08:16.239118 env[1104]: time="2023-10-02T19:08:16Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:08:16.239118 env[1104]: 2023-10-02 19:08:16.234 [WARNING][3615] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb" HandleID="k8s-pod-network.503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb" Workload="localhost-k8s-coredns--5d78c9869d--szml2-eth0"
Oct  2 19:08:16.239118 env[1104]: 2023-10-02 19:08:16.234 [INFO][3615] ipam_plugin.go 444: Releasing address using workloadID ContainerID="503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb" HandleID="k8s-pod-network.503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb" Workload="localhost-k8s-coredns--5d78c9869d--szml2-eth0"
Oct  2 19:08:16.239118 env[1104]: time="2023-10-02T19:08:16Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:08:16.239118 env[1104]: 2023-10-02 19:08:16.237 [INFO][3601] k8s.go 589: Teardown processing complete. ContainerID="503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb"
Oct  2 19:08:16.241280 systemd[1]: run-netns-cni\x2d88584fbd\x2d6b73\x2d6afb\x2dcd48\x2dc368b56df7b1.mount: Deactivated successfully.
Oct  2 19:08:16.242261 env[1104]: time="2023-10-02T19:08:16.242196403Z" level=info msg="TearDown network for sandbox \"503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb\" successfully"
Oct  2 19:08:16.242353 env[1104]: time="2023-10-02T19:08:16.242330012Z" level=info msg="StopPodSandbox for \"503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb\" returns successfully"
Oct  2 19:08:16.244763 kubelet[1978]: E1002 19:08:16.242806    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:08:16.245153 env[1104]: time="2023-10-02T19:08:16.243601969Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-szml2,Uid:e901c2bb-1cd6-4e03-9551-a9853ecda2d5,Namespace:kube-system,Attempt:1,}"
Oct  2 19:08:16.532289 systemd-networkd[1003]: cali051dded4fb1: Link UP
Oct  2 19:08:16.533761 systemd-networkd[1003]: cali051dded4fb1: Gained carrier
Oct  2 19:08:16.534329 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali051dded4fb1: link becomes ready
Oct  2 19:08:16.546712 env[1104]: 2023-10-02 19:08:16.459 [INFO][3623] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5d78c9869d--szml2-eth0 coredns-5d78c9869d- kube-system  e901c2bb-1cd6-4e03-9551-a9853ecda2d5 892 0 2023-10-02 19:07:29 +0000 UTC <nil> <nil> map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] []  []} {k8s  localhost  coredns-5d78c9869d-szml2 eth0 coredns [] []   [kns.kube-system ksa.kube-system.coredns] cali051dded4fb1  [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="52a36021de520b8364a26c036aae75b3db9ba261c84fd6ad45f8024d6aec7a8b" Namespace="kube-system" Pod="coredns-5d78c9869d-szml2" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--szml2-"
Oct  2 19:08:16.546712 env[1104]: 2023-10-02 19:08:16.459 [INFO][3623] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="52a36021de520b8364a26c036aae75b3db9ba261c84fd6ad45f8024d6aec7a8b" Namespace="kube-system" Pod="coredns-5d78c9869d-szml2" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--szml2-eth0"
Oct  2 19:08:16.546712 env[1104]: 2023-10-02 19:08:16.492 [INFO][3636] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="52a36021de520b8364a26c036aae75b3db9ba261c84fd6ad45f8024d6aec7a8b" HandleID="k8s-pod-network.52a36021de520b8364a26c036aae75b3db9ba261c84fd6ad45f8024d6aec7a8b" Workload="localhost-k8s-coredns--5d78c9869d--szml2-eth0"
Oct  2 19:08:16.546712 env[1104]: 2023-10-02 19:08:16.501 [INFO][3636] ipam_plugin.go 269: Auto assigning IP ContainerID="52a36021de520b8364a26c036aae75b3db9ba261c84fd6ad45f8024d6aec7a8b" HandleID="k8s-pod-network.52a36021de520b8364a26c036aae75b3db9ba261c84fd6ad45f8024d6aec7a8b" Workload="localhost-k8s-coredns--5d78c9869d--szml2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ac340), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5d78c9869d-szml2", "timestamp":"2023-10-02 19:08:16.492495734 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Oct  2 19:08:16.546712 env[1104]: time="2023-10-02T19:08:16Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:08:16.546712 env[1104]: time="2023-10-02T19:08:16Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:08:16.546712 env[1104]: 2023-10-02 19:08:16.501 [INFO][3636] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost'
Oct  2 19:08:16.546712 env[1104]: 2023-10-02 19:08:16.503 [INFO][3636] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.52a36021de520b8364a26c036aae75b3db9ba261c84fd6ad45f8024d6aec7a8b" host="localhost"
Oct  2 19:08:16.546712 env[1104]: 2023-10-02 19:08:16.506 [INFO][3636] ipam.go 372: Looking up existing affinities for host host="localhost"
Oct  2 19:08:16.546712 env[1104]: 2023-10-02 19:08:16.510 [INFO][3636] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost"
Oct  2 19:08:16.546712 env[1104]: 2023-10-02 19:08:16.512 [INFO][3636] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost"
Oct  2 19:08:16.546712 env[1104]: 2023-10-02 19:08:16.513 [INFO][3636] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost"
Oct  2 19:08:16.546712 env[1104]: 2023-10-02 19:08:16.513 [INFO][3636] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.52a36021de520b8364a26c036aae75b3db9ba261c84fd6ad45f8024d6aec7a8b" host="localhost"
Oct  2 19:08:16.546712 env[1104]: 2023-10-02 19:08:16.514 [INFO][3636] ipam.go 1682: Creating new handle: k8s-pod-network.52a36021de520b8364a26c036aae75b3db9ba261c84fd6ad45f8024d6aec7a8b
Oct  2 19:08:16.546712 env[1104]: 2023-10-02 19:08:16.517 [INFO][3636] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.52a36021de520b8364a26c036aae75b3db9ba261c84fd6ad45f8024d6aec7a8b" host="localhost"
Oct  2 19:08:16.546712 env[1104]: 2023-10-02 19:08:16.521 [INFO][3636] ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.52a36021de520b8364a26c036aae75b3db9ba261c84fd6ad45f8024d6aec7a8b" host="localhost"
Oct  2 19:08:16.546712 env[1104]: 2023-10-02 19:08:16.521 [INFO][3636] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.52a36021de520b8364a26c036aae75b3db9ba261c84fd6ad45f8024d6aec7a8b" host="localhost"
Oct  2 19:08:16.546712 env[1104]: time="2023-10-02T19:08:16Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:08:16.546712 env[1104]: 2023-10-02 19:08:16.521 [INFO][3636] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="52a36021de520b8364a26c036aae75b3db9ba261c84fd6ad45f8024d6aec7a8b" HandleID="k8s-pod-network.52a36021de520b8364a26c036aae75b3db9ba261c84fd6ad45f8024d6aec7a8b" Workload="localhost-k8s-coredns--5d78c9869d--szml2-eth0"
Oct  2 19:08:16.547434 env[1104]: 2023-10-02 19:08:16.523 [INFO][3623] k8s.go 383: Populated endpoint ContainerID="52a36021de520b8364a26c036aae75b3db9ba261c84fd6ad45f8024d6aec7a8b" Namespace="kube-system" Pod="coredns-5d78c9869d-szml2" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--szml2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--szml2-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"e901c2bb-1cd6-4e03-9551-a9853ecda2d5", ResourceVersion:"892", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 29, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5d78c9869d-szml2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali051dded4fb1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:08:16.547434 env[1104]: 2023-10-02 19:08:16.523 [INFO][3623] k8s.go 384: Calico CNI using IPs: [192.168.88.130/32] ContainerID="52a36021de520b8364a26c036aae75b3db9ba261c84fd6ad45f8024d6aec7a8b" Namespace="kube-system" Pod="coredns-5d78c9869d-szml2" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--szml2-eth0"
Oct  2 19:08:16.547434 env[1104]: 2023-10-02 19:08:16.523 [INFO][3623] dataplane_linux.go 68: Setting the host side veth name to cali051dded4fb1 ContainerID="52a36021de520b8364a26c036aae75b3db9ba261c84fd6ad45f8024d6aec7a8b" Namespace="kube-system" Pod="coredns-5d78c9869d-szml2" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--szml2-eth0"
Oct  2 19:08:16.547434 env[1104]: 2023-10-02 19:08:16.524 [INFO][3623] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="52a36021de520b8364a26c036aae75b3db9ba261c84fd6ad45f8024d6aec7a8b" Namespace="kube-system" Pod="coredns-5d78c9869d-szml2" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--szml2-eth0"
Oct  2 19:08:16.547434 env[1104]: 2023-10-02 19:08:16.534 [INFO][3623] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="52a36021de520b8364a26c036aae75b3db9ba261c84fd6ad45f8024d6aec7a8b" Namespace="kube-system" Pod="coredns-5d78c9869d-szml2" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--szml2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--szml2-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"e901c2bb-1cd6-4e03-9551-a9853ecda2d5", ResourceVersion:"892", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 29, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"52a36021de520b8364a26c036aae75b3db9ba261c84fd6ad45f8024d6aec7a8b", Pod:"coredns-5d78c9869d-szml2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali051dded4fb1", MAC:"66:21:30:b8:c8:32", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:08:16.547434 env[1104]: 2023-10-02 19:08:16.542 [INFO][3623] k8s.go 489: Wrote updated endpoint to datastore ContainerID="52a36021de520b8364a26c036aae75b3db9ba261c84fd6ad45f8024d6aec7a8b" Namespace="kube-system" Pod="coredns-5d78c9869d-szml2" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--szml2-eth0"
Oct  2 19:08:16.559000 audit[3655]: NETFILTER_CFG table=filter:102 family=2 entries=30 op=nft_register_chain pid=3655 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 19:08:16.561818 kernel: kauditd_printk_skb: 234 callbacks suppressed
Oct  2 19:08:16.561878 kernel: audit: type=1325 audit(1696273696.559:1240): table=filter:102 family=2 entries=30 op=nft_register_chain pid=3655 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 19:08:16.559000 audit[3655]: SYSCALL arch=c000003e syscall=46 success=yes exit=16712 a0=3 a1=7ffe06e414e0 a2=0 a3=7ffe06e414cc items=0 ppid=3120 pid=3655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:16.566397 kernel: audit: type=1300 audit(1696273696.559:1240): arch=c000003e syscall=46 success=yes exit=16712 a0=3 a1=7ffe06e414e0 a2=0 a3=7ffe06e414cc items=0 ppid=3120 pid=3655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:16.566470 kernel: audit: type=1327 audit(1696273696.559:1240): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 19:08:16.559000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 19:08:16.608981 env[1104]: time="2023-10-02T19:08:16.608933937Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:08:16.611674 env[1104]: time="2023-10-02T19:08:16.611602493Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 19:08:16.611674 env[1104]: time="2023-10-02T19:08:16.611638633Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 19:08:16.611674 env[1104]: time="2023-10-02T19:08:16.611648111Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 19:08:16.611823 env[1104]: time="2023-10-02T19:08:16.611765418Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/52a36021de520b8364a26c036aae75b3db9ba261c84fd6ad45f8024d6aec7a8b pid=3663 runtime=io.containerd.runc.v2
Oct  2 19:08:16.624070 systemd[1]: Started cri-containerd-52a36021de520b8364a26c036aae75b3db9ba261c84fd6ad45f8024d6aec7a8b.scope.
Oct  2 19:08:16.635000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.635000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.641423 kernel: audit: type=1400 audit(1696273696.635:1241): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.641493 kernel: audit: type=1400 audit(1696273696.635:1242): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.641523 kernel: audit: type=1400 audit(1696273696.635:1243): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.635000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.635000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.644934 kernel: audit: type=1400 audit(1696273696.635:1244): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.645001 kernel: audit: type=1400 audit(1696273696.635:1245): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.635000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.635000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.648873 kernel: audit: type=1400 audit(1696273696.635:1246): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.648913 kernel: audit: type=1400 audit(1696273696.635:1247): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.635000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.649281 systemd-resolved[1052]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address
Oct  2 19:08:16.635000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.635000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.635000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.635000 audit: BPF prog-id=156 op=LOAD
Oct  2 19:08:16.640000 audit[3673]: AVC avc:  denied  { bpf } for  pid=3673 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.640000 audit[3673]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3663 pid=3673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:16.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532613336303231646535323062383336346132366330333661616537
Oct  2 19:08:16.640000 audit[3673]: AVC avc:  denied  { perfmon } for  pid=3673 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.640000 audit[3673]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3663 pid=3673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:16.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532613336303231646535323062383336346132366330333661616537
Oct  2 19:08:16.640000 audit[3673]: AVC avc:  denied  { bpf } for  pid=3673 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.640000 audit[3673]: AVC avc:  denied  { bpf } for  pid=3673 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.640000 audit[3673]: AVC avc:  denied  { bpf } for  pid=3673 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.640000 audit[3673]: AVC avc:  denied  { perfmon } for  pid=3673 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.640000 audit[3673]: AVC avc:  denied  { perfmon } for  pid=3673 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.640000 audit[3673]: AVC avc:  denied  { perfmon } for  pid=3673 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.640000 audit[3673]: AVC avc:  denied  { perfmon } for  pid=3673 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.640000 audit[3673]: AVC avc:  denied  { perfmon } for  pid=3673 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.640000 audit[3673]: AVC avc:  denied  { bpf } for  pid=3673 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.640000 audit[3673]: AVC avc:  denied  { bpf } for  pid=3673 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.640000 audit: BPF prog-id=157 op=LOAD
Oct  2 19:08:16.640000 audit[3673]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000416520 items=0 ppid=3663 pid=3673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:16.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532613336303231646535323062383336346132366330333661616537
Oct  2 19:08:16.642000 audit[3673]: AVC avc:  denied  { bpf } for  pid=3673 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.642000 audit[3673]: AVC avc:  denied  { bpf } for  pid=3673 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.642000 audit[3673]: AVC avc:  denied  { perfmon } for  pid=3673 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.642000 audit[3673]: AVC avc:  denied  { perfmon } for  pid=3673 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.642000 audit[3673]: AVC avc:  denied  { perfmon } for  pid=3673 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.642000 audit[3673]: AVC avc:  denied  { perfmon } for  pid=3673 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.642000 audit[3673]: AVC avc:  denied  { perfmon } for  pid=3673 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.642000 audit[3673]: AVC avc:  denied  { bpf } for  pid=3673 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.642000 audit[3673]: AVC avc:  denied  { bpf } for  pid=3673 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.642000 audit: BPF prog-id=158 op=LOAD
Oct  2 19:08:16.642000 audit[3673]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000416568 items=0 ppid=3663 pid=3673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:16.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532613336303231646535323062383336346132366330333661616537
Oct  2 19:08:16.644000 audit: BPF prog-id=158 op=UNLOAD
Oct  2 19:08:16.644000 audit: BPF prog-id=157 op=UNLOAD
Oct  2 19:08:16.644000 audit[3673]: AVC avc:  denied  { bpf } for  pid=3673 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.644000 audit[3673]: AVC avc:  denied  { bpf } for  pid=3673 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.644000 audit[3673]: AVC avc:  denied  { bpf } for  pid=3673 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.644000 audit[3673]: AVC avc:  denied  { perfmon } for  pid=3673 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.644000 audit[3673]: AVC avc:  denied  { perfmon } for  pid=3673 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.644000 audit[3673]: AVC avc:  denied  { perfmon } for  pid=3673 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.644000 audit[3673]: AVC avc:  denied  { perfmon } for  pid=3673 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.644000 audit[3673]: AVC avc:  denied  { perfmon } for  pid=3673 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.644000 audit[3673]: AVC avc:  denied  { bpf } for  pid=3673 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.644000 audit[3673]: AVC avc:  denied  { bpf } for  pid=3673 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.644000 audit: BPF prog-id=159 op=LOAD
Oct  2 19:08:16.644000 audit[3673]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000416978 items=0 ppid=3663 pid=3673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:16.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532613336303231646535323062383336346132366330333661616537
Oct  2 19:08:16.676861 env[1104]: time="2023-10-02T19:08:16.676797313Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-szml2,Uid:e901c2bb-1cd6-4e03-9551-a9853ecda2d5,Namespace:kube-system,Attempt:1,} returns sandbox id \"52a36021de520b8364a26c036aae75b3db9ba261c84fd6ad45f8024d6aec7a8b\""
Oct  2 19:08:16.677485 kubelet[1978]: E1002 19:08:16.677452    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:08:16.679746 env[1104]: time="2023-10-02T19:08:16.679714009Z" level=info msg="CreateContainer within sandbox \"52a36021de520b8364a26c036aae75b3db9ba261c84fd6ad45f8024d6aec7a8b\" for container &ContainerMetadata{Name:coredns,Attempt:0,}"
Oct  2 19:08:16.683316 env[1104]: time="2023-10-02T19:08:16.683289838Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:08:16.808492 env[1104]: time="2023-10-02T19:08:16.808341544Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:08:16.811135 systemd-networkd[1003]: cali9cdd6fb8998: Gained IPv6LL
Oct  2 19:08:16.812486 env[1104]: time="2023-10-02T19:08:16.812450432Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:08:16.813402 env[1104]: time="2023-10-02T19:08:16.813376392Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\""
Oct  2 19:08:16.815682 env[1104]: time="2023-10-02T19:08:16.815658531Z" level=info msg="CreateContainer within sandbox \"dbf813839a8420050778145fd0249722effe093999f4717a5259e96be7f6e7e1\" for container &ContainerMetadata{Name:coredns,Attempt:0,}"
Oct  2 19:08:16.822418 env[1104]: time="2023-10-02T19:08:16.822349530Z" level=info msg="CreateContainer within sandbox \"52a36021de520b8364a26c036aae75b3db9ba261c84fd6ad45f8024d6aec7a8b\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"e407761c3ab223411fcee67d3ef305ef60346b3588f6cea46a0b64f08e012516\""
Oct  2 19:08:16.822823 env[1104]: time="2023-10-02T19:08:16.822791223Z" level=info msg="StartContainer for \"e407761c3ab223411fcee67d3ef305ef60346b3588f6cea46a0b64f08e012516\""
Oct  2 19:08:16.834188 env[1104]: time="2023-10-02T19:08:16.834117809Z" level=info msg="CreateContainer within sandbox \"dbf813839a8420050778145fd0249722effe093999f4717a5259e96be7f6e7e1\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"728baf711b2c30c1b7f1fdc118d4fc5eac14a8ae654bbd2c5ac12e97fc845b68\""
Oct  2 19:08:16.835864 env[1104]: time="2023-10-02T19:08:16.835817412Z" level=info msg="StartContainer for \"728baf711b2c30c1b7f1fdc118d4fc5eac14a8ae654bbd2c5ac12e97fc845b68\""
Oct  2 19:08:16.841619 systemd[1]: Started cri-containerd-e407761c3ab223411fcee67d3ef305ef60346b3588f6cea46a0b64f08e012516.scope.
Oct  2 19:08:16.859745 systemd[1]: Started cri-containerd-728baf711b2c30c1b7f1fdc118d4fc5eac14a8ae654bbd2c5ac12e97fc845b68.scope.
Oct  2 19:08:16.865000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.865000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.865000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.865000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.865000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.865000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.865000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.865000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.865000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.865000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.865000 audit: BPF prog-id=160 op=LOAD
Oct  2 19:08:16.866000 audit[3707]: AVC avc:  denied  { bpf } for  pid=3707 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.866000 audit[3707]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3663 pid=3707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:16.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534303737363163336162323233343131666365653637643365663330
Oct  2 19:08:16.866000 audit[3707]: AVC avc:  denied  { perfmon } for  pid=3707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.866000 audit[3707]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3663 pid=3707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:16.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534303737363163336162323233343131666365653637643365663330
Oct  2 19:08:16.866000 audit[3707]: AVC avc:  denied  { bpf } for  pid=3707 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.866000 audit[3707]: AVC avc:  denied  { bpf } for  pid=3707 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.866000 audit[3707]: AVC avc:  denied  { bpf } for  pid=3707 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.866000 audit[3707]: AVC avc:  denied  { perfmon } for  pid=3707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.866000 audit[3707]: AVC avc:  denied  { perfmon } for  pid=3707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.866000 audit[3707]: AVC avc:  denied  { perfmon } for  pid=3707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.866000 audit[3707]: AVC avc:  denied  { perfmon } for  pid=3707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.866000 audit[3707]: AVC avc:  denied  { perfmon } for  pid=3707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.866000 audit[3707]: AVC avc:  denied  { bpf } for  pid=3707 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.866000 audit[3707]: AVC avc:  denied  { bpf } for  pid=3707 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.866000 audit: BPF prog-id=161 op=LOAD
Oct  2 19:08:16.866000 audit[3707]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003ca120 items=0 ppid=3663 pid=3707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:16.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534303737363163336162323233343131666365653637643365663330
Oct  2 19:08:16.868000 audit[3707]: AVC avc:  denied  { bpf } for  pid=3707 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.868000 audit[3707]: AVC avc:  denied  { bpf } for  pid=3707 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.868000 audit[3707]: AVC avc:  denied  { perfmon } for  pid=3707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.868000 audit[3707]: AVC avc:  denied  { perfmon } for  pid=3707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.868000 audit[3707]: AVC avc:  denied  { perfmon } for  pid=3707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.868000 audit[3707]: AVC avc:  denied  { perfmon } for  pid=3707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.868000 audit[3707]: AVC avc:  denied  { perfmon } for  pid=3707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.868000 audit[3707]: AVC avc:  denied  { bpf } for  pid=3707 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.868000 audit[3707]: AVC avc:  denied  { bpf } for  pid=3707 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.868000 audit: BPF prog-id=162 op=LOAD
Oct  2 19:08:16.868000 audit[3707]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003ca168 items=0 ppid=3663 pid=3707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:16.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534303737363163336162323233343131666365653637643365663330
Oct  2 19:08:16.868000 audit: BPF prog-id=162 op=UNLOAD
Oct  2 19:08:16.869000 audit: BPF prog-id=161 op=UNLOAD
Oct  2 19:08:16.869000 audit[3707]: AVC avc:  denied  { bpf } for  pid=3707 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.869000 audit[3707]: AVC avc:  denied  { bpf } for  pid=3707 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.869000 audit[3707]: AVC avc:  denied  { bpf } for  pid=3707 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.869000 audit[3707]: AVC avc:  denied  { perfmon } for  pid=3707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.869000 audit[3707]: AVC avc:  denied  { perfmon } for  pid=3707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.869000 audit[3707]: AVC avc:  denied  { perfmon } for  pid=3707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.869000 audit[3707]: AVC avc:  denied  { perfmon } for  pid=3707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.869000 audit[3707]: AVC avc:  denied  { perfmon } for  pid=3707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.869000 audit[3707]: AVC avc:  denied  { bpf } for  pid=3707 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.869000 audit[3707]: AVC avc:  denied  { bpf } for  pid=3707 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.869000 audit: BPF prog-id=163 op=LOAD
Oct  2 19:08:16.869000 audit[3707]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ca578 items=0 ppid=3663 pid=3707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:16.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534303737363163336162323233343131666365653637643365663330
Oct  2 19:08:16.875000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.875000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.875000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.875000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.875000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.875000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.875000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.875000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.875000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.875000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.875000 audit: BPF prog-id=164 op=LOAD
Oct  2 19:08:16.876000 audit[3723]: AVC avc:  denied  { bpf } for  pid=3723 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.876000 audit[3723]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3483 pid=3723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:16.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732386261663731316232633330633162376631666463313138643466
Oct  2 19:08:16.876000 audit[3723]: AVC avc:  denied  { perfmon } for  pid=3723 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.876000 audit[3723]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3483 pid=3723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:16.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732386261663731316232633330633162376631666463313138643466
Oct  2 19:08:16.876000 audit[3723]: AVC avc:  denied  { bpf } for  pid=3723 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.876000 audit[3723]: AVC avc:  denied  { bpf } for  pid=3723 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.876000 audit[3723]: AVC avc:  denied  { bpf } for  pid=3723 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.876000 audit[3723]: AVC avc:  denied  { perfmon } for  pid=3723 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.876000 audit[3723]: AVC avc:  denied  { perfmon } for  pid=3723 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.876000 audit[3723]: AVC avc:  denied  { perfmon } for  pid=3723 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.876000 audit[3723]: AVC avc:  denied  { perfmon } for  pid=3723 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.876000 audit[3723]: AVC avc:  denied  { perfmon } for  pid=3723 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.876000 audit[3723]: AVC avc:  denied  { bpf } for  pid=3723 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.876000 audit[3723]: AVC avc:  denied  { bpf } for  pid=3723 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.876000 audit: BPF prog-id=165 op=LOAD
Oct  2 19:08:16.876000 audit[3723]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00033c8a0 items=0 ppid=3483 pid=3723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:16.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732386261663731316232633330633162376631666463313138643466
Oct  2 19:08:16.876000 audit[3723]: AVC avc:  denied  { bpf } for  pid=3723 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.876000 audit[3723]: AVC avc:  denied  { bpf } for  pid=3723 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.876000 audit[3723]: AVC avc:  denied  { perfmon } for  pid=3723 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.876000 audit[3723]: AVC avc:  denied  { perfmon } for  pid=3723 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.876000 audit[3723]: AVC avc:  denied  { perfmon } for  pid=3723 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.876000 audit[3723]: AVC avc:  denied  { perfmon } for  pid=3723 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.876000 audit[3723]: AVC avc:  denied  { perfmon } for  pid=3723 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.876000 audit[3723]: AVC avc:  denied  { bpf } for  pid=3723 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.876000 audit[3723]: AVC avc:  denied  { bpf } for  pid=3723 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.876000 audit: BPF prog-id=166 op=LOAD
Oct  2 19:08:16.876000 audit[3723]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00033c8e8 items=0 ppid=3483 pid=3723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:16.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732386261663731316232633330633162376631666463313138643466
Oct  2 19:08:16.877000 audit: BPF prog-id=166 op=UNLOAD
Oct  2 19:08:16.877000 audit: BPF prog-id=165 op=UNLOAD
Oct  2 19:08:16.877000 audit[3723]: AVC avc:  denied  { bpf } for  pid=3723 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.877000 audit[3723]: AVC avc:  denied  { bpf } for  pid=3723 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.877000 audit[3723]: AVC avc:  denied  { bpf } for  pid=3723 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.877000 audit[3723]: AVC avc:  denied  { perfmon } for  pid=3723 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.877000 audit[3723]: AVC avc:  denied  { perfmon } for  pid=3723 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.877000 audit[3723]: AVC avc:  denied  { perfmon } for  pid=3723 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.877000 audit[3723]: AVC avc:  denied  { perfmon } for  pid=3723 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.877000 audit[3723]: AVC avc:  denied  { perfmon } for  pid=3723 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.877000 audit[3723]: AVC avc:  denied  { bpf } for  pid=3723 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.877000 audit[3723]: AVC avc:  denied  { bpf } for  pid=3723 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:16.877000 audit: BPF prog-id=167 op=LOAD
Oct  2 19:08:16.877000 audit[3723]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00033ccf8 items=0 ppid=3483 pid=3723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:16.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732386261663731316232633330633162376631666463313138643466
Oct  2 19:08:16.917518 env[1104]: time="2023-10-02T19:08:16.914659201Z" level=info msg="StartContainer for \"e407761c3ab223411fcee67d3ef305ef60346b3588f6cea46a0b64f08e012516\" returns successfully"
Oct  2 19:08:16.919977 env[1104]: time="2023-10-02T19:08:16.919495476Z" level=info msg="StartContainer for \"728baf711b2c30c1b7f1fdc118d4fc5eac14a8ae654bbd2c5ac12e97fc845b68\" returns successfully"
Oct  2 19:08:17.089458 sshd[3582]: pam_unix(sshd:session): session closed for user core
Oct  2 19:08:17.089000 audit[3582]: USER_END pid=3582 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:17.089000 audit[3582]: CRED_DISP pid=3582 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:17.094160 systemd[1]: Started sshd@11-10.0.0.30:22-10.0.0.1:35112.service.
Oct  2 19:08:17.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.30:22-10.0.0.1:35112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:17.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.30:22-10.0.0.1:35110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:17.106542 systemd[1]: sshd@10-10.0.0.30:22-10.0.0.1:35110.service: Deactivated successfully.
Oct  2 19:08:17.107472 systemd[1]: session-11.scope: Deactivated successfully.
Oct  2 19:08:17.108351 systemd-logind[1090]: Session 11 logged out. Waiting for processes to exit.
Oct  2 19:08:17.109886 systemd-logind[1090]: Removed session 11.
Oct  2 19:08:17.129848 env[1104]: time="2023-10-02T19:08:17.129784105Z" level=info msg="StopPodSandbox for \"2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc\""
Oct  2 19:08:17.139000 audit[3776]: USER_ACCT pid=3776 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:17.141355 sshd[3776]: Accepted publickey for core from 10.0.0.1 port 35112 ssh2: RSA SHA256:9wRqOmzBU7I1L73Sd3XbDPVeoZziQ4I3fHnP0PJ8idM
Oct  2 19:08:17.141000 audit[3776]: CRED_ACQ pid=3776 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:17.141000 audit[3776]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc041410d0 a2=3 a3=0 items=0 ppid=1 pid=3776 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:17.141000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Oct  2 19:08:17.142731 sshd[3776]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:08:17.148558 systemd-logind[1090]: New session 12 of user core.
Oct  2 19:08:17.149204 systemd[1]: Started session-12.scope.
Oct  2 19:08:17.152000 audit[3776]: USER_START pid=3776 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:17.153000 audit[3801]: CRED_ACQ pid=3801 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:17.213520 env[1104]: 2023-10-02 19:08:17.179 [INFO][3796] k8s.go 576: Cleaning up netns ContainerID="2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc"
Oct  2 19:08:17.213520 env[1104]: 2023-10-02 19:08:17.179 [INFO][3796] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc" iface="eth0" netns="/var/run/netns/cni-726230b7-9789-008b-2dd8-5f142f221cae"
Oct  2 19:08:17.213520 env[1104]: 2023-10-02 19:08:17.180 [INFO][3796] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc" iface="eth0" netns="/var/run/netns/cni-726230b7-9789-008b-2dd8-5f142f221cae"
Oct  2 19:08:17.213520 env[1104]: 2023-10-02 19:08:17.180 [INFO][3796] dataplane_linux.go 562: Workload's veth was already gone.  Nothing to do. ContainerID="2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc" iface="eth0" netns="/var/run/netns/cni-726230b7-9789-008b-2dd8-5f142f221cae"
Oct  2 19:08:17.213520 env[1104]: 2023-10-02 19:08:17.180 [INFO][3796] k8s.go 583: Releasing IP address(es) ContainerID="2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc"
Oct  2 19:08:17.213520 env[1104]: 2023-10-02 19:08:17.180 [INFO][3796] utils.go 196: Calico CNI releasing IP address ContainerID="2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc"
Oct  2 19:08:17.213520 env[1104]: 2023-10-02 19:08:17.200 [INFO][3805] ipam_plugin.go 416: Releasing address using handleID ContainerID="2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc" HandleID="k8s-pod-network.2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc" Workload="localhost-k8s-csi--node--driver--v789s-eth0"
Oct  2 19:08:17.213520 env[1104]: time="2023-10-02T19:08:17Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:08:17.213520 env[1104]: time="2023-10-02T19:08:17Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:08:17.213520 env[1104]: 2023-10-02 19:08:17.208 [WARNING][3805] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc" HandleID="k8s-pod-network.2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc" Workload="localhost-k8s-csi--node--driver--v789s-eth0"
Oct  2 19:08:17.213520 env[1104]: 2023-10-02 19:08:17.208 [INFO][3805] ipam_plugin.go 444: Releasing address using workloadID ContainerID="2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc" HandleID="k8s-pod-network.2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc" Workload="localhost-k8s-csi--node--driver--v789s-eth0"
Oct  2 19:08:17.213520 env[1104]: time="2023-10-02T19:08:17Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:08:17.213520 env[1104]: 2023-10-02 19:08:17.211 [INFO][3796] k8s.go 589: Teardown processing complete. ContainerID="2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc"
Oct  2 19:08:17.215329 systemd[1]: run-netns-cni\x2d726230b7\x2d9789\x2d008b\x2d2dd8\x2d5f142f221cae.mount: Deactivated successfully.
Oct  2 19:08:17.216122 env[1104]: time="2023-10-02T19:08:17.216061195Z" level=info msg="TearDown network for sandbox \"2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc\" successfully"
Oct  2 19:08:17.216122 env[1104]: time="2023-10-02T19:08:17.216111503Z" level=info msg="StopPodSandbox for \"2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc\" returns successfully"
Oct  2 19:08:17.216974 env[1104]: time="2023-10-02T19:08:17.216920735Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-v789s,Uid:2bce08ea-b764-40b2-b139-323c1778a319,Namespace:calico-system,Attempt:1,}"
Oct  2 19:08:17.270248 sshd[3776]: pam_unix(sshd:session): session closed for user core
Oct  2 19:08:17.269000 audit[3776]: USER_END pid=3776 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:17.270000 audit[3776]: CRED_DISP pid=3776 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:17.273172 systemd[1]: sshd@11-10.0.0.30:22-10.0.0.1:35112.service: Deactivated successfully.
Oct  2 19:08:17.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.30:22-10.0.0.1:35112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:17.273862 systemd[1]: session-12.scope: Deactivated successfully.
Oct  2 19:08:17.274600 systemd-logind[1090]: Session 12 logged out. Waiting for processes to exit.
Oct  2 19:08:17.275398 systemd-logind[1090]: Removed session 12.
Oct  2 19:08:17.284069 kubelet[1978]: E1002 19:08:17.284035    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:08:17.287208 kubelet[1978]: E1002 19:08:17.286945    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:08:17.295936 kubelet[1978]: I1002 19:08:17.295370    1978 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-8pvzx" podStartSLOduration=46.495986017999996 podCreationTimestamp="2023-10-02 19:07:29 +0000 UTC" firstStartedPulling="2023-10-02 19:08:15.014778055 +0000 UTC m=+61.987296897" lastFinishedPulling="2023-10-02 19:08:16.814117173 +0000 UTC m=+63.786636025" observedRunningTime="2023-10-02 19:08:17.295033022 +0000 UTC m=+64.267551864" watchObservedRunningTime="2023-10-02 19:08:17.295325146 +0000 UTC m=+64.267843988"
Oct  2 19:08:17.305000 audit[3850]: NETFILTER_CFG table=filter:103 family=2 entries=14 op=nft_register_rule pid=3850 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:08:17.305000 audit[3850]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffed05063d0 a2=0 a3=7ffed05063bc items=0 ppid=2141 pid=3850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:17.305000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:08:17.307000 audit[3850]: NETFILTER_CFG table=nat:104 family=2 entries=14 op=nft_register_rule pid=3850 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:08:17.307000 audit[3850]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7ffed05063d0 a2=0 a3=31030 items=0 ppid=2141 pid=3850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:17.307000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:08:17.318000 audit[3852]: NETFILTER_CFG table=filter:105 family=2 entries=11 op=nft_register_rule pid=3852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:08:17.318000 audit[3852]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff12abc930 a2=0 a3=7fff12abc91c items=0 ppid=2141 pid=3852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:17.318000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:08:17.323320 kubelet[1978]: I1002 19:08:17.323276    1978 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-szml2" podStartSLOduration=48.323213688 podCreationTimestamp="2023-10-02 19:07:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:08:17.323073137 +0000 UTC m=+64.295591979" watchObservedRunningTime="2023-10-02 19:08:17.323213688 +0000 UTC m=+64.295732530"
Oct  2 19:08:17.323000 audit[3852]: NETFILTER_CFG table=nat:106 family=2 entries=35 op=nft_register_chain pid=3852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:08:17.323000 audit[3852]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7fff12abc930 a2=0 a3=7fff12abc91c items=0 ppid=2141 pid=3852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:17.323000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:08:17.351885 systemd-networkd[1003]: cali29fca7eef63: Link UP
Oct  2 19:08:17.351895 systemd-networkd[1003]: cali29fca7eef63: Gained carrier
Oct  2 19:08:17.361657 env[1104]: 2023-10-02 19:08:17.263 [INFO][3826] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--v789s-eth0 csi-node-driver- calico-system  2bce08ea-b764-40b2-b139-323c1778a319 922 0 2023-10-02 19:07:49 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:759544bff5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] []  []} {k8s  localhost  csi-node-driver-v789s eth0 default [] []   [kns.calico-system ksa.calico-system.default] cali29fca7eef63  [] []}} ContainerID="24b972ba6f2afe4967c111ccc2597d8c40d9bb350dde608952652f7b44fdc389" Namespace="calico-system" Pod="csi-node-driver-v789s" WorkloadEndpoint="localhost-k8s-csi--node--driver--v789s-"
Oct  2 19:08:17.361657 env[1104]: 2023-10-02 19:08:17.263 [INFO][3826] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="24b972ba6f2afe4967c111ccc2597d8c40d9bb350dde608952652f7b44fdc389" Namespace="calico-system" Pod="csi-node-driver-v789s" WorkloadEndpoint="localhost-k8s-csi--node--driver--v789s-eth0"
Oct  2 19:08:17.361657 env[1104]: 2023-10-02 19:08:17.298 [INFO][3841] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="24b972ba6f2afe4967c111ccc2597d8c40d9bb350dde608952652f7b44fdc389" HandleID="k8s-pod-network.24b972ba6f2afe4967c111ccc2597d8c40d9bb350dde608952652f7b44fdc389" Workload="localhost-k8s-csi--node--driver--v789s-eth0"
Oct  2 19:08:17.361657 env[1104]: 2023-10-02 19:08:17.309 [INFO][3841] ipam_plugin.go 269: Auto assigning IP ContainerID="24b972ba6f2afe4967c111ccc2597d8c40d9bb350dde608952652f7b44fdc389" HandleID="k8s-pod-network.24b972ba6f2afe4967c111ccc2597d8c40d9bb350dde608952652f7b44fdc389" Workload="localhost-k8s-csi--node--driver--v789s-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004eef00), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-v789s", "timestamp":"2023-10-02 19:08:17.298463073 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Oct  2 19:08:17.361657 env[1104]: time="2023-10-02T19:08:17Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:08:17.361657 env[1104]: time="2023-10-02T19:08:17Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:08:17.361657 env[1104]: 2023-10-02 19:08:17.309 [INFO][3841] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost'
Oct  2 19:08:17.361657 env[1104]: 2023-10-02 19:08:17.313 [INFO][3841] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.24b972ba6f2afe4967c111ccc2597d8c40d9bb350dde608952652f7b44fdc389" host="localhost"
Oct  2 19:08:17.361657 env[1104]: 2023-10-02 19:08:17.322 [INFO][3841] ipam.go 372: Looking up existing affinities for host host="localhost"
Oct  2 19:08:17.361657 env[1104]: 2023-10-02 19:08:17.328 [INFO][3841] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost"
Oct  2 19:08:17.361657 env[1104]: 2023-10-02 19:08:17.331 [INFO][3841] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost"
Oct  2 19:08:17.361657 env[1104]: 2023-10-02 19:08:17.332 [INFO][3841] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost"
Oct  2 19:08:17.361657 env[1104]: 2023-10-02 19:08:17.332 [INFO][3841] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.24b972ba6f2afe4967c111ccc2597d8c40d9bb350dde608952652f7b44fdc389" host="localhost"
Oct  2 19:08:17.361657 env[1104]: 2023-10-02 19:08:17.335 [INFO][3841] ipam.go 1682: Creating new handle: k8s-pod-network.24b972ba6f2afe4967c111ccc2597d8c40d9bb350dde608952652f7b44fdc389
Oct  2 19:08:17.361657 env[1104]: 2023-10-02 19:08:17.338 [INFO][3841] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.24b972ba6f2afe4967c111ccc2597d8c40d9bb350dde608952652f7b44fdc389" host="localhost"
Oct  2 19:08:17.361657 env[1104]: 2023-10-02 19:08:17.343 [INFO][3841] ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.24b972ba6f2afe4967c111ccc2597d8c40d9bb350dde608952652f7b44fdc389" host="localhost"
Oct  2 19:08:17.361657 env[1104]: 2023-10-02 19:08:17.343 [INFO][3841] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.24b972ba6f2afe4967c111ccc2597d8c40d9bb350dde608952652f7b44fdc389" host="localhost"
Oct  2 19:08:17.361657 env[1104]: time="2023-10-02T19:08:17Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:08:17.361657 env[1104]: 2023-10-02 19:08:17.343 [INFO][3841] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="24b972ba6f2afe4967c111ccc2597d8c40d9bb350dde608952652f7b44fdc389" HandleID="k8s-pod-network.24b972ba6f2afe4967c111ccc2597d8c40d9bb350dde608952652f7b44fdc389" Workload="localhost-k8s-csi--node--driver--v789s-eth0"
Oct  2 19:08:17.362276 env[1104]: 2023-10-02 19:08:17.345 [INFO][3826] k8s.go 383: Populated endpoint ContainerID="24b972ba6f2afe4967c111ccc2597d8c40d9bb350dde608952652f7b44fdc389" Namespace="calico-system" Pod="csi-node-driver-v789s" WorkloadEndpoint="localhost-k8s-csi--node--driver--v789s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--v789s-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2bce08ea-b764-40b2-b139-323c1778a319", ResourceVersion:"922", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 49, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-v789s", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali29fca7eef63", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:08:17.362276 env[1104]: 2023-10-02 19:08:17.345 [INFO][3826] k8s.go 384: Calico CNI using IPs: [192.168.88.131/32] ContainerID="24b972ba6f2afe4967c111ccc2597d8c40d9bb350dde608952652f7b44fdc389" Namespace="calico-system" Pod="csi-node-driver-v789s" WorkloadEndpoint="localhost-k8s-csi--node--driver--v789s-eth0"
Oct  2 19:08:17.362276 env[1104]: 2023-10-02 19:08:17.345 [INFO][3826] dataplane_linux.go 68: Setting the host side veth name to cali29fca7eef63 ContainerID="24b972ba6f2afe4967c111ccc2597d8c40d9bb350dde608952652f7b44fdc389" Namespace="calico-system" Pod="csi-node-driver-v789s" WorkloadEndpoint="localhost-k8s-csi--node--driver--v789s-eth0"
Oct  2 19:08:17.362276 env[1104]: 2023-10-02 19:08:17.346 [INFO][3826] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="24b972ba6f2afe4967c111ccc2597d8c40d9bb350dde608952652f7b44fdc389" Namespace="calico-system" Pod="csi-node-driver-v789s" WorkloadEndpoint="localhost-k8s-csi--node--driver--v789s-eth0"
Oct  2 19:08:17.362276 env[1104]: 2023-10-02 19:08:17.351 [INFO][3826] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="24b972ba6f2afe4967c111ccc2597d8c40d9bb350dde608952652f7b44fdc389" Namespace="calico-system" Pod="csi-node-driver-v789s" WorkloadEndpoint="localhost-k8s-csi--node--driver--v789s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--v789s-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2bce08ea-b764-40b2-b139-323c1778a319", ResourceVersion:"922", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 49, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"24b972ba6f2afe4967c111ccc2597d8c40d9bb350dde608952652f7b44fdc389", Pod:"csi-node-driver-v789s", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali29fca7eef63", MAC:"f6:2a:82:15:80:e1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:08:17.362276 env[1104]: 2023-10-02 19:08:17.358 [INFO][3826] k8s.go 489: Wrote updated endpoint to datastore ContainerID="24b972ba6f2afe4967c111ccc2597d8c40d9bb350dde608952652f7b44fdc389" Namespace="calico-system" Pod="csi-node-driver-v789s" WorkloadEndpoint="localhost-k8s-csi--node--driver--v789s-eth0"
Oct  2 19:08:17.375959 env[1104]: time="2023-10-02T19:08:17.375867574Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 19:08:17.375959 env[1104]: time="2023-10-02T19:08:17.375908563Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 19:08:17.375959 env[1104]: time="2023-10-02T19:08:17.375918292Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 19:08:17.376253 env[1104]: time="2023-10-02T19:08:17.376076457Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/24b972ba6f2afe4967c111ccc2597d8c40d9bb350dde608952652f7b44fdc389 pid=3877 runtime=io.containerd.runc.v2
Oct  2 19:08:17.379000 audit[3887]: NETFILTER_CFG table=filter:107 family=2 entries=44 op=nft_register_chain pid=3887 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 19:08:17.379000 audit[3887]: SYSCALL arch=c000003e syscall=46 success=yes exit=22284 a0=3 a1=7ffee1b0e0b0 a2=0 a3=7ffee1b0e09c items=0 ppid=3120 pid=3887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:17.379000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 19:08:17.387645 systemd[1]: Started cri-containerd-24b972ba6f2afe4967c111ccc2597d8c40d9bb350dde608952652f7b44fdc389.scope.
Oct  2 19:08:17.397000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.397000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.397000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.397000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.397000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.397000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.397000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.397000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.397000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.397000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.397000 audit: BPF prog-id=168 op=LOAD
Oct  2 19:08:17.397000 audit[3886]: AVC avc:  denied  { bpf } for  pid=3886 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.397000 audit[3886]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3877 pid=3886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:17.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234623937326261366632616665343936376331313163636332353937
Oct  2 19:08:17.398000 audit[3886]: AVC avc:  denied  { perfmon } for  pid=3886 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.398000 audit[3886]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3877 pid=3886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:17.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234623937326261366632616665343936376331313163636332353937
Oct  2 19:08:17.398000 audit[3886]: AVC avc:  denied  { bpf } for  pid=3886 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.398000 audit[3886]: AVC avc:  denied  { bpf } for  pid=3886 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.398000 audit[3886]: AVC avc:  denied  { bpf } for  pid=3886 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.398000 audit[3886]: AVC avc:  denied  { perfmon } for  pid=3886 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.398000 audit[3886]: AVC avc:  denied  { perfmon } for  pid=3886 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.398000 audit[3886]: AVC avc:  denied  { perfmon } for  pid=3886 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.398000 audit[3886]: AVC avc:  denied  { perfmon } for  pid=3886 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.398000 audit[3886]: AVC avc:  denied  { perfmon } for  pid=3886 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.398000 audit[3886]: AVC avc:  denied  { bpf } for  pid=3886 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.398000 audit[3886]: AVC avc:  denied  { bpf } for  pid=3886 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.398000 audit: BPF prog-id=169 op=LOAD
Oct  2 19:08:17.398000 audit[3886]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00030cd20 items=0 ppid=3877 pid=3886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:17.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234623937326261366632616665343936376331313163636332353937
Oct  2 19:08:17.399000 audit[3886]: AVC avc:  denied  { bpf } for  pid=3886 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.399000 audit[3886]: AVC avc:  denied  { bpf } for  pid=3886 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.399000 audit[3886]: AVC avc:  denied  { perfmon } for  pid=3886 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.399000 audit[3886]: AVC avc:  denied  { perfmon } for  pid=3886 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.399000 audit[3886]: AVC avc:  denied  { perfmon } for  pid=3886 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.399000 audit[3886]: AVC avc:  denied  { perfmon } for  pid=3886 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.399000 audit[3886]: AVC avc:  denied  { perfmon } for  pid=3886 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.399000 audit[3886]: AVC avc:  denied  { bpf } for  pid=3886 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.399000 audit[3886]: AVC avc:  denied  { bpf } for  pid=3886 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.399000 audit: BPF prog-id=170 op=LOAD
Oct  2 19:08:17.399000 audit[3886]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00030cd68 items=0 ppid=3877 pid=3886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:17.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234623937326261366632616665343936376331313163636332353937
Oct  2 19:08:17.400000 audit: BPF prog-id=170 op=UNLOAD
Oct  2 19:08:17.400000 audit: BPF prog-id=169 op=UNLOAD
Oct  2 19:08:17.400000 audit[3886]: AVC avc:  denied  { bpf } for  pid=3886 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.400000 audit[3886]: AVC avc:  denied  { bpf } for  pid=3886 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.400000 audit[3886]: AVC avc:  denied  { bpf } for  pid=3886 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.400000 audit[3886]: AVC avc:  denied  { perfmon } for  pid=3886 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.400000 audit[3886]: AVC avc:  denied  { perfmon } for  pid=3886 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.400000 audit[3886]: AVC avc:  denied  { perfmon } for  pid=3886 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.400000 audit[3886]: AVC avc:  denied  { perfmon } for  pid=3886 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.400000 audit[3886]: AVC avc:  denied  { perfmon } for  pid=3886 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.400000 audit[3886]: AVC avc:  denied  { bpf } for  pid=3886 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.400000 audit[3886]: AVC avc:  denied  { bpf } for  pid=3886 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:17.400000 audit: BPF prog-id=171 op=LOAD
Oct  2 19:08:17.400000 audit[3886]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00030d178 items=0 ppid=3877 pid=3886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:17.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234623937326261366632616665343936376331313163636332353937
Oct  2 19:08:17.402788 systemd-resolved[1052]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address
Oct  2 19:08:17.413371 env[1104]: time="2023-10-02T19:08:17.413329659Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-v789s,Uid:2bce08ea-b764-40b2-b139-323c1778a319,Namespace:calico-system,Attempt:1,} returns sandbox id \"24b972ba6f2afe4967c111ccc2597d8c40d9bb350dde608952652f7b44fdc389\""
Oct  2 19:08:17.415072 env[1104]: time="2023-10-02T19:08:17.415053087Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\""
Oct  2 19:08:17.668719 env[1104]: time="2023-10-02T19:08:17.668542073Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 19:08:17.700210 env[1104]: time="2023-10-02T19:08:17.700097916Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 19:08:17.700511 kubelet[1978]: E1002 19:08:17.700486    1978 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 19:08:17.700594 kubelet[1978]: E1002 19:08:17.700533    1978 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 19:08:17.700670 kubelet[1978]: E1002 19:08:17.700652    1978 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-7stcj,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-v789s_calico-system(2bce08ea-b764-40b2-b139-323c1778a319): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 19:08:17.701634 env[1104]: time="2023-10-02T19:08:17.701588283Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\""
Oct  2 19:08:17.948277 env[1104]: time="2023-10-02T19:08:17.948140897Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 19:08:17.949358 env[1104]: time="2023-10-02T19:08:17.949271550Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 19:08:17.949589 kubelet[1978]: E1002 19:08:17.949568    1978 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 19:08:17.949636 kubelet[1978]: E1002 19:08:17.949612    1978 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 19:08:17.949727 kubelet[1978]: E1002 19:08:17.949709    1978 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-7stcj,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-v789s_calico-system(2bce08ea-b764-40b2-b139-323c1778a319): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 19:08:17.949884 kubelet[1978]: E1002 19:08:17.949759    1978 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-v789s" podUID=2bce08ea-b764-40b2-b139-323c1778a319
Oct  2 19:08:18.218489 systemd-networkd[1003]: cali051dded4fb1: Gained IPv6LL
Oct  2 19:08:18.290536 kubelet[1978]: E1002 19:08:18.290499    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:08:18.292279 kubelet[1978]: E1002 19:08:18.291301    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:08:18.295514 kubelet[1978]: E1002 19:08:18.295487    1978 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-v789s" podUID=2bce08ea-b764-40b2-b139-323c1778a319
Oct  2 19:08:18.346000 audit[3912]: NETFILTER_CFG table=filter:108 family=2 entries=8 op=nft_register_rule pid=3912 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:08:18.346000 audit[3912]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffdd3c0a1b0 a2=0 a3=7ffdd3c0a19c items=0 ppid=2141 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:18.346000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:08:18.353000 audit[3912]: NETFILTER_CFG table=nat:109 family=2 entries=56 op=nft_register_chain pid=3912 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 19:08:18.353000 audit[3912]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7ffdd3c0a1b0 a2=0 a3=7ffdd3c0a19c items=0 ppid=2141 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:18.353000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 19:08:19.242448 systemd-networkd[1003]: cali29fca7eef63: Gained IPv6LL
Oct  2 19:08:19.292107 kubelet[1978]: E1002 19:08:19.292066    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:08:19.292792 kubelet[1978]: E1002 19:08:19.292248    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:08:19.293076 kubelet[1978]: E1002 19:08:19.293048    1978 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-v789s" podUID=2bce08ea-b764-40b2-b139-323c1778a319
Oct  2 19:08:20.130248 env[1104]: time="2023-10-02T19:08:20.130153120Z" level=info msg="StopPodSandbox for \"f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb\""
Oct  2 19:08:20.205046 env[1104]: 2023-10-02 19:08:20.171 [INFO][3934] k8s.go 576: Cleaning up netns ContainerID="f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb"
Oct  2 19:08:20.205046 env[1104]: 2023-10-02 19:08:20.171 [INFO][3934] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb" iface="eth0" netns="/var/run/netns/cni-1e3a878b-2e28-114d-2061-ba993488cab3"
Oct  2 19:08:20.205046 env[1104]: 2023-10-02 19:08:20.172 [INFO][3934] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb" iface="eth0" netns="/var/run/netns/cni-1e3a878b-2e28-114d-2061-ba993488cab3"
Oct  2 19:08:20.205046 env[1104]: 2023-10-02 19:08:20.172 [INFO][3934] dataplane_linux.go 562: Workload's veth was already gone.  Nothing to do. ContainerID="f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb" iface="eth0" netns="/var/run/netns/cni-1e3a878b-2e28-114d-2061-ba993488cab3"
Oct  2 19:08:20.205046 env[1104]: 2023-10-02 19:08:20.172 [INFO][3934] k8s.go 583: Releasing IP address(es) ContainerID="f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb"
Oct  2 19:08:20.205046 env[1104]: 2023-10-02 19:08:20.172 [INFO][3934] utils.go 196: Calico CNI releasing IP address ContainerID="f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb"
Oct  2 19:08:20.205046 env[1104]: 2023-10-02 19:08:20.193 [INFO][3942] ipam_plugin.go 416: Releasing address using handleID ContainerID="f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb" HandleID="k8s-pod-network.f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb" Workload="localhost-k8s-calico--kube--controllers--7bd445fdb4--mjchx-eth0"
Oct  2 19:08:20.205046 env[1104]: time="2023-10-02T19:08:20Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:08:20.205046 env[1104]: time="2023-10-02T19:08:20Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:08:20.205046 env[1104]: 2023-10-02 19:08:20.200 [WARNING][3942] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb" HandleID="k8s-pod-network.f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb" Workload="localhost-k8s-calico--kube--controllers--7bd445fdb4--mjchx-eth0"
Oct  2 19:08:20.205046 env[1104]: 2023-10-02 19:08:20.200 [INFO][3942] ipam_plugin.go 444: Releasing address using workloadID ContainerID="f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb" HandleID="k8s-pod-network.f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb" Workload="localhost-k8s-calico--kube--controllers--7bd445fdb4--mjchx-eth0"
Oct  2 19:08:20.205046 env[1104]: time="2023-10-02T19:08:20Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:08:20.205046 env[1104]: 2023-10-02 19:08:20.203 [INFO][3934] k8s.go 589: Teardown processing complete. ContainerID="f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb"
Oct  2 19:08:20.205683 env[1104]: time="2023-10-02T19:08:20.205197171Z" level=info msg="TearDown network for sandbox \"f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb\" successfully"
Oct  2 19:08:20.205683 env[1104]: time="2023-10-02T19:08:20.205249551Z" level=info msg="StopPodSandbox for \"f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb\" returns successfully"
Oct  2 19:08:20.206934 systemd[1]: run-netns-cni\x2d1e3a878b\x2d2e28\x2d114d\x2d2061\x2dba993488cab3.mount: Deactivated successfully.
Oct  2 19:08:20.207848 env[1104]: time="2023-10-02T19:08:20.207800786Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bd445fdb4-mjchx,Uid:a3345632-ea98-4598-a37e-30c3bad83cdd,Namespace:calico-system,Attempt:1,}"
Oct  2 19:08:20.329044 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Oct  2 19:08:20.329204 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0ec24f01811: link becomes ready
Oct  2 19:08:20.338869 systemd-networkd[1003]: cali0ec24f01811: Link UP
Oct  2 19:08:20.338876 systemd-networkd[1003]: cali0ec24f01811: Gained carrier
Oct  2 19:08:20.357350 env[1104]: 2023-10-02 19:08:20.256 [INFO][3951] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--7bd445fdb4--mjchx-eth0 calico-kube-controllers-7bd445fdb4- calico-system  a3345632-ea98-4598-a37e-30c3bad83cdd 971 0 2023-10-02 19:07:36 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7bd445fdb4 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] []  []} {k8s  localhost  calico-kube-controllers-7bd445fdb4-mjchx eth0 calico-kube-controllers [] []   [kns.calico-system ksa.calico-system.calico-kube-controllers] cali0ec24f01811  [] []}} ContainerID="088ba70a24580aef6ce1c87bbfd34ac73091d2a8bec9b6f2e8b666572012bcb8" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-mjchx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7bd445fdb4--mjchx-"
Oct  2 19:08:20.357350 env[1104]: 2023-10-02 19:08:20.257 [INFO][3951] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="088ba70a24580aef6ce1c87bbfd34ac73091d2a8bec9b6f2e8b666572012bcb8" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-mjchx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7bd445fdb4--mjchx-eth0"
Oct  2 19:08:20.357350 env[1104]: 2023-10-02 19:08:20.286 [INFO][3965] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="088ba70a24580aef6ce1c87bbfd34ac73091d2a8bec9b6f2e8b666572012bcb8" HandleID="k8s-pod-network.088ba70a24580aef6ce1c87bbfd34ac73091d2a8bec9b6f2e8b666572012bcb8" Workload="localhost-k8s-calico--kube--controllers--7bd445fdb4--mjchx-eth0"
Oct  2 19:08:20.357350 env[1104]: 2023-10-02 19:08:20.298 [INFO][3965] ipam_plugin.go 269: Auto assigning IP ContainerID="088ba70a24580aef6ce1c87bbfd34ac73091d2a8bec9b6f2e8b666572012bcb8" HandleID="k8s-pod-network.088ba70a24580aef6ce1c87bbfd34ac73091d2a8bec9b6f2e8b666572012bcb8" Workload="localhost-k8s-calico--kube--controllers--7bd445fdb4--mjchx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000520880), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-7bd445fdb4-mjchx", "timestamp":"2023-10-02 19:08:20.286856004 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Oct  2 19:08:20.357350 env[1104]: time="2023-10-02T19:08:20Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:08:20.357350 env[1104]: time="2023-10-02T19:08:20Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:08:20.357350 env[1104]: 2023-10-02 19:08:20.298 [INFO][3965] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost'
Oct  2 19:08:20.357350 env[1104]: 2023-10-02 19:08:20.300 [INFO][3965] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.088ba70a24580aef6ce1c87bbfd34ac73091d2a8bec9b6f2e8b666572012bcb8" host="localhost"
Oct  2 19:08:20.357350 env[1104]: 2023-10-02 19:08:20.306 [INFO][3965] ipam.go 372: Looking up existing affinities for host host="localhost"
Oct  2 19:08:20.357350 env[1104]: 2023-10-02 19:08:20.310 [INFO][3965] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost"
Oct  2 19:08:20.357350 env[1104]: 2023-10-02 19:08:20.312 [INFO][3965] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost"
Oct  2 19:08:20.357350 env[1104]: 2023-10-02 19:08:20.314 [INFO][3965] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost"
Oct  2 19:08:20.357350 env[1104]: 2023-10-02 19:08:20.314 [INFO][3965] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.088ba70a24580aef6ce1c87bbfd34ac73091d2a8bec9b6f2e8b666572012bcb8" host="localhost"
Oct  2 19:08:20.357350 env[1104]: 2023-10-02 19:08:20.316 [INFO][3965] ipam.go 1682: Creating new handle: k8s-pod-network.088ba70a24580aef6ce1c87bbfd34ac73091d2a8bec9b6f2e8b666572012bcb8
Oct  2 19:08:20.357350 env[1104]: 2023-10-02 19:08:20.319 [INFO][3965] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.088ba70a24580aef6ce1c87bbfd34ac73091d2a8bec9b6f2e8b666572012bcb8" host="localhost"
Oct  2 19:08:20.357350 env[1104]: 2023-10-02 19:08:20.324 [INFO][3965] ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.088ba70a24580aef6ce1c87bbfd34ac73091d2a8bec9b6f2e8b666572012bcb8" host="localhost"
Oct  2 19:08:20.357350 env[1104]: 2023-10-02 19:08:20.324 [INFO][3965] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.088ba70a24580aef6ce1c87bbfd34ac73091d2a8bec9b6f2e8b666572012bcb8" host="localhost"
Oct  2 19:08:20.357350 env[1104]: time="2023-10-02T19:08:20Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:08:20.357350 env[1104]: 2023-10-02 19:08:20.324 [INFO][3965] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="088ba70a24580aef6ce1c87bbfd34ac73091d2a8bec9b6f2e8b666572012bcb8" HandleID="k8s-pod-network.088ba70a24580aef6ce1c87bbfd34ac73091d2a8bec9b6f2e8b666572012bcb8" Workload="localhost-k8s-calico--kube--controllers--7bd445fdb4--mjchx-eth0"
Oct  2 19:08:20.358026 env[1104]: 2023-10-02 19:08:20.326 [INFO][3951] k8s.go 383: Populated endpoint ContainerID="088ba70a24580aef6ce1c87bbfd34ac73091d2a8bec9b6f2e8b666572012bcb8" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-mjchx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7bd445fdb4--mjchx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7bd445fdb4--mjchx-eth0", GenerateName:"calico-kube-controllers-7bd445fdb4-", Namespace:"calico-system", SelfLink:"", UID:"a3345632-ea98-4598-a37e-30c3bad83cdd", ResourceVersion:"971", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 36, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bd445fdb4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-7bd445fdb4-mjchx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali0ec24f01811", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:08:20.358026 env[1104]: 2023-10-02 19:08:20.326 [INFO][3951] k8s.go 384: Calico CNI using IPs: [192.168.88.132/32] ContainerID="088ba70a24580aef6ce1c87bbfd34ac73091d2a8bec9b6f2e8b666572012bcb8" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-mjchx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7bd445fdb4--mjchx-eth0"
Oct  2 19:08:20.358026 env[1104]: 2023-10-02 19:08:20.326 [INFO][3951] dataplane_linux.go 68: Setting the host side veth name to cali0ec24f01811 ContainerID="088ba70a24580aef6ce1c87bbfd34ac73091d2a8bec9b6f2e8b666572012bcb8" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-mjchx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7bd445fdb4--mjchx-eth0"
Oct  2 19:08:20.358026 env[1104]: 2023-10-02 19:08:20.329 [INFO][3951] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="088ba70a24580aef6ce1c87bbfd34ac73091d2a8bec9b6f2e8b666572012bcb8" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-mjchx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7bd445fdb4--mjchx-eth0"
Oct  2 19:08:20.358026 env[1104]: 2023-10-02 19:08:20.339 [INFO][3951] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="088ba70a24580aef6ce1c87bbfd34ac73091d2a8bec9b6f2e8b666572012bcb8" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-mjchx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7bd445fdb4--mjchx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7bd445fdb4--mjchx-eth0", GenerateName:"calico-kube-controllers-7bd445fdb4-", Namespace:"calico-system", SelfLink:"", UID:"a3345632-ea98-4598-a37e-30c3bad83cdd", ResourceVersion:"971", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 36, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bd445fdb4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"088ba70a24580aef6ce1c87bbfd34ac73091d2a8bec9b6f2e8b666572012bcb8", Pod:"calico-kube-controllers-7bd445fdb4-mjchx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali0ec24f01811", MAC:"ee:38:ff:d8:d1:41", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:08:20.358026 env[1104]: 2023-10-02 19:08:20.350 [INFO][3951] k8s.go 489: Wrote updated endpoint to datastore ContainerID="088ba70a24580aef6ce1c87bbfd34ac73091d2a8bec9b6f2e8b666572012bcb8" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-mjchx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7bd445fdb4--mjchx-eth0"
Oct  2 19:08:20.359000 audit[3989]: NETFILTER_CFG table=filter:110 family=2 entries=48 op=nft_register_chain pid=3989 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 19:08:20.359000 audit[3989]: SYSCALL arch=c000003e syscall=46 success=yes exit=23548 a0=3 a1=7ffffbd428b0 a2=0 a3=7ffffbd4289c items=0 ppid=3120 pid=3989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:20.359000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 19:08:20.430159 env[1104]: time="2023-10-02T19:08:20.429995702Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 19:08:20.430159 env[1104]: time="2023-10-02T19:08:20.430028154Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 19:08:20.430159 env[1104]: time="2023-10-02T19:08:20.430037463Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 19:08:20.430159 env[1104]: time="2023-10-02T19:08:20.430136403Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/088ba70a24580aef6ce1c87bbfd34ac73091d2a8bec9b6f2e8b666572012bcb8 pid=3997 runtime=io.containerd.runc.v2
Oct  2 19:08:20.450492 systemd[1]: Started cri-containerd-088ba70a24580aef6ce1c87bbfd34ac73091d2a8bec9b6f2e8b666572012bcb8.scope.
Oct  2 19:08:20.459000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.459000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.459000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.459000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.459000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.459000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.459000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.459000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.459000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.459000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.459000 audit: BPF prog-id=172 op=LOAD
Oct  2 19:08:20.460000 audit[4008]: AVC avc:  denied  { bpf } for  pid=4008 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.460000 audit[4008]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3997 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:20.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038386261373061323435383061656636636531633837626266643334
Oct  2 19:08:20.460000 audit[4008]: AVC avc:  denied  { perfmon } for  pid=4008 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.460000 audit[4008]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3997 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:20.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038386261373061323435383061656636636531633837626266643334
Oct  2 19:08:20.460000 audit[4008]: AVC avc:  denied  { bpf } for  pid=4008 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.460000 audit[4008]: AVC avc:  denied  { bpf } for  pid=4008 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.460000 audit[4008]: AVC avc:  denied  { bpf } for  pid=4008 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.460000 audit[4008]: AVC avc:  denied  { perfmon } for  pid=4008 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.460000 audit[4008]: AVC avc:  denied  { perfmon } for  pid=4008 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.460000 audit[4008]: AVC avc:  denied  { perfmon } for  pid=4008 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.460000 audit[4008]: AVC avc:  denied  { perfmon } for  pid=4008 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.460000 audit[4008]: AVC avc:  denied  { perfmon } for  pid=4008 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.460000 audit[4008]: AVC avc:  denied  { bpf } for  pid=4008 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.460000 audit[4008]: AVC avc:  denied  { bpf } for  pid=4008 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.460000 audit: BPF prog-id=173 op=LOAD
Oct  2 19:08:20.460000 audit[4008]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00028a5a0 items=0 ppid=3997 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:20.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038386261373061323435383061656636636531633837626266643334
Oct  2 19:08:20.460000 audit[4008]: AVC avc:  denied  { bpf } for  pid=4008 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.460000 audit[4008]: AVC avc:  denied  { bpf } for  pid=4008 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.460000 audit[4008]: AVC avc:  denied  { perfmon } for  pid=4008 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.460000 audit[4008]: AVC avc:  denied  { perfmon } for  pid=4008 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.460000 audit[4008]: AVC avc:  denied  { perfmon } for  pid=4008 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.460000 audit[4008]: AVC avc:  denied  { perfmon } for  pid=4008 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.460000 audit[4008]: AVC avc:  denied  { perfmon } for  pid=4008 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.460000 audit[4008]: AVC avc:  denied  { bpf } for  pid=4008 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.460000 audit[4008]: AVC avc:  denied  { bpf } for  pid=4008 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.460000 audit: BPF prog-id=174 op=LOAD
Oct  2 19:08:20.460000 audit[4008]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00028a5e8 items=0 ppid=3997 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:20.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038386261373061323435383061656636636531633837626266643334
Oct  2 19:08:20.460000 audit: BPF prog-id=174 op=UNLOAD
Oct  2 19:08:20.460000 audit: BPF prog-id=173 op=UNLOAD
Oct  2 19:08:20.460000 audit[4008]: AVC avc:  denied  { bpf } for  pid=4008 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.460000 audit[4008]: AVC avc:  denied  { bpf } for  pid=4008 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.460000 audit[4008]: AVC avc:  denied  { bpf } for  pid=4008 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.460000 audit[4008]: AVC avc:  denied  { perfmon } for  pid=4008 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.460000 audit[4008]: AVC avc:  denied  { perfmon } for  pid=4008 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.460000 audit[4008]: AVC avc:  denied  { perfmon } for  pid=4008 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.460000 audit[4008]: AVC avc:  denied  { perfmon } for  pid=4008 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.460000 audit[4008]: AVC avc:  denied  { perfmon } for  pid=4008 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.460000 audit[4008]: AVC avc:  denied  { bpf } for  pid=4008 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.460000 audit[4008]: AVC avc:  denied  { bpf } for  pid=4008 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:20.460000 audit: BPF prog-id=175 op=LOAD
Oct  2 19:08:20.460000 audit[4008]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00028a9f8 items=0 ppid=3997 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:20.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038386261373061323435383061656636636531633837626266643334
Oct  2 19:08:20.462692 systemd-resolved[1052]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address
Oct  2 19:08:20.486380 env[1104]: time="2023-10-02T19:08:20.486309114Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bd445fdb4-mjchx,Uid:a3345632-ea98-4598-a37e-30c3bad83cdd,Namespace:calico-system,Attempt:1,} returns sandbox id \"088ba70a24580aef6ce1c87bbfd34ac73091d2a8bec9b6f2e8b666572012bcb8\""
Oct  2 19:08:20.487983 env[1104]: time="2023-10-02T19:08:20.487940246Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\""
Oct  2 19:08:21.738457 systemd-networkd[1003]: cali0ec24f01811: Gained IPv6LL
Oct  2 19:08:23.620450 env[1104]: time="2023-10-02T19:08:23.620367507Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:08:23.622519 env[1104]: time="2023-10-02T19:08:23.622458296Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:08:23.624981 env[1104]: time="2023-10-02T19:08:23.624938654Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:08:23.626669 env[1104]: time="2023-10-02T19:08:23.626627770Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:b764feb1777655aabce5988324b69b412d23e087436ee2414dff893a158fcdef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 19:08:23.627547 env[1104]: time="2023-10-02T19:08:23.627509866Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\" returns image reference \"sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78\""
Oct  2 19:08:23.629522 env[1104]: time="2023-10-02T19:08:23.629479111Z" level=info msg="CreateContainer within sandbox \"088ba70a24580aef6ce1c87bbfd34ac73091d2a8bec9b6f2e8b666572012bcb8\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}"
Oct  2 19:08:23.640679 env[1104]: time="2023-10-02T19:08:23.640617502Z" level=info msg="CreateContainer within sandbox \"088ba70a24580aef6ce1c87bbfd34ac73091d2a8bec9b6f2e8b666572012bcb8\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"81a5f40cc2d9817bddea17cd855a00c0cc50cfb5a6248db7e3486f35e022460b\""
Oct  2 19:08:23.642830 env[1104]: time="2023-10-02T19:08:23.641195313Z" level=info msg="StartContainer for \"81a5f40cc2d9817bddea17cd855a00c0cc50cfb5a6248db7e3486f35e022460b\""
Oct  2 19:08:23.660747 systemd[1]: run-containerd-runc-k8s.io-81a5f40cc2d9817bddea17cd855a00c0cc50cfb5a6248db7e3486f35e022460b-runc.70NcFc.mount: Deactivated successfully.
Oct  2 19:08:23.663800 systemd[1]: Started cri-containerd-81a5f40cc2d9817bddea17cd855a00c0cc50cfb5a6248db7e3486f35e022460b.scope.
Oct  2 19:08:23.673000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.677126 kernel: kauditd_printk_skb: 316 callbacks suppressed
Oct  2 19:08:23.677371 kernel: audit: type=1400 audit(1696273703.673:1351): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.677415 kernel: audit: type=1400 audit(1696273703.673:1352): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.673000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.673000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.681198 kernel: audit: type=1400 audit(1696273703.673:1353): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.681278 kernel: audit: type=1400 audit(1696273703.673:1354): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.673000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.683265 kernel: audit: type=1400 audit(1696273703.673:1355): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.673000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.673000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.687195 kernel: audit: type=1400 audit(1696273703.673:1356): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.687263 kernel: audit: type=1400 audit(1696273703.673:1357): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.673000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.673000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.691172 kernel: audit: type=1400 audit(1696273703.673:1358): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.691238 kernel: audit: type=1400 audit(1696273703.673:1359): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.673000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.693105 kernel: audit: type=1400 audit(1696273703.677:1360): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.677000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.678000 audit: BPF prog-id=176 op=LOAD
Oct  2 19:08:23.678000 audit[4048]: AVC avc:  denied  { bpf } for  pid=4048 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.678000 audit[4048]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3997 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:23.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831613566343063633264393831376264646561313763643835356130
Oct  2 19:08:23.678000 audit[4048]: AVC avc:  denied  { perfmon } for  pid=4048 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.678000 audit[4048]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3997 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:23.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831613566343063633264393831376264646561313763643835356130
Oct  2 19:08:23.678000 audit[4048]: AVC avc:  denied  { bpf } for  pid=4048 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.678000 audit[4048]: AVC avc:  denied  { bpf } for  pid=4048 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.678000 audit[4048]: AVC avc:  denied  { bpf } for  pid=4048 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.678000 audit[4048]: AVC avc:  denied  { perfmon } for  pid=4048 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.678000 audit[4048]: AVC avc:  denied  { perfmon } for  pid=4048 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.678000 audit[4048]: AVC avc:  denied  { perfmon } for  pid=4048 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.678000 audit[4048]: AVC avc:  denied  { perfmon } for  pid=4048 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.678000 audit[4048]: AVC avc:  denied  { perfmon } for  pid=4048 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.678000 audit[4048]: AVC avc:  denied  { bpf } for  pid=4048 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.678000 audit[4048]: AVC avc:  denied  { bpf } for  pid=4048 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.678000 audit: BPF prog-id=177 op=LOAD
Oct  2 19:08:23.678000 audit[4048]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001ebd00 items=0 ppid=3997 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:23.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831613566343063633264393831376264646561313763643835356130
Oct  2 19:08:23.682000 audit[4048]: AVC avc:  denied  { bpf } for  pid=4048 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.682000 audit[4048]: AVC avc:  denied  { bpf } for  pid=4048 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.682000 audit[4048]: AVC avc:  denied  { perfmon } for  pid=4048 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.682000 audit[4048]: AVC avc:  denied  { perfmon } for  pid=4048 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.682000 audit[4048]: AVC avc:  denied  { perfmon } for  pid=4048 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.682000 audit[4048]: AVC avc:  denied  { perfmon } for  pid=4048 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.682000 audit[4048]: AVC avc:  denied  { perfmon } for  pid=4048 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.682000 audit[4048]: AVC avc:  denied  { bpf } for  pid=4048 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.682000 audit[4048]: AVC avc:  denied  { bpf } for  pid=4048 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.682000 audit: BPF prog-id=178 op=LOAD
Oct  2 19:08:23.682000 audit[4048]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001ebd48 items=0 ppid=3997 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:23.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831613566343063633264393831376264646561313763643835356130
Oct  2 19:08:23.686000 audit: BPF prog-id=178 op=UNLOAD
Oct  2 19:08:23.686000 audit: BPF prog-id=177 op=UNLOAD
Oct  2 19:08:23.686000 audit[4048]: AVC avc:  denied  { bpf } for  pid=4048 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.686000 audit[4048]: AVC avc:  denied  { bpf } for  pid=4048 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.686000 audit[4048]: AVC avc:  denied  { bpf } for  pid=4048 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.686000 audit[4048]: AVC avc:  denied  { perfmon } for  pid=4048 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.686000 audit[4048]: AVC avc:  denied  { perfmon } for  pid=4048 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.686000 audit[4048]: AVC avc:  denied  { perfmon } for  pid=4048 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.686000 audit[4048]: AVC avc:  denied  { perfmon } for  pid=4048 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.686000 audit[4048]: AVC avc:  denied  { perfmon } for  pid=4048 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.686000 audit[4048]: AVC avc:  denied  { bpf } for  pid=4048 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.686000 audit[4048]: AVC avc:  denied  { bpf } for  pid=4048 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 19:08:23.686000 audit: BPF prog-id=179 op=LOAD
Oct  2 19:08:23.686000 audit[4048]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003a0158 items=0 ppid=3997 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:23.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831613566343063633264393831376264646561313763643835356130
Oct  2 19:08:23.713329 env[1104]: time="2023-10-02T19:08:23.713267019Z" level=info msg="StartContainer for \"81a5f40cc2d9817bddea17cd855a00c0cc50cfb5a6248db7e3486f35e022460b\" returns successfully"
Oct  2 19:08:24.316906 kubelet[1978]: I1002 19:08:24.316451    1978 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7bd445fdb4-mjchx" podStartSLOduration=45.176236685 podCreationTimestamp="2023-10-02 19:07:36 +0000 UTC" firstStartedPulling="2023-10-02 19:08:20.487629357 +0000 UTC m=+67.460148199" lastFinishedPulling="2023-10-02 19:08:23.6277927 +0000 UTC m=+70.600311542" observedRunningTime="2023-10-02 19:08:24.315783785 +0000 UTC m=+71.288302627" watchObservedRunningTime="2023-10-02 19:08:24.316400028 +0000 UTC m=+71.288918870"
Oct  2 19:08:24.409000 audit[1862]: AVC avc:  denied  { watch } for  pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6787 scontext=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:08:24.409000 audit[1862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001512c80 a2=fc6 a3=0 items=0 ppid=1716 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 key=(null)
Oct  2 19:08:24.409000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:08:24.409000 audit[1862]: AVC avc:  denied  { watch } for  pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6787 scontext=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:08:24.409000 audit[1862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00266afa0 a2=fc6 a3=0 items=0 ppid=1716 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 key=(null)
Oct  2 19:08:24.409000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:08:24.410000 audit[1862]: AVC avc:  denied  { watch } for  pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6787 scontext=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:08:24.410000 audit[1862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00266afc0 a2=fc6 a3=0 items=0 ppid=1716 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 key=(null)
Oct  2 19:08:24.410000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:08:24.411000 audit[1862]: AVC avc:  denied  { watch } for  pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6787 scontext=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 19:08:24.411000 audit[1862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001512ca0 a2=fc6 a3=0 items=0 ppid=1716 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c901,c926 key=(null)
Oct  2 19:08:24.411000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 19:08:24.686683 kubelet[1978]: I1002 19:08:24.686537    1978 eviction_manager.go:346] "Eviction manager: attempting to reclaim" resourceName="ephemeral-storage"
Oct  2 19:08:24.686683 kubelet[1978]: I1002 19:08:24.686573    1978 container_gc.go:86] "Attempting to delete unused containers"
Oct  2 19:08:24.689034 env[1104]: time="2023-10-02T19:08:24.688992668Z" level=info msg="StopPodSandbox for \"f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb\""
Oct  2 19:08:24.750657 env[1104]: 2023-10-02 19:08:24.719 [WARNING][4118] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7bd445fdb4--mjchx-eth0", GenerateName:"calico-kube-controllers-7bd445fdb4-", Namespace:"calico-system", SelfLink:"", UID:"a3345632-ea98-4598-a37e-30c3bad83cdd", ResourceVersion:"1007", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 36, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bd445fdb4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"088ba70a24580aef6ce1c87bbfd34ac73091d2a8bec9b6f2e8b666572012bcb8", Pod:"calico-kube-controllers-7bd445fdb4-mjchx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali0ec24f01811", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:08:24.750657 env[1104]: 2023-10-02 19:08:24.719 [INFO][4118] k8s.go 576: Cleaning up netns ContainerID="f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb"
Oct  2 19:08:24.750657 env[1104]: 2023-10-02 19:08:24.719 [INFO][4118] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb" iface="eth0" netns=""
Oct  2 19:08:24.750657 env[1104]: 2023-10-02 19:08:24.719 [INFO][4118] k8s.go 583: Releasing IP address(es) ContainerID="f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb"
Oct  2 19:08:24.750657 env[1104]: 2023-10-02 19:08:24.719 [INFO][4118] utils.go 196: Calico CNI releasing IP address ContainerID="f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb"
Oct  2 19:08:24.750657 env[1104]: 2023-10-02 19:08:24.739 [INFO][4126] ipam_plugin.go 416: Releasing address using handleID ContainerID="f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb" HandleID="k8s-pod-network.f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb" Workload="localhost-k8s-calico--kube--controllers--7bd445fdb4--mjchx-eth0"
Oct  2 19:08:24.750657 env[1104]: time="2023-10-02T19:08:24Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:08:24.750657 env[1104]: time="2023-10-02T19:08:24Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:08:24.750657 env[1104]: 2023-10-02 19:08:24.746 [WARNING][4126] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb" HandleID="k8s-pod-network.f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb" Workload="localhost-k8s-calico--kube--controllers--7bd445fdb4--mjchx-eth0"
Oct  2 19:08:24.750657 env[1104]: 2023-10-02 19:08:24.746 [INFO][4126] ipam_plugin.go 444: Releasing address using workloadID ContainerID="f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb" HandleID="k8s-pod-network.f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb" Workload="localhost-k8s-calico--kube--controllers--7bd445fdb4--mjchx-eth0"
Oct  2 19:08:24.750657 env[1104]: time="2023-10-02T19:08:24Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:08:24.750657 env[1104]: 2023-10-02 19:08:24.749 [INFO][4118] k8s.go 589: Teardown processing complete. ContainerID="f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb"
Oct  2 19:08:24.751303 env[1104]: time="2023-10-02T19:08:24.750683312Z" level=info msg="TearDown network for sandbox \"f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb\" successfully"
Oct  2 19:08:24.751303 env[1104]: time="2023-10-02T19:08:24.750717418Z" level=info msg="StopPodSandbox for \"f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb\" returns successfully"
Oct  2 19:08:24.751402 env[1104]: time="2023-10-02T19:08:24.751372827Z" level=info msg="RemovePodSandbox for \"f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb\""
Oct  2 19:08:24.751449 env[1104]: time="2023-10-02T19:08:24.751409146Z" level=info msg="Forcibly stopping sandbox \"f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb\""
Oct  2 19:08:24.822674 env[1104]: 2023-10-02 19:08:24.789 [WARNING][4148] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7bd445fdb4--mjchx-eth0", GenerateName:"calico-kube-controllers-7bd445fdb4-", Namespace:"calico-system", SelfLink:"", UID:"a3345632-ea98-4598-a37e-30c3bad83cdd", ResourceVersion:"1007", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 36, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bd445fdb4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"088ba70a24580aef6ce1c87bbfd34ac73091d2a8bec9b6f2e8b666572012bcb8", Pod:"calico-kube-controllers-7bd445fdb4-mjchx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali0ec24f01811", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:08:24.822674 env[1104]: 2023-10-02 19:08:24.789 [INFO][4148] k8s.go 576: Cleaning up netns ContainerID="f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb"
Oct  2 19:08:24.822674 env[1104]: 2023-10-02 19:08:24.789 [INFO][4148] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb" iface="eth0" netns=""
Oct  2 19:08:24.822674 env[1104]: 2023-10-02 19:08:24.789 [INFO][4148] k8s.go 583: Releasing IP address(es) ContainerID="f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb"
Oct  2 19:08:24.822674 env[1104]: 2023-10-02 19:08:24.790 [INFO][4148] utils.go 196: Calico CNI releasing IP address ContainerID="f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb"
Oct  2 19:08:24.822674 env[1104]: 2023-10-02 19:08:24.811 [INFO][4155] ipam_plugin.go 416: Releasing address using handleID ContainerID="f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb" HandleID="k8s-pod-network.f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb" Workload="localhost-k8s-calico--kube--controllers--7bd445fdb4--mjchx-eth0"
Oct  2 19:08:24.822674 env[1104]: time="2023-10-02T19:08:24Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:08:24.822674 env[1104]: time="2023-10-02T19:08:24Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:08:24.822674 env[1104]: 2023-10-02 19:08:24.818 [WARNING][4155] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb" HandleID="k8s-pod-network.f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb" Workload="localhost-k8s-calico--kube--controllers--7bd445fdb4--mjchx-eth0"
Oct  2 19:08:24.822674 env[1104]: 2023-10-02 19:08:24.818 [INFO][4155] ipam_plugin.go 444: Releasing address using workloadID ContainerID="f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb" HandleID="k8s-pod-network.f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb" Workload="localhost-k8s-calico--kube--controllers--7bd445fdb4--mjchx-eth0"
Oct  2 19:08:24.822674 env[1104]: time="2023-10-02T19:08:24Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:08:24.822674 env[1104]: 2023-10-02 19:08:24.821 [INFO][4148] k8s.go 589: Teardown processing complete. ContainerID="f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb"
Oct  2 19:08:24.823397 env[1104]: time="2023-10-02T19:08:24.822719841Z" level=info msg="TearDown network for sandbox \"f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb\" successfully"
Oct  2 19:08:24.826045 env[1104]: time="2023-10-02T19:08:24.826005622Z" level=info msg="RemovePodSandbox \"f62887911284c4381ad3715c7d0d74a35325c241fc50700e8bb11330dd869ecb\" returns successfully"
Oct  2 19:08:24.826618 env[1104]: time="2023-10-02T19:08:24.826576980Z" level=info msg="StopPodSandbox for \"2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc\""
Oct  2 19:08:24.901868 env[1104]: 2023-10-02 19:08:24.863 [WARNING][4177] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--v789s-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2bce08ea-b764-40b2-b139-323c1778a319", ResourceVersion:"965", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 49, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"24b972ba6f2afe4967c111ccc2597d8c40d9bb350dde608952652f7b44fdc389", Pod:"csi-node-driver-v789s", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali29fca7eef63", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:08:24.901868 env[1104]: 2023-10-02 19:08:24.863 [INFO][4177] k8s.go 576: Cleaning up netns ContainerID="2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc"
Oct  2 19:08:24.901868 env[1104]: 2023-10-02 19:08:24.863 [INFO][4177] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc" iface="eth0" netns=""
Oct  2 19:08:24.901868 env[1104]: 2023-10-02 19:08:24.863 [INFO][4177] k8s.go 583: Releasing IP address(es) ContainerID="2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc"
Oct  2 19:08:24.901868 env[1104]: 2023-10-02 19:08:24.863 [INFO][4177] utils.go 196: Calico CNI releasing IP address ContainerID="2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc"
Oct  2 19:08:24.901868 env[1104]: 2023-10-02 19:08:24.889 [INFO][4184] ipam_plugin.go 416: Releasing address using handleID ContainerID="2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc" HandleID="k8s-pod-network.2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc" Workload="localhost-k8s-csi--node--driver--v789s-eth0"
Oct  2 19:08:24.901868 env[1104]: time="2023-10-02T19:08:24Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:08:24.901868 env[1104]: time="2023-10-02T19:08:24Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:08:24.901868 env[1104]: 2023-10-02 19:08:24.896 [WARNING][4184] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc" HandleID="k8s-pod-network.2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc" Workload="localhost-k8s-csi--node--driver--v789s-eth0"
Oct  2 19:08:24.901868 env[1104]: 2023-10-02 19:08:24.896 [INFO][4184] ipam_plugin.go 444: Releasing address using workloadID ContainerID="2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc" HandleID="k8s-pod-network.2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc" Workload="localhost-k8s-csi--node--driver--v789s-eth0"
Oct  2 19:08:24.901868 env[1104]: time="2023-10-02T19:08:24Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:08:24.901868 env[1104]: 2023-10-02 19:08:24.900 [INFO][4177] k8s.go 589: Teardown processing complete. ContainerID="2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc"
Oct  2 19:08:24.902620 env[1104]: time="2023-10-02T19:08:24.901900723Z" level=info msg="TearDown network for sandbox \"2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc\" successfully"
Oct  2 19:08:24.902620 env[1104]: time="2023-10-02T19:08:24.901947773Z" level=info msg="StopPodSandbox for \"2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc\" returns successfully"
Oct  2 19:08:24.902780 env[1104]: time="2023-10-02T19:08:24.902723994Z" level=info msg="RemovePodSandbox for \"2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc\""
Oct  2 19:08:24.902859 env[1104]: time="2023-10-02T19:08:24.902804970Z" level=info msg="Forcibly stopping sandbox \"2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc\""
Oct  2 19:08:24.992233 env[1104]: 2023-10-02 19:08:24.951 [WARNING][4206] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--v789s-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2bce08ea-b764-40b2-b139-323c1778a319", ResourceVersion:"965", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 49, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"24b972ba6f2afe4967c111ccc2597d8c40d9bb350dde608952652f7b44fdc389", Pod:"csi-node-driver-v789s", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali29fca7eef63", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:08:24.992233 env[1104]: 2023-10-02 19:08:24.951 [INFO][4206] k8s.go 576: Cleaning up netns ContainerID="2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc"
Oct  2 19:08:24.992233 env[1104]: 2023-10-02 19:08:24.951 [INFO][4206] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc" iface="eth0" netns=""
Oct  2 19:08:24.992233 env[1104]: 2023-10-02 19:08:24.951 [INFO][4206] k8s.go 583: Releasing IP address(es) ContainerID="2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc"
Oct  2 19:08:24.992233 env[1104]: 2023-10-02 19:08:24.951 [INFO][4206] utils.go 196: Calico CNI releasing IP address ContainerID="2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc"
Oct  2 19:08:24.992233 env[1104]: 2023-10-02 19:08:24.977 [INFO][4213] ipam_plugin.go 416: Releasing address using handleID ContainerID="2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc" HandleID="k8s-pod-network.2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc" Workload="localhost-k8s-csi--node--driver--v789s-eth0"
Oct  2 19:08:24.992233 env[1104]: time="2023-10-02T19:08:24Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:08:24.992233 env[1104]: time="2023-10-02T19:08:24Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:08:24.992233 env[1104]: 2023-10-02 19:08:24.984 [WARNING][4213] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc" HandleID="k8s-pod-network.2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc" Workload="localhost-k8s-csi--node--driver--v789s-eth0"
Oct  2 19:08:24.992233 env[1104]: 2023-10-02 19:08:24.984 [INFO][4213] ipam_plugin.go 444: Releasing address using workloadID ContainerID="2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc" HandleID="k8s-pod-network.2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc" Workload="localhost-k8s-csi--node--driver--v789s-eth0"
Oct  2 19:08:24.992233 env[1104]: time="2023-10-02T19:08:24Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:08:24.992233 env[1104]: 2023-10-02 19:08:24.990 [INFO][4206] k8s.go 589: Teardown processing complete. ContainerID="2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc"
Oct  2 19:08:24.992831 env[1104]: time="2023-10-02T19:08:24.992260739Z" level=info msg="TearDown network for sandbox \"2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc\" successfully"
Oct  2 19:08:25.001675 env[1104]: time="2023-10-02T19:08:25.001606602Z" level=info msg="RemovePodSandbox \"2ce0aa5ee4e01c4a3a564170f8a4c041731513dd1b1c13cffb778a1832e485fc\" returns successfully"
Oct  2 19:08:25.002206 env[1104]: time="2023-10-02T19:08:25.002180443Z" level=info msg="StopPodSandbox for \"704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb\""
Oct  2 19:08:25.074067 env[1104]: 2023-10-02 19:08:25.038 [WARNING][4236] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--8pvzx-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"45dbd647-0143-42f4-92f9-e54c68348a9c", ResourceVersion:"928", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 29, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"dbf813839a8420050778145fd0249722effe093999f4717a5259e96be7f6e7e1", Pod:"coredns-5d78c9869d-8pvzx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9cdd6fb8998", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:08:25.074067 env[1104]: 2023-10-02 19:08:25.038 [INFO][4236] k8s.go 576: Cleaning up netns ContainerID="704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb"
Oct  2 19:08:25.074067 env[1104]: 2023-10-02 19:08:25.038 [INFO][4236] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb" iface="eth0" netns=""
Oct  2 19:08:25.074067 env[1104]: 2023-10-02 19:08:25.038 [INFO][4236] k8s.go 583: Releasing IP address(es) ContainerID="704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb"
Oct  2 19:08:25.074067 env[1104]: 2023-10-02 19:08:25.039 [INFO][4236] utils.go 196: Calico CNI releasing IP address ContainerID="704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb"
Oct  2 19:08:25.074067 env[1104]: 2023-10-02 19:08:25.061 [INFO][4243] ipam_plugin.go 416: Releasing address using handleID ContainerID="704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb" HandleID="k8s-pod-network.704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb" Workload="localhost-k8s-coredns--5d78c9869d--8pvzx-eth0"
Oct  2 19:08:25.074067 env[1104]: time="2023-10-02T19:08:25Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:08:25.074067 env[1104]: time="2023-10-02T19:08:25Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:08:25.074067 env[1104]: 2023-10-02 19:08:25.069 [WARNING][4243] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb" HandleID="k8s-pod-network.704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb" Workload="localhost-k8s-coredns--5d78c9869d--8pvzx-eth0"
Oct  2 19:08:25.074067 env[1104]: 2023-10-02 19:08:25.069 [INFO][4243] ipam_plugin.go 444: Releasing address using workloadID ContainerID="704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb" HandleID="k8s-pod-network.704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb" Workload="localhost-k8s-coredns--5d78c9869d--8pvzx-eth0"
Oct  2 19:08:25.074067 env[1104]: time="2023-10-02T19:08:25Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:08:25.074067 env[1104]: 2023-10-02 19:08:25.072 [INFO][4236] k8s.go 589: Teardown processing complete. ContainerID="704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb"
Oct  2 19:08:25.074594 env[1104]: time="2023-10-02T19:08:25.074099818Z" level=info msg="TearDown network for sandbox \"704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb\" successfully"
Oct  2 19:08:25.074594 env[1104]: time="2023-10-02T19:08:25.074142671Z" level=info msg="StopPodSandbox for \"704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb\" returns successfully"
Oct  2 19:08:25.074832 env[1104]: time="2023-10-02T19:08:25.074779203Z" level=info msg="RemovePodSandbox for \"704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb\""
Oct  2 19:08:25.074887 env[1104]: time="2023-10-02T19:08:25.074827385Z" level=info msg="Forcibly stopping sandbox \"704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb\""
Oct  2 19:08:25.147044 env[1104]: 2023-10-02 19:08:25.113 [WARNING][4265] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--8pvzx-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"45dbd647-0143-42f4-92f9-e54c68348a9c", ResourceVersion:"928", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 29, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"dbf813839a8420050778145fd0249722effe093999f4717a5259e96be7f6e7e1", Pod:"coredns-5d78c9869d-8pvzx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9cdd6fb8998", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:08:25.147044 env[1104]: 2023-10-02 19:08:25.113 [INFO][4265] k8s.go 576: Cleaning up netns ContainerID="704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb"
Oct  2 19:08:25.147044 env[1104]: 2023-10-02 19:08:25.113 [INFO][4265] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb" iface="eth0" netns=""
Oct  2 19:08:25.147044 env[1104]: 2023-10-02 19:08:25.113 [INFO][4265] k8s.go 583: Releasing IP address(es) ContainerID="704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb"
Oct  2 19:08:25.147044 env[1104]: 2023-10-02 19:08:25.113 [INFO][4265] utils.go 196: Calico CNI releasing IP address ContainerID="704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb"
Oct  2 19:08:25.147044 env[1104]: 2023-10-02 19:08:25.135 [INFO][4272] ipam_plugin.go 416: Releasing address using handleID ContainerID="704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb" HandleID="k8s-pod-network.704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb" Workload="localhost-k8s-coredns--5d78c9869d--8pvzx-eth0"
Oct  2 19:08:25.147044 env[1104]: time="2023-10-02T19:08:25Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:08:25.147044 env[1104]: time="2023-10-02T19:08:25Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:08:25.147044 env[1104]: 2023-10-02 19:08:25.142 [WARNING][4272] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb" HandleID="k8s-pod-network.704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb" Workload="localhost-k8s-coredns--5d78c9869d--8pvzx-eth0"
Oct  2 19:08:25.147044 env[1104]: 2023-10-02 19:08:25.142 [INFO][4272] ipam_plugin.go 444: Releasing address using workloadID ContainerID="704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb" HandleID="k8s-pod-network.704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb" Workload="localhost-k8s-coredns--5d78c9869d--8pvzx-eth0"
Oct  2 19:08:25.147044 env[1104]: time="2023-10-02T19:08:25Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:08:25.147044 env[1104]: 2023-10-02 19:08:25.145 [INFO][4265] k8s.go 589: Teardown processing complete. ContainerID="704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb"
Oct  2 19:08:25.147697 env[1104]: time="2023-10-02T19:08:25.147073117Z" level=info msg="TearDown network for sandbox \"704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb\" successfully"
Oct  2 19:08:25.150574 env[1104]: time="2023-10-02T19:08:25.150536516Z" level=info msg="RemovePodSandbox \"704c16fd6972e5188b70a0957b83cc92d463b4251d916596549bf7d4eb5db7bb\" returns successfully"
Oct  2 19:08:25.151175 env[1104]: time="2023-10-02T19:08:25.151137299Z" level=info msg="StopPodSandbox for \"503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb\""
Oct  2 19:08:25.220249 env[1104]: 2023-10-02 19:08:25.185 [WARNING][4294] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--szml2-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"e901c2bb-1cd6-4e03-9551-a9853ecda2d5", ResourceVersion:"933", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 29, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"52a36021de520b8364a26c036aae75b3db9ba261c84fd6ad45f8024d6aec7a8b", Pod:"coredns-5d78c9869d-szml2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali051dded4fb1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:08:25.220249 env[1104]: 2023-10-02 19:08:25.186 [INFO][4294] k8s.go 576: Cleaning up netns ContainerID="503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb"
Oct  2 19:08:25.220249 env[1104]: 2023-10-02 19:08:25.186 [INFO][4294] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb" iface="eth0" netns=""
Oct  2 19:08:25.220249 env[1104]: 2023-10-02 19:08:25.186 [INFO][4294] k8s.go 583: Releasing IP address(es) ContainerID="503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb"
Oct  2 19:08:25.220249 env[1104]: 2023-10-02 19:08:25.186 [INFO][4294] utils.go 196: Calico CNI releasing IP address ContainerID="503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb"
Oct  2 19:08:25.220249 env[1104]: 2023-10-02 19:08:25.207 [INFO][4302] ipam_plugin.go 416: Releasing address using handleID ContainerID="503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb" HandleID="k8s-pod-network.503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb" Workload="localhost-k8s-coredns--5d78c9869d--szml2-eth0"
Oct  2 19:08:25.220249 env[1104]: time="2023-10-02T19:08:25Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:08:25.220249 env[1104]: time="2023-10-02T19:08:25Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:08:25.220249 env[1104]: 2023-10-02 19:08:25.215 [WARNING][4302] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb" HandleID="k8s-pod-network.503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb" Workload="localhost-k8s-coredns--5d78c9869d--szml2-eth0"
Oct  2 19:08:25.220249 env[1104]: 2023-10-02 19:08:25.215 [INFO][4302] ipam_plugin.go 444: Releasing address using workloadID ContainerID="503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb" HandleID="k8s-pod-network.503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb" Workload="localhost-k8s-coredns--5d78c9869d--szml2-eth0"
Oct  2 19:08:25.220249 env[1104]: time="2023-10-02T19:08:25Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:08:25.220249 env[1104]: 2023-10-02 19:08:25.218 [INFO][4294] k8s.go 589: Teardown processing complete. ContainerID="503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb"
Oct  2 19:08:25.220759 env[1104]: time="2023-10-02T19:08:25.220279644Z" level=info msg="TearDown network for sandbox \"503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb\" successfully"
Oct  2 19:08:25.220759 env[1104]: time="2023-10-02T19:08:25.220331273Z" level=info msg="StopPodSandbox for \"503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb\" returns successfully"
Oct  2 19:08:25.220851 env[1104]: time="2023-10-02T19:08:25.220820082Z" level=info msg="RemovePodSandbox for \"503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb\""
Oct  2 19:08:25.220885 env[1104]: time="2023-10-02T19:08:25.220850780Z" level=info msg="Forcibly stopping sandbox \"503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb\""
Oct  2 19:08:25.288160 env[1104]: 2023-10-02 19:08:25.255 [WARNING][4324] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--szml2-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"e901c2bb-1cd6-4e03-9551-a9853ecda2d5", ResourceVersion:"933", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 29, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"52a36021de520b8364a26c036aae75b3db9ba261c84fd6ad45f8024d6aec7a8b", Pod:"coredns-5d78c9869d-szml2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali051dded4fb1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 19:08:25.288160 env[1104]: 2023-10-02 19:08:25.256 [INFO][4324] k8s.go 576: Cleaning up netns ContainerID="503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb"
Oct  2 19:08:25.288160 env[1104]: 2023-10-02 19:08:25.256 [INFO][4324] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb" iface="eth0" netns=""
Oct  2 19:08:25.288160 env[1104]: 2023-10-02 19:08:25.256 [INFO][4324] k8s.go 583: Releasing IP address(es) ContainerID="503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb"
Oct  2 19:08:25.288160 env[1104]: 2023-10-02 19:08:25.256 [INFO][4324] utils.go 196: Calico CNI releasing IP address ContainerID="503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb"
Oct  2 19:08:25.288160 env[1104]: 2023-10-02 19:08:25.275 [INFO][4332] ipam_plugin.go 416: Releasing address using handleID ContainerID="503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb" HandleID="k8s-pod-network.503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb" Workload="localhost-k8s-coredns--5d78c9869d--szml2-eth0"
Oct  2 19:08:25.288160 env[1104]: time="2023-10-02T19:08:25Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 19:08:25.288160 env[1104]: time="2023-10-02T19:08:25Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 19:08:25.288160 env[1104]: 2023-10-02 19:08:25.281 [WARNING][4332] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb" HandleID="k8s-pod-network.503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb" Workload="localhost-k8s-coredns--5d78c9869d--szml2-eth0"
Oct  2 19:08:25.288160 env[1104]: 2023-10-02 19:08:25.281 [INFO][4332] ipam_plugin.go 444: Releasing address using workloadID ContainerID="503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb" HandleID="k8s-pod-network.503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb" Workload="localhost-k8s-coredns--5d78c9869d--szml2-eth0"
Oct  2 19:08:25.288160 env[1104]: time="2023-10-02T19:08:25Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 19:08:25.288160 env[1104]: 2023-10-02 19:08:25.284 [INFO][4324] k8s.go 589: Teardown processing complete. ContainerID="503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb"
Oct  2 19:08:25.288160 env[1104]: time="2023-10-02T19:08:25.286914926Z" level=info msg="TearDown network for sandbox \"503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb\" successfully"
Oct  2 19:08:25.358477 env[1104]: time="2023-10-02T19:08:25.358395499Z" level=info msg="RemovePodSandbox \"503e7aa2c4d1e541702b131d0ad14732bcf7713dfb48a3dd02964ddfab4001fb\" returns successfully"
Oct  2 19:08:25.358954 kubelet[1978]: I1002 19:08:25.358920    1978 image_gc_manager.go:340] "Attempting to delete unused images"
Oct  2 19:08:25.374003 kubelet[1978]: I1002 19:08:25.373961    1978 eviction_manager.go:357] "Eviction manager: must evict pod(s) to reclaim" resourceName="ephemeral-storage"
Oct  2 19:08:25.374186 kubelet[1978]: I1002 19:08:25.374138    1978 eviction_manager.go:375] "Eviction manager: pods ranked for eviction" pods=[calico-system/csi-node-driver-v789s calico-system/calico-typha-68ff5b7b94-4ks4r kube-system/coredns-5d78c9869d-szml2 kube-system/coredns-5d78c9869d-8pvzx calico-system/calico-kube-controllers-7bd445fdb4-mjchx calico-system/calico-node-66rxx kube-system/kube-proxy-7mshp kube-system/kube-controller-manager-localhost kube-system/kube-apiserver-localhost kube-system/kube-scheduler-localhost]
Oct  2 19:08:25.374186 kubelet[1978]: E1002 19:08:25.374170    1978 eviction_manager.go:578] "Eviction manager: cannot evict a critical pod" pod="calico-system/csi-node-driver-v789s"
Oct  2 19:08:25.374270 kubelet[1978]: E1002 19:08:25.374198    1978 eviction_manager.go:578] "Eviction manager: cannot evict a critical pod" pod="calico-system/calico-typha-68ff5b7b94-4ks4r"
Oct  2 19:08:25.374270 kubelet[1978]: E1002 19:08:25.374219    1978 eviction_manager.go:578] "Eviction manager: cannot evict a critical pod" pod="kube-system/coredns-5d78c9869d-szml2"
Oct  2 19:08:25.374270 kubelet[1978]: E1002 19:08:25.374261    1978 eviction_manager.go:578] "Eviction manager: cannot evict a critical pod" pod="kube-system/coredns-5d78c9869d-8pvzx"
Oct  2 19:08:25.374270 kubelet[1978]: E1002 19:08:25.374270    1978 eviction_manager.go:578] "Eviction manager: cannot evict a critical pod" pod="calico-system/calico-kube-controllers-7bd445fdb4-mjchx"
Oct  2 19:08:25.374365 kubelet[1978]: E1002 19:08:25.374278    1978 eviction_manager.go:578] "Eviction manager: cannot evict a critical pod" pod="calico-system/calico-node-66rxx"
Oct  2 19:08:25.374365 kubelet[1978]: E1002 19:08:25.374288    1978 eviction_manager.go:578] "Eviction manager: cannot evict a critical pod" pod="kube-system/kube-proxy-7mshp"
Oct  2 19:08:25.374365 kubelet[1978]: E1002 19:08:25.374296    1978 eviction_manager.go:578] "Eviction manager: cannot evict a critical pod" pod="kube-system/kube-controller-manager-localhost"
Oct  2 19:08:25.374365 kubelet[1978]: E1002 19:08:25.374310    1978 eviction_manager.go:578] "Eviction manager: cannot evict a critical pod" pod="kube-system/kube-apiserver-localhost"
Oct  2 19:08:25.374365 kubelet[1978]: E1002 19:08:25.374318    1978 eviction_manager.go:578] "Eviction manager: cannot evict a critical pod" pod="kube-system/kube-scheduler-localhost"
Oct  2 19:08:25.374365 kubelet[1978]: I1002 19:08:25.374328    1978 eviction_manager.go:407] "Eviction manager: unable to evict any pods from the node"
Oct  2 19:08:25.964640 kubelet[1978]: E1002 19:08:25.964605    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:08:27.129627 kubelet[1978]: E1002 19:08:27.129557    1978 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Oct  2 19:08:27.276364 systemd[1]: Started sshd@12-10.0.0.30:22-10.0.0.1:49876.service.
Oct  2 19:08:27.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.30:22-10.0.0.1:49876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:27.318000 audit[4363]: USER_ACCT pid=4363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:27.318494 sshd[4363]: Accepted publickey for core from 10.0.0.1 port 49876 ssh2: RSA SHA256:9wRqOmzBU7I1L73Sd3XbDPVeoZziQ4I3fHnP0PJ8idM
Oct  2 19:08:27.319000 audit[4363]: CRED_ACQ pid=4363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:27.319000 audit[4363]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3e008630 a2=3 a3=0 items=0 ppid=1 pid=4363 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 19:08:27.319000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Oct  2 19:08:27.320345 sshd[4363]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 19:08:27.324176 systemd-logind[1090]: New session 13 of user core.
Oct  2 19:08:27.324984 systemd[1]: Started session-13.scope.
Oct  2 19:08:27.328000 audit[4363]: USER_START pid=4363 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:27.330000 audit[4365]: CRED_ACQ pid=4365 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:27.441350 sshd[4363]: pam_unix(sshd:session): session closed for user core
Oct  2 19:08:27.442000 audit[4363]: USER_END pid=4363 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:27.442000 audit[4363]: CRED_DISP pid=4363 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Oct  2 19:08:27.444634 systemd[1]: sshd@12-10.0.0.30:22-10.0.0.1:49876.service: Deactivated successfully.
Oct  2 19:08:27.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.30:22-10.0.0.1:49876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 19:08:27.445421 systemd[1]: session-13.scope: Deactivated successfully.
Oct  2 19:08:27.446016 systemd-logind[1090]: Session 13 logged out. Waiting for processes to exit.
Oct  2 19:08:27.446762 systemd-logind[1090]: Removed session 13.