Oct 2 19:04:20.766685 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Oct 2 19:04:20.766719 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Oct 2 17:55:37 -00 2023 Oct 2 19:04:20.766728 kernel: efi: EFI v2.70 by EDK II Oct 2 19:04:20.766734 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 Oct 2 19:04:20.766739 kernel: random: crng init done Oct 2 19:04:20.766745 kernel: ACPI: Early table checksum verification disabled Oct 2 19:04:20.766754 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) Oct 2 19:04:20.766761 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) Oct 2 19:04:20.766784 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:04:20.766792 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:04:20.766798 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:04:20.766804 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:04:20.766809 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:04:20.766814 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:04:20.766823 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:04:20.766829 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:04:20.766835 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:04:20.766841 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 Oct 2 19:04:20.766846 kernel: NUMA: Failed to initialise from firmware Oct 2 19:04:20.766852 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] Oct 2 19:04:20.766858 kernel: NUMA: NODE_DATA [mem 0xdcb0b900-0xdcb10fff] Oct 2 19:04:20.766864 kernel: Zone ranges: Oct 2 19:04:20.766869 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] Oct 2 19:04:20.766876 kernel: DMA32 empty Oct 2 19:04:20.766882 kernel: Normal empty Oct 2 19:04:20.766887 kernel: Movable zone start for each node Oct 2 19:04:20.766893 kernel: Early memory node ranges Oct 2 19:04:20.766899 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] Oct 2 19:04:20.766905 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] Oct 2 19:04:20.766910 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] Oct 2 19:04:20.766916 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] Oct 2 19:04:20.766921 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] Oct 2 19:04:20.766927 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] Oct 2 19:04:20.766932 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] Oct 2 19:04:20.766938 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] Oct 2 19:04:20.766945 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges Oct 2 19:04:20.766951 kernel: psci: probing for conduit method from ACPI. Oct 2 19:04:20.766956 kernel: psci: PSCIv1.1 detected in firmware. Oct 2 19:04:20.766962 kernel: psci: Using standard PSCI v0.2 function IDs Oct 2 19:04:20.766968 kernel: psci: Trusted OS migration not required Oct 2 19:04:20.766977 kernel: psci: SMC Calling Convention v1.1 Oct 2 19:04:20.766983 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) Oct 2 19:04:20.766991 kernel: ACPI: SRAT not present Oct 2 19:04:20.766998 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Oct 2 19:04:20.767004 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Oct 2 19:04:20.767010 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 Oct 2 19:04:20.767016 kernel: Detected PIPT I-cache on CPU0 Oct 2 19:04:20.767022 kernel: CPU features: detected: GIC system register CPU interface Oct 2 19:04:20.767028 kernel: CPU features: detected: Hardware dirty bit management Oct 2 19:04:20.767034 kernel: CPU features: detected: Spectre-v4 Oct 2 19:04:20.767040 kernel: CPU features: detected: Spectre-BHB Oct 2 19:04:20.767059 kernel: CPU features: kernel page table isolation forced ON by KASLR Oct 2 19:04:20.767065 kernel: CPU features: detected: Kernel page table isolation (KPTI) Oct 2 19:04:20.767072 kernel: CPU features: detected: ARM erratum 1418040 Oct 2 19:04:20.767078 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 Oct 2 19:04:20.767084 kernel: Policy zone: DMA Oct 2 19:04:20.767091 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=684fe6a2259d7fb96810743ab87aaaa03d9f185b113bd6990a64d1079e5672ca Oct 2 19:04:20.767098 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 19:04:20.767104 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Oct 2 19:04:20.767110 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 19:04:20.767116 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 19:04:20.767123 kernel: Memory: 2459280K/2572288K available (9792K kernel code, 2092K rwdata, 7548K rodata, 34560K init, 779K bss, 113008K reserved, 0K cma-reserved) Oct 2 19:04:20.767130 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Oct 2 19:04:20.767136 kernel: trace event string verifier disabled Oct 2 19:04:20.767143 kernel: rcu: Preemptible hierarchical RCU implementation. Oct 2 19:04:20.767150 kernel: rcu: RCU event tracing is enabled. Oct 2 19:04:20.767156 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Oct 2 19:04:20.767163 kernel: Trampoline variant of Tasks RCU enabled. Oct 2 19:04:20.767236 kernel: Tracing variant of Tasks RCU enabled. Oct 2 19:04:20.767243 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 19:04:20.767249 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Oct 2 19:04:20.767255 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Oct 2 19:04:20.767261 kernel: GICv3: 256 SPIs implemented Oct 2 19:04:20.767270 kernel: GICv3: 0 Extended SPIs implemented Oct 2 19:04:20.767276 kernel: GICv3: Distributor has no Range Selector support Oct 2 19:04:20.767282 kernel: Root IRQ handler: gic_handle_irq Oct 2 19:04:20.767288 kernel: GICv3: 16 PPIs implemented Oct 2 19:04:20.767294 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 Oct 2 19:04:20.767300 kernel: ACPI: SRAT not present Oct 2 19:04:20.767306 kernel: ITS [mem 0x08080000-0x0809ffff] Oct 2 19:04:20.767312 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) Oct 2 19:04:20.767319 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) Oct 2 19:04:20.767325 kernel: GICv3: using LPI property table @0x00000000400d0000 Oct 2 19:04:20.767331 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 Oct 2 19:04:20.767337 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Oct 2 19:04:20.767345 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Oct 2 19:04:20.767351 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Oct 2 19:04:20.767361 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Oct 2 19:04:20.767367 kernel: arm-pv: using stolen time PV Oct 2 19:04:20.767374 kernel: Console: colour dummy device 80x25 Oct 2 19:04:20.767380 kernel: ACPI: Core revision 20210730 Oct 2 19:04:20.767387 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Oct 2 19:04:20.767393 kernel: pid_max: default: 32768 minimum: 301 Oct 2 19:04:20.767400 kernel: LSM: Security Framework initializing Oct 2 19:04:20.767406 kernel: SELinux: Initializing. Oct 2 19:04:20.767433 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 2 19:04:20.767440 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 2 19:04:20.767447 kernel: rcu: Hierarchical SRCU implementation. Oct 2 19:04:20.767454 kernel: Platform MSI: ITS@0x8080000 domain created Oct 2 19:04:20.767460 kernel: PCI/MSI: ITS@0x8080000 domain created Oct 2 19:04:20.767466 kernel: Remapping and enabling EFI services. Oct 2 19:04:20.767473 kernel: smp: Bringing up secondary CPUs ... Oct 2 19:04:20.767479 kernel: Detected PIPT I-cache on CPU1 Oct 2 19:04:20.767486 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 Oct 2 19:04:20.767495 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 Oct 2 19:04:20.767501 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Oct 2 19:04:20.767508 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Oct 2 19:04:20.767514 kernel: Detected PIPT I-cache on CPU2 Oct 2 19:04:20.767521 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 Oct 2 19:04:20.767528 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 Oct 2 19:04:20.767534 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Oct 2 19:04:20.767541 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] Oct 2 19:04:20.767547 kernel: Detected PIPT I-cache on CPU3 Oct 2 19:04:20.767553 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 Oct 2 19:04:20.767561 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 Oct 2 19:04:20.767568 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Oct 2 19:04:20.767574 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] Oct 2 19:04:20.767580 kernel: smp: Brought up 1 node, 4 CPUs Oct 2 19:04:20.767592 kernel: SMP: Total of 4 processors activated. Oct 2 19:04:20.767600 kernel: CPU features: detected: 32-bit EL0 Support Oct 2 19:04:20.767607 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Oct 2 19:04:20.767614 kernel: CPU features: detected: Common not Private translations Oct 2 19:04:20.767620 kernel: CPU features: detected: CRC32 instructions Oct 2 19:04:20.767627 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Oct 2 19:04:20.767634 kernel: CPU features: detected: LSE atomic instructions Oct 2 19:04:20.767640 kernel: CPU features: detected: Privileged Access Never Oct 2 19:04:20.767649 kernel: CPU features: detected: RAS Extension Support Oct 2 19:04:20.767655 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Oct 2 19:04:20.767662 kernel: CPU: All CPU(s) started at EL1 Oct 2 19:04:20.767669 kernel: alternatives: patching kernel code Oct 2 19:04:20.767677 kernel: devtmpfs: initialized Oct 2 19:04:20.767684 kernel: KASLR enabled Oct 2 19:04:20.767690 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 19:04:20.767703 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Oct 2 19:04:20.767710 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 19:04:20.767717 kernel: SMBIOS 3.0.0 present. Oct 2 19:04:20.767724 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 Oct 2 19:04:20.767731 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 19:04:20.767738 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Oct 2 19:04:20.767745 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Oct 2 19:04:20.767754 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Oct 2 19:04:20.767761 kernel: audit: initializing netlink subsys (disabled) Oct 2 19:04:20.767768 kernel: audit: type=2000 audit(0.038:1): state=initialized audit_enabled=0 res=1 Oct 2 19:04:20.767774 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 19:04:20.767781 kernel: cpuidle: using governor menu Oct 2 19:04:20.767788 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Oct 2 19:04:20.767795 kernel: ASID allocator initialised with 32768 entries Oct 2 19:04:20.767801 kernel: ACPI: bus type PCI registered Oct 2 19:04:20.767808 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 19:04:20.767816 kernel: Serial: AMBA PL011 UART driver Oct 2 19:04:20.767823 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 19:04:20.767829 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Oct 2 19:04:20.767837 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 19:04:20.767843 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Oct 2 19:04:20.767850 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 19:04:20.767857 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Oct 2 19:04:20.767864 kernel: ACPI: Added _OSI(Module Device) Oct 2 19:04:20.767870 kernel: ACPI: Added _OSI(Processor Device) Oct 2 19:04:20.767878 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 19:04:20.767885 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 19:04:20.767892 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 19:04:20.767898 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 19:04:20.767905 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 19:04:20.767912 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 2 19:04:20.767918 kernel: ACPI: Interpreter enabled Oct 2 19:04:20.767925 kernel: ACPI: Using GIC for interrupt routing Oct 2 19:04:20.767932 kernel: ACPI: MCFG table detected, 1 entries Oct 2 19:04:20.767940 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA Oct 2 19:04:20.767947 kernel: printk: console [ttyAMA0] enabled Oct 2 19:04:20.767954 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 2 19:04:20.768133 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Oct 2 19:04:20.768203 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Oct 2 19:04:20.768265 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Oct 2 19:04:20.768325 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 Oct 2 19:04:20.768388 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] Oct 2 19:04:20.768397 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] Oct 2 19:04:20.768404 kernel: PCI host bridge to bus 0000:00 Oct 2 19:04:20.768488 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] Oct 2 19:04:20.768546 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Oct 2 19:04:20.768600 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] Oct 2 19:04:20.768654 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 2 19:04:20.768742 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 Oct 2 19:04:20.768817 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 Oct 2 19:04:20.768880 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] Oct 2 19:04:20.768941 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] Oct 2 19:04:20.769002 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] Oct 2 19:04:20.769064 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] Oct 2 19:04:20.769124 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] Oct 2 19:04:20.769189 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] Oct 2 19:04:20.769243 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] Oct 2 19:04:20.769295 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Oct 2 19:04:20.769346 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] Oct 2 19:04:20.769354 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Oct 2 19:04:20.769361 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Oct 2 19:04:20.769368 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Oct 2 19:04:20.769376 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Oct 2 19:04:20.769383 kernel: iommu: Default domain type: Translated Oct 2 19:04:20.769389 kernel: iommu: DMA domain TLB invalidation policy: strict mode Oct 2 19:04:20.769396 kernel: vgaarb: loaded Oct 2 19:04:20.769402 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 19:04:20.769409 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 19:04:20.769424 kernel: PTP clock support registered Oct 2 19:04:20.769431 kernel: Registered efivars operations Oct 2 19:04:20.769438 kernel: clocksource: Switched to clocksource arch_sys_counter Oct 2 19:04:20.769445 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 19:04:20.769453 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 19:04:20.769460 kernel: pnp: PnP ACPI init Oct 2 19:04:20.769537 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved Oct 2 19:04:20.769547 kernel: pnp: PnP ACPI: found 1 devices Oct 2 19:04:20.769553 kernel: NET: Registered PF_INET protocol family Oct 2 19:04:20.769560 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 2 19:04:20.769567 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Oct 2 19:04:20.769574 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 19:04:20.769582 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 2 19:04:20.769589 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Oct 2 19:04:20.769595 kernel: TCP: Hash tables configured (established 32768 bind 32768) Oct 2 19:04:20.769602 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 2 19:04:20.769608 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 2 19:04:20.769615 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 19:04:20.769622 kernel: PCI: CLS 0 bytes, default 64 Oct 2 19:04:20.769628 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Oct 2 19:04:20.769636 kernel: kvm [1]: HYP mode not available Oct 2 19:04:20.769643 kernel: Initialise system trusted keyrings Oct 2 19:04:20.769649 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Oct 2 19:04:20.769656 kernel: Key type asymmetric registered Oct 2 19:04:20.769663 kernel: Asymmetric key parser 'x509' registered Oct 2 19:04:20.769670 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 19:04:20.769677 kernel: io scheduler mq-deadline registered Oct 2 19:04:20.769683 kernel: io scheduler kyber registered Oct 2 19:04:20.769690 kernel: io scheduler bfq registered Oct 2 19:04:20.769701 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Oct 2 19:04:20.769712 kernel: ACPI: button: Power Button [PWRB] Oct 2 19:04:20.769720 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Oct 2 19:04:20.769784 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) Oct 2 19:04:20.769793 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 19:04:20.769800 kernel: thunder_xcv, ver 1.0 Oct 2 19:04:20.769807 kernel: thunder_bgx, ver 1.0 Oct 2 19:04:20.769813 kernel: nicpf, ver 1.0 Oct 2 19:04:20.769820 kernel: nicvf, ver 1.0 Oct 2 19:04:20.769888 kernel: rtc-efi rtc-efi.0: registered as rtc0 Oct 2 19:04:20.769971 kernel: rtc-efi rtc-efi.0: setting system clock to 2023-10-02T19:04:20 UTC (1696273460) Oct 2 19:04:20.769981 kernel: hid: raw HID events driver (C) Jiri Kosina Oct 2 19:04:20.769988 kernel: NET: Registered PF_INET6 protocol family Oct 2 19:04:20.769995 kernel: Segment Routing with IPv6 Oct 2 19:04:20.770001 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 19:04:20.770008 kernel: NET: Registered PF_PACKET protocol family Oct 2 19:04:20.770014 kernel: Key type dns_resolver registered Oct 2 19:04:20.770021 kernel: registered taskstats version 1 Oct 2 19:04:20.770030 kernel: Loading compiled-in X.509 certificates Oct 2 19:04:20.770037 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 3a2a38edc68cb70dc60ec0223a6460557b3bb28d' Oct 2 19:04:20.770043 kernel: Key type .fscrypt registered Oct 2 19:04:20.770050 kernel: Key type fscrypt-provisioning registered Oct 2 19:04:20.770056 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 2 19:04:20.770063 kernel: ima: Allocated hash algorithm: sha1 Oct 2 19:04:20.770159 kernel: ima: No architecture policies found Oct 2 19:04:20.770172 kernel: Freeing unused kernel memory: 34560K Oct 2 19:04:20.770179 kernel: Run /init as init process Oct 2 19:04:20.770189 kernel: with arguments: Oct 2 19:04:20.770195 kernel: /init Oct 2 19:04:20.770202 kernel: with environment: Oct 2 19:04:20.770208 kernel: HOME=/ Oct 2 19:04:20.770215 kernel: TERM=linux Oct 2 19:04:20.770221 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 19:04:20.770230 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:04:20.770240 systemd[1]: Detected virtualization kvm. Oct 2 19:04:20.770247 systemd[1]: Detected architecture arm64. Oct 2 19:04:20.770254 systemd[1]: Running in initrd. Oct 2 19:04:20.770261 systemd[1]: No hostname configured, using default hostname. Oct 2 19:04:20.770268 systemd[1]: Hostname set to . Oct 2 19:04:20.770275 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:04:20.770282 systemd[1]: Queued start job for default target initrd.target. Oct 2 19:04:20.770289 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:04:20.770297 systemd[1]: Reached target cryptsetup.target. Oct 2 19:04:20.770304 systemd[1]: Reached target paths.target. Oct 2 19:04:20.770311 systemd[1]: Reached target slices.target. Oct 2 19:04:20.770318 systemd[1]: Reached target swap.target. Oct 2 19:04:20.770325 systemd[1]: Reached target timers.target. Oct 2 19:04:20.770332 systemd[1]: Listening on iscsid.socket. Oct 2 19:04:20.770339 systemd[1]: Listening on iscsiuio.socket. Oct 2 19:04:20.770346 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 19:04:20.770354 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 19:04:20.770361 systemd[1]: Listening on systemd-journald.socket. Oct 2 19:04:20.770368 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:04:20.770375 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:04:20.770382 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:04:20.770389 systemd[1]: Reached target sockets.target. Oct 2 19:04:20.770396 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:04:20.770403 systemd[1]: Finished network-cleanup.service. Oct 2 19:04:20.770410 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 19:04:20.770436 systemd[1]: Starting systemd-journald.service... Oct 2 19:04:20.770443 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:04:20.770450 systemd[1]: Starting systemd-resolved.service... Oct 2 19:04:20.770457 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 19:04:20.770504 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:04:20.770513 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 19:04:20.770520 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:04:20.770527 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 19:04:20.770534 kernel: audit: type=1130 audit(1696273460.767:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:20.770544 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:04:20.770555 systemd-journald[290]: Journal started Oct 2 19:04:20.770637 systemd-journald[290]: Runtime Journal (/run/log/journal/29daeef712754463b244d02f008a3322) is 6.0M, max 48.7M, 42.6M free. Oct 2 19:04:20.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:20.761343 systemd-modules-load[291]: Inserted module 'overlay' Oct 2 19:04:20.774059 kernel: audit: type=1130 audit(1696273460.771:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:20.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:20.774686 systemd[1]: Started systemd-journald.service. Oct 2 19:04:20.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:20.778436 kernel: audit: type=1130 audit(1696273460.775:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:20.778464 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 19:04:20.778906 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 19:04:20.779770 systemd-resolved[292]: Positive Trust Anchors: Oct 2 19:04:20.779777 systemd-resolved[292]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:04:20.779805 systemd-resolved[292]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:04:20.784996 systemd-resolved[292]: Defaulting to hostname 'linux'. Oct 2 19:04:20.793506 kernel: Bridge firewalling registered Oct 2 19:04:20.793527 kernel: audit: type=1130 audit(1696273460.790:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:20.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:20.785821 systemd[1]: Started systemd-resolved.service. Oct 2 19:04:20.787611 systemd-modules-load[291]: Inserted module 'br_netfilter' Oct 2 19:04:20.792788 systemd[1]: Reached target nss-lookup.target. Oct 2 19:04:20.797465 kernel: SCSI subsystem initialized Oct 2 19:04:20.801429 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 19:04:20.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:20.805392 systemd[1]: Starting dracut-cmdline.service... Oct 2 19:04:20.806611 kernel: audit: type=1130 audit(1696273460.802:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:20.806628 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 19:04:20.808432 kernel: device-mapper: uevent: version 1.0.3 Oct 2 19:04:20.808457 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 19:04:20.811750 systemd-modules-load[291]: Inserted module 'dm_multipath' Oct 2 19:04:20.812874 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:04:20.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:20.814874 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:04:20.816598 kernel: audit: type=1130 audit(1696273460.813:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:20.816807 dracut-cmdline[308]: dracut-dracut-053 Oct 2 19:04:20.819489 dracut-cmdline[308]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=684fe6a2259d7fb96810743ab87aaaa03d9f185b113bd6990a64d1079e5672ca Oct 2 19:04:20.823137 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:04:20.826557 kernel: audit: type=1130 audit(1696273460.823:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:20.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:20.891443 kernel: Loading iSCSI transport class v2.0-870. Oct 2 19:04:20.899442 kernel: iscsi: registered transport (tcp) Oct 2 19:04:20.915650 kernel: iscsi: registered transport (qla4xxx) Oct 2 19:04:20.915692 kernel: QLogic iSCSI HBA Driver Oct 2 19:04:20.965603 systemd[1]: Finished dracut-cmdline.service. Oct 2 19:04:20.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:20.967303 systemd[1]: Starting dracut-pre-udev.service... Oct 2 19:04:20.969644 kernel: audit: type=1130 audit(1696273460.966:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:21.026448 kernel: raid6: neonx8 gen() 13584 MB/s Oct 2 19:04:21.043444 kernel: raid6: neonx8 xor() 10104 MB/s Oct 2 19:04:21.060457 kernel: raid6: neonx4 gen() 12832 MB/s Oct 2 19:04:21.077447 kernel: raid6: neonx4 xor() 9925 MB/s Oct 2 19:04:21.094447 kernel: raid6: neonx2 gen() 11450 MB/s Oct 2 19:04:21.111460 kernel: raid6: neonx2 xor() 10207 MB/s Oct 2 19:04:21.128451 kernel: raid6: neonx1 gen() 10519 MB/s Oct 2 19:04:21.145458 kernel: raid6: neonx1 xor() 8711 MB/s Oct 2 19:04:21.162456 kernel: raid6: int64x8 gen() 6290 MB/s Oct 2 19:04:21.179443 kernel: raid6: int64x8 xor() 3536 MB/s Oct 2 19:04:21.196450 kernel: raid6: int64x4 gen() 7105 MB/s Oct 2 19:04:21.213446 kernel: raid6: int64x4 xor() 3696 MB/s Oct 2 19:04:21.230460 kernel: raid6: int64x2 gen() 5904 MB/s Oct 2 19:04:21.247467 kernel: raid6: int64x2 xor() 3214 MB/s Oct 2 19:04:21.264455 kernel: raid6: int64x1 gen() 4583 MB/s Oct 2 19:04:21.281777 kernel: raid6: int64x1 xor() 2564 MB/s Oct 2 19:04:21.281831 kernel: raid6: using algorithm neonx8 gen() 13584 MB/s Oct 2 19:04:21.281841 kernel: raid6: .... xor() 10104 MB/s, rmw enabled Oct 2 19:04:21.281850 kernel: raid6: using neon recovery algorithm Oct 2 19:04:21.297440 kernel: xor: measuring software checksum speed Oct 2 19:04:21.297487 kernel: 8regs : 16110 MB/sec Oct 2 19:04:21.298742 kernel: 32regs : 20760 MB/sec Oct 2 19:04:21.304432 kernel: arm64_neon : 27826 MB/sec Oct 2 19:04:21.304446 kernel: xor: using function: arm64_neon (27826 MB/sec) Oct 2 19:04:21.368459 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Oct 2 19:04:21.386461 systemd[1]: Finished dracut-pre-udev.service. Oct 2 19:04:21.389526 kernel: audit: type=1130 audit(1696273461.386:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:21.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:21.389000 audit: BPF prog-id=7 op=LOAD Oct 2 19:04:21.389000 audit: BPF prog-id=8 op=LOAD Oct 2 19:04:21.390205 systemd[1]: Starting systemd-udevd.service... Oct 2 19:04:21.406409 systemd-udevd[491]: Using default interface naming scheme 'v252'. Oct 2 19:04:21.411859 systemd[1]: Started systemd-udevd.service. Oct 2 19:04:21.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:21.415053 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 19:04:21.428073 dracut-pre-trigger[503]: rd.md=0: removing MD RAID activation Oct 2 19:04:21.463194 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 19:04:21.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:21.464671 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:04:21.500084 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:04:21.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:21.529775 kernel: virtio_blk virtio1: [vda] 9289728 512-byte logical blocks (4.76 GB/4.43 GiB) Oct 2 19:04:21.547452 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 2 19:04:21.560249 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 19:04:21.563442 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (549) Oct 2 19:04:21.567276 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 19:04:21.568147 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 19:04:21.572405 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 19:04:21.578384 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:04:21.580179 systemd[1]: Starting disk-uuid.service... Oct 2 19:04:21.594456 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 2 19:04:22.603291 disk-uuid[565]: The operation has completed successfully. Oct 2 19:04:22.604135 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 2 19:04:22.628871 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 19:04:22.629866 systemd[1]: Finished disk-uuid.service. Oct 2 19:04:22.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:22.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:22.631533 systemd[1]: Starting verity-setup.service... Oct 2 19:04:22.651557 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Oct 2 19:04:22.679755 systemd[1]: Found device dev-mapper-usr.device. Oct 2 19:04:22.682147 systemd[1]: Mounting sysusr-usr.mount... Oct 2 19:04:22.684653 systemd[1]: Finished verity-setup.service. Oct 2 19:04:22.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:22.730099 systemd[1]: Mounted sysusr-usr.mount. Oct 2 19:04:22.731103 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 19:04:22.730761 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 19:04:22.731482 systemd[1]: Starting ignition-setup.service... Oct 2 19:04:22.733098 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 19:04:22.744590 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Oct 2 19:04:22.744634 kernel: BTRFS info (device vda6): using free space tree Oct 2 19:04:22.744649 kernel: BTRFS info (device vda6): has skinny extents Oct 2 19:04:22.753660 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 2 19:04:22.759920 systemd[1]: Finished ignition-setup.service. Oct 2 19:04:22.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:22.761310 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 19:04:22.837946 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 19:04:22.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:22.840000 audit: BPF prog-id=9 op=LOAD Oct 2 19:04:22.841641 systemd[1]: Starting systemd-networkd.service... Oct 2 19:04:22.851281 ignition[647]: Ignition 2.14.0 Oct 2 19:04:22.851293 ignition[647]: Stage: fetch-offline Oct 2 19:04:22.851344 ignition[647]: no configs at "/usr/lib/ignition/base.d" Oct 2 19:04:22.851353 ignition[647]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 2 19:04:22.851493 ignition[647]: parsed url from cmdline: "" Oct 2 19:04:22.851496 ignition[647]: no config URL provided Oct 2 19:04:22.851501 ignition[647]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:04:22.851508 ignition[647]: no config at "/usr/lib/ignition/user.ign" Oct 2 19:04:22.851527 ignition[647]: op(1): [started] loading QEMU firmware config module Oct 2 19:04:22.851532 ignition[647]: op(1): executing: "modprobe" "qemu_fw_cfg" Oct 2 19:04:22.857745 ignition[647]: op(1): [finished] loading QEMU firmware config module Oct 2 19:04:22.868100 systemd-networkd[742]: lo: Link UP Oct 2 19:04:22.868110 systemd-networkd[742]: lo: Gained carrier Oct 2 19:04:22.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:22.868467 systemd-networkd[742]: Enumeration completed Oct 2 19:04:22.868557 systemd[1]: Started systemd-networkd.service. Oct 2 19:04:22.868636 systemd-networkd[742]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:04:22.869530 systemd-networkd[742]: eth0: Link UP Oct 2 19:04:22.869533 systemd-networkd[742]: eth0: Gained carrier Oct 2 19:04:22.869608 systemd[1]: Reached target network.target. Oct 2 19:04:22.871480 systemd[1]: Starting iscsiuio.service... Oct 2 19:04:22.880982 systemd[1]: Started iscsiuio.service. Oct 2 19:04:22.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:22.882646 systemd[1]: Starting iscsid.service... Oct 2 19:04:22.888019 iscsid[749]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:04:22.888019 iscsid[749]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 19:04:22.888019 iscsid[749]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 19:04:22.888019 iscsid[749]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 19:04:22.888019 iscsid[749]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:04:22.888019 iscsid[749]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 19:04:22.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:22.891564 systemd[1]: Started iscsid.service. Oct 2 19:04:22.894015 systemd-networkd[742]: eth0: DHCPv4 address 10.0.0.94/16, gateway 10.0.0.1 acquired from 10.0.0.1 Oct 2 19:04:22.895460 systemd[1]: Starting dracut-initqueue.service... Oct 2 19:04:22.907075 systemd[1]: Finished dracut-initqueue.service. Oct 2 19:04:22.907872 systemd[1]: Reached target remote-fs-pre.target. Oct 2 19:04:22.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:22.909276 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:04:22.910626 systemd[1]: Reached target remote-fs.target. Oct 2 19:04:22.912800 systemd[1]: Starting dracut-pre-mount.service... Oct 2 19:04:22.920659 ignition[647]: parsing config with SHA512: fe4c4a038c586e73b55562a2c5155c48410f00a956ba5fea1fc5301a59d5303dde30ba4bb6d9c11ec5ac5f874514e374d7f9fd492b92335cec0c628d72f402df Oct 2 19:04:22.921532 systemd[1]: Finished dracut-pre-mount.service. Oct 2 19:04:22.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:22.947720 unknown[647]: fetched base config from "system" Oct 2 19:04:22.948576 unknown[647]: fetched user config from "qemu" Oct 2 19:04:22.949959 ignition[647]: fetch-offline: fetch-offline passed Oct 2 19:04:22.950680 ignition[647]: Ignition finished successfully Oct 2 19:04:22.952389 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 19:04:22.953258 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Oct 2 19:04:22.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:22.954030 systemd[1]: Starting ignition-kargs.service... Oct 2 19:04:22.964683 ignition[763]: Ignition 2.14.0 Oct 2 19:04:22.964700 ignition[763]: Stage: kargs Oct 2 19:04:22.964801 ignition[763]: no configs at "/usr/lib/ignition/base.d" Oct 2 19:04:22.964811 ignition[763]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 2 19:04:22.965797 ignition[763]: kargs: kargs passed Oct 2 19:04:22.965843 ignition[763]: Ignition finished successfully Oct 2 19:04:22.968667 systemd[1]: Finished ignition-kargs.service. Oct 2 19:04:22.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:22.970360 systemd[1]: Starting ignition-disks.service... Oct 2 19:04:22.978522 ignition[769]: Ignition 2.14.0 Oct 2 19:04:22.978531 ignition[769]: Stage: disks Oct 2 19:04:22.978620 ignition[769]: no configs at "/usr/lib/ignition/base.d" Oct 2 19:04:22.978629 ignition[769]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 2 19:04:22.980957 systemd[1]: Finished ignition-disks.service. Oct 2 19:04:22.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:22.979613 ignition[769]: disks: disks passed Oct 2 19:04:22.982117 systemd[1]: Reached target initrd-root-device.target. Oct 2 19:04:22.979657 ignition[769]: Ignition finished successfully Oct 2 19:04:22.983025 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:04:22.983960 systemd[1]: Reached target local-fs.target. Oct 2 19:04:22.984991 systemd[1]: Reached target sysinit.target. Oct 2 19:04:22.986041 systemd[1]: Reached target basic.target. Oct 2 19:04:22.988120 systemd[1]: Starting systemd-fsck-root.service... Oct 2 19:04:23.000377 systemd-fsck[777]: ROOT: clean, 603/553520 files, 56011/553472 blocks Oct 2 19:04:23.003631 systemd[1]: Finished systemd-fsck-root.service. Oct 2 19:04:23.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:23.005539 systemd[1]: Mounting sysroot.mount... Oct 2 19:04:23.013327 systemd[1]: Mounted sysroot.mount. Oct 2 19:04:23.014242 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 19:04:23.013914 systemd[1]: Reached target initrd-root-fs.target. Oct 2 19:04:23.015721 systemd[1]: Mounting sysroot-usr.mount... Oct 2 19:04:23.016407 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 2 19:04:23.016460 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 19:04:23.016481 systemd[1]: Reached target ignition-diskful.target. Oct 2 19:04:23.018901 systemd[1]: Mounted sysroot-usr.mount. Oct 2 19:04:23.020445 systemd[1]: Starting initrd-setup-root.service... Oct 2 19:04:23.025716 initrd-setup-root[787]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 19:04:23.030772 initrd-setup-root[795]: cut: /sysroot/etc/group: No such file or directory Oct 2 19:04:23.035124 initrd-setup-root[803]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 19:04:23.039615 initrd-setup-root[811]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 19:04:23.068224 systemd[1]: Finished initrd-setup-root.service. Oct 2 19:04:23.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:23.069855 systemd[1]: Starting ignition-mount.service... Oct 2 19:04:23.070962 systemd[1]: Starting sysroot-boot.service... Oct 2 19:04:23.076285 bash[828]: umount: /sysroot/usr/share/oem: not mounted. Oct 2 19:04:23.087617 ignition[830]: INFO : Ignition 2.14.0 Oct 2 19:04:23.087617 ignition[830]: INFO : Stage: mount Oct 2 19:04:23.087617 ignition[830]: INFO : no configs at "/usr/lib/ignition/base.d" Oct 2 19:04:23.087617 ignition[830]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 2 19:04:23.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:23.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:23.088841 systemd[1]: Finished sysroot-boot.service. Oct 2 19:04:23.092129 ignition[830]: INFO : mount: mount passed Oct 2 19:04:23.092129 ignition[830]: INFO : Ignition finished successfully Oct 2 19:04:23.090128 systemd[1]: Finished ignition-mount.service. Oct 2 19:04:23.691801 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:04:23.698741 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (838) Oct 2 19:04:23.698775 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Oct 2 19:04:23.698786 kernel: BTRFS info (device vda6): using free space tree Oct 2 19:04:23.699627 kernel: BTRFS info (device vda6): has skinny extents Oct 2 19:04:23.702369 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:04:23.703998 systemd[1]: Starting ignition-files.service... Oct 2 19:04:23.721129 ignition[858]: INFO : Ignition 2.14.0 Oct 2 19:04:23.721129 ignition[858]: INFO : Stage: files Oct 2 19:04:23.722325 ignition[858]: INFO : no configs at "/usr/lib/ignition/base.d" Oct 2 19:04:23.722325 ignition[858]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 2 19:04:23.722325 ignition[858]: DEBUG : files: compiled without relabeling support, skipping Oct 2 19:04:23.730760 ignition[858]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 19:04:23.730760 ignition[858]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 19:04:23.737963 ignition[858]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 19:04:23.739140 ignition[858]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 19:04:23.740301 unknown[858]: wrote ssh authorized keys file for user: core Oct 2 19:04:23.741160 ignition[858]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 19:04:23.741160 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Oct 2 19:04:23.741160 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Oct 2 19:04:24.012926 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Oct 2 19:04:24.049541 systemd-networkd[742]: eth0: Gained IPv6LL Oct 2 19:04:24.294500 ignition[858]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Oct 2 19:04:24.294500 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Oct 2 19:04:24.297895 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Oct 2 19:04:24.297895 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Oct 2 19:04:24.486120 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Oct 2 19:04:24.611792 ignition[858]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Oct 2 19:04:24.611792 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Oct 2 19:04:24.611792 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:04:24.611792 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/arm64/kubeadm: attempt #1 Oct 2 19:04:24.668552 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Oct 2 19:04:25.124213 ignition[858]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 5a08b81f9cc82d3cce21130856ca63b8dafca9149d9775dd25b376eb0f18209aa0e4a47c0a6d7e6fb1316aacd5d59dec770f26c09120c866949d70bc415518b3 Oct 2 19:04:25.126372 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:04:25.127554 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:04:25.128594 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/arm64/kubelet: attempt #1 Oct 2 19:04:25.185490 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Oct 2 19:04:25.835308 ignition[858]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 5a898ef543a6482895101ea58e33602e3c0a7682d322aaf08ac3dc8a5a3c8da8f09600d577024549288f8cebb1a86f9c79927796b69a3d8fe989ca8f12b147d6 Oct 2 19:04:25.837744 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:04:25.837744 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:04:25.837744 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/arm64/kubectl: attempt #1 Oct 2 19:04:25.902691 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Oct 2 19:04:26.305690 ignition[858]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 6a5c9c02a29126949f096415bb1761a0c0ad44168e2ab3d0409982701da58f96223bec354828ddf958e945ef1ce63c0ad41e77cbcbcce0756163e71b4fbae432 Oct 2 19:04:26.308640 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:04:26.310279 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:04:26.310279 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:04:26.310279 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/home/core/install.sh" Oct 2 19:04:26.310279 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 19:04:26.310279 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:04:26.310279 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:04:26.310279 ignition[858]: INFO : files: op(b): [started] processing unit "prepare-cni-plugins.service" Oct 2 19:04:26.310279 ignition[858]: INFO : files: op(b): op(c): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:04:26.310279 ignition[858]: INFO : files: op(b): op(c): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:04:26.310279 ignition[858]: INFO : files: op(b): [finished] processing unit "prepare-cni-plugins.service" Oct 2 19:04:26.310279 ignition[858]: INFO : files: op(d): [started] processing unit "prepare-critools.service" Oct 2 19:04:26.310279 ignition[858]: INFO : files: op(d): op(e): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:04:26.310279 ignition[858]: INFO : files: op(d): op(e): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:04:26.310279 ignition[858]: INFO : files: op(d): [finished] processing unit "prepare-critools.service" Oct 2 19:04:26.310279 ignition[858]: INFO : files: op(f): [started] processing unit "coreos-metadata.service" Oct 2 19:04:26.310279 ignition[858]: INFO : files: op(f): op(10): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Oct 2 19:04:26.310279 ignition[858]: INFO : files: op(f): op(10): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Oct 2 19:04:26.310279 ignition[858]: INFO : files: op(f): [finished] processing unit "coreos-metadata.service" Oct 2 19:04:26.338209 ignition[858]: INFO : files: op(11): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:04:26.338209 ignition[858]: INFO : files: op(11): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:04:26.338209 ignition[858]: INFO : files: op(12): [started] setting preset to enabled for "prepare-critools.service" Oct 2 19:04:26.338209 ignition[858]: INFO : files: op(12): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 19:04:26.338209 ignition[858]: INFO : files: op(13): [started] setting preset to disabled for "coreos-metadata.service" Oct 2 19:04:26.338209 ignition[858]: INFO : files: op(13): op(14): [started] removing enablement symlink(s) for "coreos-metadata.service" Oct 2 19:04:26.363618 ignition[858]: INFO : files: op(13): op(14): [finished] removing enablement symlink(s) for "coreos-metadata.service" Oct 2 19:04:26.364699 ignition[858]: INFO : files: op(13): [finished] setting preset to disabled for "coreos-metadata.service" Oct 2 19:04:26.364699 ignition[858]: INFO : files: createResultFile: createFiles: op(15): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:04:26.364699 ignition[858]: INFO : files: createResultFile: createFiles: op(15): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:04:26.364699 ignition[858]: INFO : files: files passed Oct 2 19:04:26.364699 ignition[858]: INFO : Ignition finished successfully Oct 2 19:04:26.374466 kernel: kauditd_printk_skb: 23 callbacks suppressed Oct 2 19:04:26.374489 kernel: audit: type=1130 audit(1696273466.368:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.366940 systemd[1]: Finished ignition-files.service. Oct 2 19:04:26.369517 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 19:04:26.373450 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 19:04:26.374150 systemd[1]: Starting ignition-quench.service... Oct 2 19:04:26.383016 kernel: audit: type=1130 audit(1696273466.378:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.383037 kernel: audit: type=1131 audit(1696273466.378:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.383140 initrd-setup-root-after-ignition[882]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Oct 2 19:04:26.386446 kernel: audit: type=1130 audit(1696273466.383:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.377477 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 19:04:26.388049 initrd-setup-root-after-ignition[885]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 19:04:26.377556 systemd[1]: Finished ignition-quench.service. Oct 2 19:04:26.383144 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 19:04:26.383918 systemd[1]: Reached target ignition-complete.target. Oct 2 19:04:26.387984 systemd[1]: Starting initrd-parse-etc.service... Oct 2 19:04:26.402127 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 19:04:26.402215 systemd[1]: Finished initrd-parse-etc.service. Oct 2 19:04:26.407219 kernel: audit: type=1130 audit(1696273466.403:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.407240 kernel: audit: type=1131 audit(1696273466.403:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.403706 systemd[1]: Reached target initrd-fs.target. Oct 2 19:04:26.407738 systemd[1]: Reached target initrd.target. Oct 2 19:04:26.408662 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 19:04:26.409880 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 19:04:26.421661 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 19:04:26.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.423799 systemd[1]: Starting initrd-cleanup.service... Oct 2 19:04:26.426122 kernel: audit: type=1130 audit(1696273466.422:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.432601 systemd[1]: Stopped target network.target. Oct 2 19:04:26.433684 systemd[1]: Stopped target nss-lookup.target. Oct 2 19:04:26.434619 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 19:04:26.435637 systemd[1]: Stopped target timers.target. Oct 2 19:04:26.436584 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 19:04:26.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.436692 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 19:04:26.440910 kernel: audit: type=1131 audit(1696273466.437:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.437617 systemd[1]: Stopped target initrd.target. Oct 2 19:04:26.440556 systemd[1]: Stopped target basic.target. Oct 2 19:04:26.441640 systemd[1]: Stopped target ignition-complete.target. Oct 2 19:04:26.442518 systemd[1]: Stopped target ignition-diskful.target. Oct 2 19:04:26.443455 systemd[1]: Stopped target initrd-root-device.target. Oct 2 19:04:26.444883 systemd[1]: Stopped target remote-fs.target. Oct 2 19:04:26.445722 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 19:04:26.446928 systemd[1]: Stopped target sysinit.target. Oct 2 19:04:26.448008 systemd[1]: Stopped target local-fs.target. Oct 2 19:04:26.448816 systemd[1]: Stopped target local-fs-pre.target. Oct 2 19:04:26.449999 systemd[1]: Stopped target swap.target. Oct 2 19:04:26.454558 kernel: audit: type=1131 audit(1696273466.452:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.451427 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 19:04:26.451542 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 19:04:26.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.452575 systemd[1]: Stopped target cryptsetup.target. Oct 2 19:04:26.460227 kernel: audit: type=1131 audit(1696273466.456:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.455274 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 19:04:26.455379 systemd[1]: Stopped dracut-initqueue.service. Oct 2 19:04:26.456841 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 19:04:26.456938 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 19:04:26.459969 systemd[1]: Stopped target paths.target. Oct 2 19:04:26.460735 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 19:04:26.463458 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 19:04:26.464760 systemd[1]: Stopped target slices.target. Oct 2 19:04:26.465759 systemd[1]: Stopped target sockets.target. Oct 2 19:04:26.466598 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 19:04:26.466666 systemd[1]: Closed iscsid.socket. Oct 2 19:04:26.467563 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 19:04:26.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.467625 systemd[1]: Closed iscsiuio.socket. Oct 2 19:04:26.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.468495 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 19:04:26.468589 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 19:04:26.469440 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 19:04:26.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.469618 systemd[1]: Stopped ignition-files.service. Oct 2 19:04:26.471590 systemd[1]: Stopping ignition-mount.service... Oct 2 19:04:26.472140 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 19:04:26.472252 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 19:04:26.474323 systemd[1]: Stopping sysroot-boot.service... Oct 2 19:04:26.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.475511 systemd[1]: Stopping systemd-networkd.service... Oct 2 19:04:26.477130 systemd[1]: Stopping systemd-resolved.service... Oct 2 19:04:26.482030 ignition[898]: INFO : Ignition 2.14.0 Oct 2 19:04:26.482030 ignition[898]: INFO : Stage: umount Oct 2 19:04:26.482030 ignition[898]: INFO : no configs at "/usr/lib/ignition/base.d" Oct 2 19:04:26.482030 ignition[898]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 2 19:04:26.482030 ignition[898]: INFO : umount: umount passed Oct 2 19:04:26.482030 ignition[898]: INFO : Ignition finished successfully Oct 2 19:04:26.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.477865 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 19:04:26.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.478025 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 19:04:26.479287 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 19:04:26.479397 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 19:04:26.493000 audit: BPF prog-id=6 op=UNLOAD Oct 2 19:04:26.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.481461 systemd-networkd[742]: eth0: DHCPv6 lease lost Oct 2 19:04:26.494000 audit: BPF prog-id=9 op=UNLOAD Oct 2 19:04:26.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.483666 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 19:04:26.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.483771 systemd[1]: Stopped systemd-networkd.service. Oct 2 19:04:26.485048 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 19:04:26.485122 systemd[1]: Finished initrd-cleanup.service. Oct 2 19:04:26.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.486273 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 19:04:26.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.486340 systemd[1]: Stopped ignition-mount.service. Oct 2 19:04:26.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.488460 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 2 19:04:26.488837 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 19:04:26.488919 systemd[1]: Stopped systemd-resolved.service. Oct 2 19:04:26.491281 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 19:04:26.491310 systemd[1]: Closed systemd-networkd.socket. Oct 2 19:04:26.492486 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 19:04:26.492525 systemd[1]: Stopped ignition-disks.service. Oct 2 19:04:26.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.493732 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 19:04:26.493770 systemd[1]: Stopped ignition-kargs.service. Oct 2 19:04:26.494857 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 19:04:26.494890 systemd[1]: Stopped ignition-setup.service. Oct 2 19:04:26.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.496695 systemd[1]: Stopping network-cleanup.service... Oct 2 19:04:26.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.497665 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 19:04:26.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.497738 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 19:04:26.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.498889 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 19:04:26.498926 systemd[1]: Stopped systemd-sysctl.service. Oct 2 19:04:26.500563 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 19:04:26.500605 systemd[1]: Stopped systemd-modules-load.service. Oct 2 19:04:26.501599 systemd[1]: Stopping systemd-udevd.service... Oct 2 19:04:26.506888 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 2 19:04:26.507458 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 19:04:26.507547 systemd[1]: Stopped sysroot-boot.service. Oct 2 19:04:26.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.508605 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 19:04:26.508736 systemd[1]: Stopped systemd-udevd.service. Oct 2 19:04:26.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.510898 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 19:04:26.510943 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 19:04:26.511612 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 19:04:26.511642 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 19:04:26.512533 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 19:04:26.512574 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 19:04:26.513814 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 19:04:26.513851 systemd[1]: Stopped dracut-cmdline.service. Oct 2 19:04:26.515080 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 19:04:26.515120 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 19:04:26.516268 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 19:04:26.516307 systemd[1]: Stopped initrd-setup-root.service. Oct 2 19:04:26.518368 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 19:04:26.519495 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 19:04:26.519555 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 19:04:26.521215 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 19:04:26.521331 systemd[1]: Stopped network-cleanup.service. Oct 2 19:04:26.524940 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 19:04:26.525021 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 19:04:26.526479 systemd[1]: Reached target initrd-switch-root.target. Oct 2 19:04:26.528394 systemd[1]: Starting initrd-switch-root.service... Oct 2 19:04:26.536598 systemd[1]: Switching root. Oct 2 19:04:26.557203 iscsid[749]: iscsid shutting down. Oct 2 19:04:26.557993 systemd-journald[290]: Received SIGTERM from PID 1 (systemd). Oct 2 19:04:26.558055 systemd-journald[290]: Journal stopped Oct 2 19:04:28.752101 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 19:04:28.752191 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 19:04:28.752204 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 19:04:28.752214 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 19:04:28.752233 kernel: SELinux: policy capability open_perms=1 Oct 2 19:04:28.752244 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 19:04:28.752259 kernel: SELinux: policy capability always_check_network=0 Oct 2 19:04:28.752271 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 19:04:28.752280 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 19:04:28.752291 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 19:04:28.752300 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 19:04:28.752311 systemd[1]: Successfully loaded SELinux policy in 38.450ms. Oct 2 19:04:28.752341 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.656ms. Oct 2 19:04:28.752353 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:04:28.752375 systemd[1]: Detected virtualization kvm. Oct 2 19:04:28.752385 systemd[1]: Detected architecture arm64. Oct 2 19:04:28.752395 systemd[1]: Detected first boot. Oct 2 19:04:28.752405 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:04:28.752429 systemd[1]: Populated /etc with preset unit settings. Oct 2 19:04:28.752451 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:04:28.752464 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:04:28.752477 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:04:28.752488 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 19:04:28.752498 systemd[1]: Stopped iscsiuio.service. Oct 2 19:04:28.752508 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 19:04:28.752518 systemd[1]: Stopped iscsid.service. Oct 2 19:04:28.752536 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 19:04:28.752548 systemd[1]: Stopped initrd-switch-root.service. Oct 2 19:04:28.752558 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 19:04:28.752568 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 19:04:28.752579 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 19:04:28.752589 systemd[1]: Created slice system-getty.slice. Oct 2 19:04:28.752599 systemd[1]: Created slice system-modprobe.slice. Oct 2 19:04:28.752609 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 19:04:28.752619 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 19:04:28.752629 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 19:04:28.752641 systemd[1]: Created slice user.slice. Oct 2 19:04:28.752651 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:04:28.752662 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 19:04:28.752681 systemd[1]: Set up automount boot.automount. Oct 2 19:04:28.752694 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 19:04:28.752704 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 19:04:28.752714 systemd[1]: Stopped target initrd-fs.target. Oct 2 19:04:28.752726 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 19:04:28.752736 systemd[1]: Reached target integritysetup.target. Oct 2 19:04:28.752745 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:04:28.752756 systemd[1]: Reached target remote-fs.target. Oct 2 19:04:28.752766 systemd[1]: Reached target slices.target. Oct 2 19:04:28.752777 systemd[1]: Reached target swap.target. Oct 2 19:04:28.752787 systemd[1]: Reached target torcx.target. Oct 2 19:04:28.752797 systemd[1]: Reached target veritysetup.target. Oct 2 19:04:28.752807 systemd[1]: Listening on systemd-coredump.socket. Oct 2 19:04:28.752817 systemd[1]: Listening on systemd-initctl.socket. Oct 2 19:04:28.752828 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:04:28.752839 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:04:28.752851 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:04:28.752862 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 19:04:28.752872 systemd[1]: Mounting dev-hugepages.mount... Oct 2 19:04:28.752883 systemd[1]: Mounting dev-mqueue.mount... Oct 2 19:04:28.752892 systemd[1]: Mounting media.mount... Oct 2 19:04:28.752903 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 19:04:28.752916 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 19:04:28.752928 systemd[1]: Mounting tmp.mount... Oct 2 19:04:28.752938 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 19:04:28.752969 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 19:04:28.752982 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:04:28.752992 systemd[1]: Starting modprobe@configfs.service... Oct 2 19:04:28.753002 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 19:04:28.753012 systemd[1]: Starting modprobe@drm.service... Oct 2 19:04:28.753022 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 19:04:28.753032 systemd[1]: Starting modprobe@fuse.service... Oct 2 19:04:28.753043 systemd[1]: Starting modprobe@loop.service... Oct 2 19:04:28.753069 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 19:04:28.753080 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 19:04:28.753090 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 19:04:28.753100 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 19:04:28.753111 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 19:04:28.753121 systemd[1]: Stopped systemd-journald.service. Oct 2 19:04:28.753131 kernel: fuse: init (API version 7.34) Oct 2 19:04:28.753141 systemd[1]: Starting systemd-journald.service... Oct 2 19:04:28.753152 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:04:28.753163 systemd[1]: Starting systemd-network-generator.service... Oct 2 19:04:28.753173 systemd[1]: Starting systemd-remount-fs.service... Oct 2 19:04:28.753184 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:04:28.753194 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 19:04:28.753205 systemd[1]: Stopped verity-setup.service. Oct 2 19:04:28.753214 kernel: loop: module loaded Oct 2 19:04:28.753224 systemd[1]: Mounted dev-hugepages.mount. Oct 2 19:04:28.753234 systemd[1]: Mounted dev-mqueue.mount. Oct 2 19:04:28.753243 systemd[1]: Mounted media.mount. Oct 2 19:04:28.753254 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 19:04:28.753264 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 19:04:28.753274 systemd[1]: Mounted tmp.mount. Oct 2 19:04:28.753284 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:04:28.753297 systemd-journald[993]: Journal started Oct 2 19:04:28.753338 systemd-journald[993]: Runtime Journal (/run/log/journal/29daeef712754463b244d02f008a3322) is 6.0M, max 48.7M, 42.6M free. Oct 2 19:04:26.642000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 19:04:26.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:04:26.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:04:26.823000 audit: BPF prog-id=10 op=LOAD Oct 2 19:04:26.823000 audit: BPF prog-id=10 op=UNLOAD Oct 2 19:04:26.824000 audit: BPF prog-id=11 op=LOAD Oct 2 19:04:26.824000 audit: BPF prog-id=11 op=UNLOAD Oct 2 19:04:28.623000 audit: BPF prog-id=12 op=LOAD Oct 2 19:04:28.623000 audit: BPF prog-id=3 op=UNLOAD Oct 2 19:04:28.623000 audit: BPF prog-id=13 op=LOAD Oct 2 19:04:28.623000 audit: BPF prog-id=14 op=LOAD Oct 2 19:04:28.623000 audit: BPF prog-id=4 op=UNLOAD Oct 2 19:04:28.623000 audit: BPF prog-id=5 op=UNLOAD Oct 2 19:04:28.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:28.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:28.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:28.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:28.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:28.645000 audit: BPF prog-id=12 op=UNLOAD Oct 2 19:04:28.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:28.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:28.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:28.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:28.722000 audit: BPF prog-id=15 op=LOAD Oct 2 19:04:28.722000 audit: BPF prog-id=16 op=LOAD Oct 2 19:04:28.723000 audit: BPF prog-id=17 op=LOAD Oct 2 19:04:28.723000 audit: BPF prog-id=13 op=UNLOAD Oct 2 19:04:28.723000 audit: BPF prog-id=14 op=UNLOAD Oct 2 19:04:28.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:28.750000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 19:04:28.750000 audit[993]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=5 a1=ffffe8d0a650 a2=4000 a3=1 items=0 ppid=1 pid=993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:04:28.750000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 19:04:26.878403 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2023-10-02T19:04:26Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:04:28.621577 systemd[1]: Queued start job for default target multi-user.target. Oct 2 19:04:26.879126 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2023-10-02T19:04:26Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:04:28.621591 systemd[1]: Unnecessary job was removed for dev-vda6.device. Oct 2 19:04:26.879146 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2023-10-02T19:04:26Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:04:28.626620 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 19:04:28.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.879178 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2023-10-02T19:04:26Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 19:04:26.879188 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2023-10-02T19:04:26Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 19:04:26.879218 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2023-10-02T19:04:26Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 19:04:26.879231 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2023-10-02T19:04:26Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 19:04:26.879451 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2023-10-02T19:04:26Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 19:04:26.879489 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2023-10-02T19:04:26Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:04:26.879501 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2023-10-02T19:04:26Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:04:28.755872 systemd[1]: Started systemd-journald.service. Oct 2 19:04:26.880149 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2023-10-02T19:04:26Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 19:04:26.880182 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2023-10-02T19:04:26Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 19:04:26.880199 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2023-10-02T19:04:26Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 19:04:28.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:26.880213 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2023-10-02T19:04:26Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 19:04:26.880233 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2023-10-02T19:04:26Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 19:04:26.880246 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2023-10-02T19:04:26Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 19:04:28.322856 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2023-10-02T19:04:28Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:04:28.323122 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2023-10-02T19:04:28Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:04:28.756619 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 19:04:28.323217 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2023-10-02T19:04:28Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:04:28.756757 systemd[1]: Finished modprobe@configfs.service. Oct 2 19:04:28.323369 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2023-10-02T19:04:28Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:04:28.323434 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2023-10-02T19:04:28Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 19:04:28.323490 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2023-10-02T19:04:28Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 19:04:28.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:28.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:28.757738 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 19:04:28.757909 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 19:04:28.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:28.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:28.758978 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 19:04:28.759139 systemd[1]: Finished modprobe@drm.service. Oct 2 19:04:28.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:28.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:28.759967 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 19:04:28.760130 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 19:04:28.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:28.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:28.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:28.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:28.761264 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 19:04:28.761429 systemd[1]: Finished modprobe@fuse.service. Oct 2 19:04:28.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:28.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:28.762224 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 19:04:28.762361 systemd[1]: Finished modprobe@loop.service. Oct 2 19:04:28.763324 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:04:28.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:28.764580 systemd[1]: Finished systemd-network-generator.service. Oct 2 19:04:28.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:28.765479 systemd[1]: Finished systemd-remount-fs.service. Oct 2 19:04:28.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:28.766635 systemd[1]: Reached target network-pre.target. Oct 2 19:04:28.768733 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 19:04:28.770547 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 19:04:28.771987 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 19:04:28.777481 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 19:04:28.779145 systemd[1]: Starting systemd-journal-flush.service... Oct 2 19:04:28.779776 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 19:04:28.781082 systemd[1]: Starting systemd-random-seed.service... Oct 2 19:04:28.781769 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 19:04:28.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:28.782851 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:04:28.784789 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 19:04:28.787911 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 19:04:28.790826 systemd-journald[993]: Time spent on flushing to /var/log/journal/29daeef712754463b244d02f008a3322 is 17.925ms for 982 entries. Oct 2 19:04:28.790826 systemd-journald[993]: System Journal (/var/log/journal/29daeef712754463b244d02f008a3322) is 8.0M, max 195.6M, 187.6M free. Oct 2 19:04:28.841022 systemd-journald[993]: Received client request to flush runtime journal. Oct 2 19:04:28.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:28.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:28.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:28.789784 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 19:04:28.790795 systemd[1]: Finished systemd-random-seed.service. Oct 2 19:04:28.792273 systemd[1]: Reached target first-boot-complete.target. Oct 2 19:04:28.842570 udevadm[1031]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Oct 2 19:04:28.794441 systemd[1]: Starting systemd-sysusers.service... Oct 2 19:04:28.797961 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:04:28.799970 systemd[1]: Starting systemd-udev-settle.service... Oct 2 19:04:28.805797 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:04:28.842501 systemd[1]: Finished systemd-journal-flush.service. Oct 2 19:04:28.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:28.843537 systemd[1]: Finished systemd-sysusers.service. Oct 2 19:04:28.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:29.227673 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 19:04:29.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:29.228000 audit: BPF prog-id=18 op=LOAD Oct 2 19:04:29.228000 audit: BPF prog-id=19 op=LOAD Oct 2 19:04:29.229000 audit: BPF prog-id=7 op=UNLOAD Oct 2 19:04:29.229000 audit: BPF prog-id=8 op=UNLOAD Oct 2 19:04:29.230688 systemd[1]: Starting systemd-udevd.service... Oct 2 19:04:29.253976 systemd-udevd[1034]: Using default interface naming scheme 'v252'. Oct 2 19:04:29.276242 systemd[1]: Started systemd-udevd.service. Oct 2 19:04:29.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:29.277000 audit: BPF prog-id=20 op=LOAD Oct 2 19:04:29.280652 systemd[1]: Starting systemd-networkd.service... Oct 2 19:04:29.286000 audit: BPF prog-id=21 op=LOAD Oct 2 19:04:29.286000 audit: BPF prog-id=22 op=LOAD Oct 2 19:04:29.287000 audit: BPF prog-id=23 op=LOAD Oct 2 19:04:29.288212 systemd[1]: Starting systemd-userdbd.service... Oct 2 19:04:29.301648 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Oct 2 19:04:29.334126 systemd[1]: Started systemd-userdbd.service. Oct 2 19:04:29.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:29.338275 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:04:29.391820 systemd[1]: Finished systemd-udev-settle.service. Oct 2 19:04:29.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:29.394581 systemd[1]: Starting lvm2-activation-early.service... Oct 2 19:04:29.394622 systemd-networkd[1043]: lo: Link UP Oct 2 19:04:29.394626 systemd-networkd[1043]: lo: Gained carrier Oct 2 19:04:29.394974 systemd-networkd[1043]: Enumeration completed Oct 2 19:04:29.395084 systemd-networkd[1043]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:04:29.395221 systemd[1]: Started systemd-networkd.service. Oct 2 19:04:29.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:29.396584 systemd-networkd[1043]: eth0: Link UP Oct 2 19:04:29.396593 systemd-networkd[1043]: eth0: Gained carrier Oct 2 19:04:29.413495 lvm[1067]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:04:29.419651 systemd-networkd[1043]: eth0: DHCPv4 address 10.0.0.94/16, gateway 10.0.0.1 acquired from 10.0.0.1 Oct 2 19:04:29.438375 systemd[1]: Finished lvm2-activation-early.service. Oct 2 19:04:29.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:29.439361 systemd[1]: Reached target cryptsetup.target. Oct 2 19:04:29.441245 systemd[1]: Starting lvm2-activation.service... Oct 2 19:04:29.446039 lvm[1068]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:04:29.472449 systemd[1]: Finished lvm2-activation.service. Oct 2 19:04:29.473427 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:04:29.474117 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 19:04:29.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:29.474153 systemd[1]: Reached target local-fs.target. Oct 2 19:04:29.474754 systemd[1]: Reached target machines.target. Oct 2 19:04:29.476527 systemd[1]: Starting ldconfig.service... Oct 2 19:04:29.477523 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 19:04:29.477595 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:04:29.478825 systemd[1]: Starting systemd-boot-update.service... Oct 2 19:04:29.480728 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 19:04:29.484430 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 19:04:29.485515 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:04:29.485572 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:04:29.489587 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 19:04:29.490766 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1070 (bootctl) Oct 2 19:04:29.492032 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 19:04:29.494980 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 19:04:29.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:29.607036 systemd-tmpfiles[1073]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 19:04:29.616482 systemd-tmpfiles[1073]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 19:04:29.622283 systemd-tmpfiles[1073]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 19:04:29.649706 systemd-fsck[1078]: fsck.fat 4.2 (2021-01-31) Oct 2 19:04:29.649706 systemd-fsck[1078]: /dev/vda1: 236 files, 113463/258078 clusters Oct 2 19:04:29.652842 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 19:04:29.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:29.658299 systemd[1]: Mounting boot.mount... Oct 2 19:04:29.660983 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 19:04:29.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:29.670974 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 19:04:29.671079 systemd[1]: Mounted boot.mount. Oct 2 19:04:29.678196 systemd[1]: Finished systemd-boot-update.service. Oct 2 19:04:29.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:29.755308 ldconfig[1069]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 19:04:29.759818 systemd[1]: Finished ldconfig.service. Oct 2 19:04:29.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:29.786013 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 19:04:29.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:29.788197 systemd[1]: Starting audit-rules.service... Oct 2 19:04:29.789733 systemd[1]: Starting clean-ca-certificates.service... Oct 2 19:04:29.793637 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 19:04:29.795000 audit: BPF prog-id=24 op=LOAD Oct 2 19:04:29.796326 systemd[1]: Starting systemd-resolved.service... Oct 2 19:04:29.799000 audit: BPF prog-id=25 op=LOAD Oct 2 19:04:29.800993 systemd[1]: Starting systemd-timesyncd.service... Oct 2 19:04:29.802885 systemd[1]: Starting systemd-update-utmp.service... Oct 2 19:04:29.803912 systemd[1]: Finished clean-ca-certificates.service. Oct 2 19:04:29.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:29.806279 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 19:04:29.808000 audit[1092]: SYSTEM_BOOT pid=1092 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 19:04:29.811238 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 19:04:29.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:29.812294 systemd[1]: Finished systemd-update-utmp.service. Oct 2 19:04:29.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:29.814225 systemd[1]: Starting systemd-update-done.service... Oct 2 19:04:29.821714 systemd[1]: Finished systemd-update-done.service. Oct 2 19:04:29.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:29.832000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 19:04:29.832000 audit[1103]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdc329850 a2=420 a3=0 items=0 ppid=1081 pid=1103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:04:29.832000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 19:04:29.832906 augenrules[1103]: No rules Oct 2 19:04:29.834232 systemd[1]: Finished audit-rules.service. Oct 2 19:04:29.856530 systemd[1]: Started systemd-timesyncd.service. Oct 2 19:04:29.857228 systemd[1]: Reached target time-set.target. Oct 2 19:04:29.858003 systemd-resolved[1085]: Positive Trust Anchors: Oct 2 19:04:29.858205 systemd-resolved[1085]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:04:29.858288 systemd-resolved[1085]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:04:29.859226 systemd-timesyncd[1091]: Contacted time server 10.0.0.1:123 (10.0.0.1). Oct 2 19:04:29.859392 systemd-timesyncd[1091]: Initial clock synchronization to Mon 2023-10-02 19:04:29.963201 UTC. Oct 2 19:04:29.868513 systemd-resolved[1085]: Defaulting to hostname 'linux'. Oct 2 19:04:29.870071 systemd[1]: Started systemd-resolved.service. Oct 2 19:04:29.870717 systemd[1]: Reached target network.target. Oct 2 19:04:29.871222 systemd[1]: Reached target nss-lookup.target. Oct 2 19:04:29.871788 systemd[1]: Reached target sysinit.target. Oct 2 19:04:29.872350 systemd[1]: Started motdgen.path. Oct 2 19:04:29.872875 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 19:04:29.873756 systemd[1]: Started logrotate.timer. Oct 2 19:04:29.874340 systemd[1]: Started mdadm.timer. Oct 2 19:04:29.874844 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 19:04:29.875382 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 19:04:29.875408 systemd[1]: Reached target paths.target. Oct 2 19:04:29.875900 systemd[1]: Reached target timers.target. Oct 2 19:04:29.876723 systemd[1]: Listening on dbus.socket. Oct 2 19:04:29.878241 systemd[1]: Starting docker.socket... Oct 2 19:04:29.881366 systemd[1]: Listening on sshd.socket. Oct 2 19:04:29.882177 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:04:29.882587 systemd[1]: Listening on docker.socket. Oct 2 19:04:29.883204 systemd[1]: Reached target sockets.target. Oct 2 19:04:29.883781 systemd[1]: Reached target basic.target. Oct 2 19:04:29.884303 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:04:29.884330 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:04:29.885275 systemd[1]: Starting containerd.service... Oct 2 19:04:29.886773 systemd[1]: Starting dbus.service... Oct 2 19:04:29.888560 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 19:04:29.890525 systemd[1]: Starting extend-filesystems.service... Oct 2 19:04:29.891130 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 19:04:29.893942 systemd[1]: Starting motdgen.service... Oct 2 19:04:29.895568 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 19:04:29.898486 systemd[1]: Starting prepare-critools.service... Oct 2 19:04:29.900017 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 19:04:29.901822 systemd[1]: Starting sshd-keygen.service... Oct 2 19:04:29.903987 jq[1113]: false Oct 2 19:04:29.904410 systemd[1]: Starting systemd-logind.service... Oct 2 19:04:29.904999 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:04:29.905053 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 2 19:04:29.905458 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 19:04:29.906127 systemd[1]: Starting update-engine.service... Oct 2 19:04:29.908065 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 19:04:29.910625 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 19:04:29.910797 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 19:04:29.912278 jq[1129]: true Oct 2 19:04:29.912507 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 19:04:29.912659 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 19:04:29.921463 jq[1135]: true Oct 2 19:04:29.925473 tar[1132]: ./ Oct 2 19:04:29.925473 tar[1132]: ./loopback Oct 2 19:04:29.927628 tar[1133]: crictl Oct 2 19:04:29.942872 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 19:04:29.943055 systemd[1]: Finished motdgen.service. Oct 2 19:04:29.953794 extend-filesystems[1114]: Found vda Oct 2 19:04:29.954989 extend-filesystems[1114]: Found vda1 Oct 2 19:04:29.956613 extend-filesystems[1114]: Found vda2 Oct 2 19:04:29.957217 extend-filesystems[1114]: Found vda3 Oct 2 19:04:29.957804 extend-filesystems[1114]: Found usr Oct 2 19:04:29.958334 extend-filesystems[1114]: Found vda4 Oct 2 19:04:29.958948 extend-filesystems[1114]: Found vda6 Oct 2 19:04:29.959587 extend-filesystems[1114]: Found vda7 Oct 2 19:04:29.960182 extend-filesystems[1114]: Found vda9 Oct 2 19:04:29.960755 extend-filesystems[1114]: Checking size of /dev/vda9 Oct 2 19:04:29.963232 tar[1132]: ./bandwidth Oct 2 19:04:29.969757 dbus-daemon[1112]: [system] SELinux support is enabled Oct 2 19:04:29.969955 systemd[1]: Started dbus.service. Oct 2 19:04:29.972496 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 19:04:29.972549 systemd[1]: Reached target system-config.target. Oct 2 19:04:29.973382 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 19:04:29.973428 systemd[1]: Reached target user-config.target. Oct 2 19:04:30.008247 extend-filesystems[1114]: Old size kept for /dev/vda9 Oct 2 19:04:30.011320 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 19:04:30.011501 systemd[1]: Finished extend-filesystems.service. Oct 2 19:04:30.029928 systemd-logind[1123]: Watching system buttons on /dev/input/event0 (Power Button) Oct 2 19:04:30.030543 systemd-logind[1123]: New seat seat0. Oct 2 19:04:30.032225 systemd[1]: Started systemd-logind.service. Oct 2 19:04:30.034384 bash[1163]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:04:30.036444 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 19:04:30.054055 update_engine[1126]: I1002 19:04:30.053740 1126 main.cc:92] Flatcar Update Engine starting Oct 2 19:04:30.057065 systemd[1]: Started update-engine.service. Oct 2 19:04:30.057213 update_engine[1126]: I1002 19:04:30.057191 1126 update_check_scheduler.cc:74] Next update check in 4m45s Oct 2 19:04:30.058824 tar[1132]: ./ptp Oct 2 19:04:30.059631 systemd[1]: Started locksmithd.service. Oct 2 19:04:30.099451 env[1139]: time="2023-10-02T19:04:30.095803322Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 19:04:30.117860 tar[1132]: ./vlan Oct 2 19:04:30.126931 env[1139]: time="2023-10-02T19:04:30.126876139Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 19:04:30.127062 env[1139]: time="2023-10-02T19:04:30.127043528Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:04:30.133756 env[1139]: time="2023-10-02T19:04:30.133711555Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:04:30.133981 env[1139]: time="2023-10-02T19:04:30.133775982Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:04:30.134345 env[1139]: time="2023-10-02T19:04:30.134310000Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:04:30.134345 env[1139]: time="2023-10-02T19:04:30.134338850Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 19:04:30.134465 env[1139]: time="2023-10-02T19:04:30.134353275Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 19:04:30.134465 env[1139]: time="2023-10-02T19:04:30.134363446Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 19:04:30.134509 env[1139]: time="2023-10-02T19:04:30.134479010Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:04:30.134858 env[1139]: time="2023-10-02T19:04:30.134836724Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:04:30.134985 env[1139]: time="2023-10-02T19:04:30.134965457Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:04:30.135017 env[1139]: time="2023-10-02T19:04:30.134984096Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 19:04:30.135053 env[1139]: time="2023-10-02T19:04:30.135038029Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 19:04:30.135085 env[1139]: time="2023-10-02T19:04:30.135055898Z" level=info msg="metadata content store policy set" policy=shared Oct 2 19:04:30.143757 env[1139]: time="2023-10-02T19:04:30.143689647Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 19:04:30.143757 env[1139]: time="2023-10-02T19:04:30.143732761Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 19:04:30.143757 env[1139]: time="2023-10-02T19:04:30.143755452Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 19:04:30.143913 env[1139]: time="2023-10-02T19:04:30.143791353Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 19:04:30.143913 env[1139]: time="2023-10-02T19:04:30.143807115Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 19:04:30.143913 env[1139]: time="2023-10-02T19:04:30.143821135Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 19:04:30.143913 env[1139]: time="2023-10-02T19:04:30.143835520Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 19:04:30.147818 env[1139]: time="2023-10-02T19:04:30.144171758Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 19:04:30.147818 env[1139]: time="2023-10-02T19:04:30.144194247Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 19:04:30.147818 env[1139]: time="2023-10-02T19:04:30.144209604Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 19:04:30.147818 env[1139]: time="2023-10-02T19:04:30.144225083Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 19:04:30.147818 env[1139]: time="2023-10-02T19:04:30.144238576Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 19:04:30.147818 env[1139]: time="2023-10-02T19:04:30.144382383Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 19:04:30.147818 env[1139]: time="2023-10-02T19:04:30.144492112Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 19:04:30.147818 env[1139]: time="2023-10-02T19:04:30.144764368Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 19:04:30.147818 env[1139]: time="2023-10-02T19:04:30.144789936Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 19:04:30.147818 env[1139]: time="2023-10-02T19:04:30.144803348Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 19:04:30.147818 env[1139]: time="2023-10-02T19:04:30.145056844Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 19:04:30.147818 env[1139]: time="2023-10-02T19:04:30.145070296Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 19:04:30.147818 env[1139]: time="2023-10-02T19:04:30.145084965Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 19:04:30.147818 env[1139]: time="2023-10-02T19:04:30.145096675Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 19:04:30.148164 env[1139]: time="2023-10-02T19:04:30.145110655Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 19:04:30.148164 env[1139]: time="2023-10-02T19:04:30.145126214Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 19:04:30.148164 env[1139]: time="2023-10-02T19:04:30.145139019Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 19:04:30.148164 env[1139]: time="2023-10-02T19:04:30.145151823Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 19:04:30.148164 env[1139]: time="2023-10-02T19:04:30.145167180Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 19:04:30.148164 env[1139]: time="2023-10-02T19:04:30.145296319Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 19:04:30.148164 env[1139]: time="2023-10-02T19:04:30.145320509Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 19:04:30.148164 env[1139]: time="2023-10-02T19:04:30.145334043Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 19:04:30.148164 env[1139]: time="2023-10-02T19:04:30.145346848Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 19:04:30.148164 env[1139]: time="2023-10-02T19:04:30.145362164Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 19:04:30.148164 env[1139]: time="2023-10-02T19:04:30.145373145Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 19:04:30.148164 env[1139]: time="2023-10-02T19:04:30.145389353Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 19:04:30.148164 env[1139]: time="2023-10-02T19:04:30.145441746Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 19:04:30.148436 env[1139]: time="2023-10-02T19:04:30.145652979Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 19:04:30.148436 env[1139]: time="2023-10-02T19:04:30.145708573Z" level=info msg="Connect containerd service" Oct 2 19:04:30.148436 env[1139]: time="2023-10-02T19:04:30.145744838Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 19:04:30.148436 env[1139]: time="2023-10-02T19:04:30.146558446Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:04:30.150086 env[1139]: time="2023-10-02T19:04:30.149522671Z" level=info msg="Start subscribing containerd event" Oct 2 19:04:30.150086 env[1139]: time="2023-10-02T19:04:30.149616151Z" level=info msg="Start recovering state" Oct 2 19:04:30.150086 env[1139]: time="2023-10-02T19:04:30.149642652Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 19:04:30.150086 env[1139]: time="2023-10-02T19:04:30.149695004Z" level=info msg="Start event monitor" Oct 2 19:04:30.150086 env[1139]: time="2023-10-02T19:04:30.149702054Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 19:04:30.150086 env[1139]: time="2023-10-02T19:04:30.149739900Z" level=info msg="Start snapshots syncer" Oct 2 19:04:30.150086 env[1139]: time="2023-10-02T19:04:30.149754042Z" level=info msg="Start cni network conf syncer for default" Oct 2 19:04:30.150086 env[1139]: time="2023-10-02T19:04:30.149763645Z" level=info msg="containerd successfully booted in 0.054669s" Oct 2 19:04:30.150086 env[1139]: time="2023-10-02T19:04:30.149769115Z" level=info msg="Start streaming server" Oct 2 19:04:30.149851 systemd[1]: Started containerd.service. Oct 2 19:04:30.164694 tar[1132]: ./host-device Oct 2 19:04:30.215819 tar[1132]: ./tuning Oct 2 19:04:30.246728 tar[1132]: ./vrf Oct 2 19:04:30.252727 locksmithd[1168]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 19:04:30.278473 tar[1132]: ./sbr Oct 2 19:04:30.308861 tar[1132]: ./tap Oct 2 19:04:30.344071 tar[1132]: ./dhcp Oct 2 19:04:30.409508 systemd[1]: Finished prepare-critools.service. Oct 2 19:04:30.429034 tar[1132]: ./static Oct 2 19:04:30.453906 tar[1132]: ./firewall Oct 2 19:04:30.491242 tar[1132]: ./macvlan Oct 2 19:04:30.520498 tar[1132]: ./dummy Oct 2 19:04:30.549238 tar[1132]: ./bridge Oct 2 19:04:30.580515 tar[1132]: ./ipvlan Oct 2 19:04:30.609295 tar[1132]: ./portmap Oct 2 19:04:30.636644 tar[1132]: ./host-local Oct 2 19:04:30.672822 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 19:04:30.961567 systemd-networkd[1043]: eth0: Gained IPv6LL Oct 2 19:04:32.320044 systemd[1]: Created slice system-sshd.slice. Oct 2 19:04:32.722147 sshd_keygen[1130]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 19:04:32.743976 systemd[1]: Finished sshd-keygen.service. Oct 2 19:04:32.746323 systemd[1]: Starting issuegen.service... Oct 2 19:04:32.747885 systemd[1]: Started sshd@0-10.0.0.94:22-10.0.0.1:38488.service. Oct 2 19:04:32.753139 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 19:04:32.753322 systemd[1]: Finished issuegen.service. Oct 2 19:04:32.755740 systemd[1]: Starting systemd-user-sessions.service... Oct 2 19:04:32.763385 systemd[1]: Finished systemd-user-sessions.service. Oct 2 19:04:32.766367 systemd[1]: Started getty@tty1.service. Oct 2 19:04:32.770083 systemd[1]: Started serial-getty@ttyAMA0.service. Oct 2 19:04:32.771651 systemd[1]: Reached target getty.target. Oct 2 19:04:32.772550 systemd[1]: Reached target multi-user.target. Oct 2 19:04:32.774750 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 19:04:32.783569 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 19:04:32.783717 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 19:04:32.784761 systemd[1]: Startup finished in 610ms (kernel) + 5.994s (initrd) + 6.193s (userspace) = 12.798s. Oct 2 19:04:32.837954 sshd[1189]: Accepted publickey for core from 10.0.0.1 port 38488 ssh2: RSA SHA256:327EISj6dhgnnLT6sEqi2+uwythtGn0QzwGU+yMaXG4 Oct 2 19:04:32.842942 sshd[1189]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:04:32.860206 systemd[1]: Created slice user-500.slice. Oct 2 19:04:32.861358 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 19:04:32.864066 systemd-logind[1123]: New session 1 of user core. Oct 2 19:04:32.873139 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 19:04:32.874760 systemd[1]: Starting user@500.service... Oct 2 19:04:32.879540 (systemd)[1198]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:04:32.957083 systemd[1198]: Queued start job for default target default.target. Oct 2 19:04:32.957573 systemd[1198]: Reached target paths.target. Oct 2 19:04:32.957591 systemd[1198]: Reached target sockets.target. Oct 2 19:04:32.957602 systemd[1198]: Reached target timers.target. Oct 2 19:04:32.957612 systemd[1198]: Reached target basic.target. Oct 2 19:04:32.957663 systemd[1198]: Reached target default.target. Oct 2 19:04:32.957686 systemd[1198]: Startup finished in 70ms. Oct 2 19:04:32.957778 systemd[1]: Started user@500.service. Oct 2 19:04:32.958689 systemd[1]: Started session-1.scope. Oct 2 19:04:33.017315 systemd[1]: Started sshd@1-10.0.0.94:22-10.0.0.1:39516.service. Oct 2 19:04:33.059391 sshd[1207]: Accepted publickey for core from 10.0.0.1 port 39516 ssh2: RSA SHA256:327EISj6dhgnnLT6sEqi2+uwythtGn0QzwGU+yMaXG4 Oct 2 19:04:33.060725 sshd[1207]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:04:33.066485 systemd-logind[1123]: New session 2 of user core. Oct 2 19:04:33.067533 systemd[1]: Started session-2.scope. Oct 2 19:04:33.133370 sshd[1207]: pam_unix(sshd:session): session closed for user core Oct 2 19:04:33.137452 systemd[1]: Started sshd@2-10.0.0.94:22-10.0.0.1:39532.service. Oct 2 19:04:33.137904 systemd[1]: sshd@1-10.0.0.94:22-10.0.0.1:39516.service: Deactivated successfully. Oct 2 19:04:33.138597 systemd[1]: session-2.scope: Deactivated successfully. Oct 2 19:04:33.139178 systemd-logind[1123]: Session 2 logged out. Waiting for processes to exit. Oct 2 19:04:33.141217 systemd-logind[1123]: Removed session 2. Oct 2 19:04:33.176399 sshd[1212]: Accepted publickey for core from 10.0.0.1 port 39532 ssh2: RSA SHA256:327EISj6dhgnnLT6sEqi2+uwythtGn0QzwGU+yMaXG4 Oct 2 19:04:33.178031 sshd[1212]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:04:33.183579 systemd-logind[1123]: New session 3 of user core. Oct 2 19:04:33.183757 systemd[1]: Started session-3.scope. Oct 2 19:04:33.238196 sshd[1212]: pam_unix(sshd:session): session closed for user core Oct 2 19:04:33.241455 systemd[1]: sshd@2-10.0.0.94:22-10.0.0.1:39532.service: Deactivated successfully. Oct 2 19:04:33.242029 systemd[1]: session-3.scope: Deactivated successfully. Oct 2 19:04:33.242755 systemd-logind[1123]: Session 3 logged out. Waiting for processes to exit. Oct 2 19:04:33.245004 systemd[1]: Started sshd@3-10.0.0.94:22-10.0.0.1:39544.service. Oct 2 19:04:33.246973 systemd-logind[1123]: Removed session 3. Oct 2 19:04:33.282197 sshd[1219]: Accepted publickey for core from 10.0.0.1 port 39544 ssh2: RSA SHA256:327EISj6dhgnnLT6sEqi2+uwythtGn0QzwGU+yMaXG4 Oct 2 19:04:33.283270 sshd[1219]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:04:33.286929 systemd-logind[1123]: New session 4 of user core. Oct 2 19:04:33.287864 systemd[1]: Started session-4.scope. Oct 2 19:04:33.349864 sshd[1219]: pam_unix(sshd:session): session closed for user core Oct 2 19:04:33.352484 systemd[1]: Started sshd@4-10.0.0.94:22-10.0.0.1:39546.service. Oct 2 19:04:33.352891 systemd[1]: sshd@3-10.0.0.94:22-10.0.0.1:39544.service: Deactivated successfully. Oct 2 19:04:33.353854 systemd-logind[1123]: Session 4 logged out. Waiting for processes to exit. Oct 2 19:04:33.353914 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 19:04:33.355248 systemd-logind[1123]: Removed session 4. Oct 2 19:04:33.388551 sshd[1224]: Accepted publickey for core from 10.0.0.1 port 39546 ssh2: RSA SHA256:327EISj6dhgnnLT6sEqi2+uwythtGn0QzwGU+yMaXG4 Oct 2 19:04:33.390234 sshd[1224]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:04:33.394340 systemd-logind[1123]: New session 5 of user core. Oct 2 19:04:33.395714 systemd[1]: Started session-5.scope. Oct 2 19:04:33.470574 sudo[1229]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 19:04:33.470787 sudo[1229]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:04:33.485798 dbus-daemon[1112]: avc: received setenforce notice (enforcing=1) Oct 2 19:04:33.487745 sudo[1229]: pam_unix(sudo:session): session closed for user root Oct 2 19:04:33.495550 sshd[1224]: pam_unix(sshd:session): session closed for user core Oct 2 19:04:33.498749 systemd[1]: sshd@4-10.0.0.94:22-10.0.0.1:39546.service: Deactivated successfully. Oct 2 19:04:33.499486 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 19:04:33.501335 systemd[1]: Started sshd@5-10.0.0.94:22-10.0.0.1:39558.service. Oct 2 19:04:33.501730 systemd-logind[1123]: Session 5 logged out. Waiting for processes to exit. Oct 2 19:04:33.503555 systemd-logind[1123]: Removed session 5. Oct 2 19:04:33.537730 sshd[1233]: Accepted publickey for core from 10.0.0.1 port 39558 ssh2: RSA SHA256:327EISj6dhgnnLT6sEqi2+uwythtGn0QzwGU+yMaXG4 Oct 2 19:04:33.540069 sshd[1233]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:04:33.544670 systemd-logind[1123]: New session 6 of user core. Oct 2 19:04:33.545072 systemd[1]: Started session-6.scope. Oct 2 19:04:33.610721 sudo[1237]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 19:04:33.610928 sudo[1237]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:04:33.614359 sudo[1237]: pam_unix(sudo:session): session closed for user root Oct 2 19:04:33.619124 sudo[1236]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 19:04:33.619333 sudo[1236]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:04:33.628614 systemd[1]: Stopping audit-rules.service... Oct 2 19:04:33.629000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:04:33.630882 kernel: kauditd_printk_skb: 115 callbacks suppressed Oct 2 19:04:33.630946 kernel: audit: type=1305 audit(1696273473.629:155): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:04:33.631624 auditctl[1240]: No rules Oct 2 19:04:33.631895 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 19:04:33.629000 audit[1240]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc0b853e0 a2=420 a3=0 items=0 ppid=1 pid=1240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:04:33.632053 systemd[1]: Stopped audit-rules.service. Oct 2 19:04:33.633523 systemd[1]: Starting audit-rules.service... Oct 2 19:04:33.634588 kernel: audit: type=1300 audit(1696273473.629:155): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc0b853e0 a2=420 a3=0 items=0 ppid=1 pid=1240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:04:33.634670 kernel: audit: type=1327 audit(1696273473.629:155): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:04:33.629000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:04:33.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:33.637218 kernel: audit: type=1131 audit(1696273473.631:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:33.658541 augenrules[1257]: No rules Oct 2 19:04:33.659247 systemd[1]: Finished audit-rules.service. Oct 2 19:04:33.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:33.661596 sudo[1236]: pam_unix(sudo:session): session closed for user root Oct 2 19:04:33.662343 kernel: audit: type=1130 audit(1696273473.658:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:33.662405 kernel: audit: type=1106 audit(1696273473.660:158): pid=1236 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:04:33.660000 audit[1236]: USER_END pid=1236 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:04:33.660000 audit[1236]: CRED_DISP pid=1236 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:04:33.665574 sshd[1233]: pam_unix(sshd:session): session closed for user core Oct 2 19:04:33.666642 kernel: audit: type=1104 audit(1696273473.660:159): pid=1236 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:04:33.666000 audit[1233]: USER_END pid=1233 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:04:33.669272 systemd[1]: Started sshd@6-10.0.0.94:22-10.0.0.1:39570.service. Oct 2 19:04:33.669771 systemd[1]: sshd@5-10.0.0.94:22-10.0.0.1:39558.service: Deactivated successfully. Oct 2 19:04:33.670401 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 19:04:33.671030 systemd-logind[1123]: Session 6 logged out. Waiting for processes to exit. Oct 2 19:04:33.666000 audit[1233]: CRED_DISP pid=1233 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:04:33.672157 systemd-logind[1123]: Removed session 6. Oct 2 19:04:33.674257 kernel: audit: type=1106 audit(1696273473.666:160): pid=1233 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:04:33.674308 kernel: audit: type=1104 audit(1696273473.666:161): pid=1233 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:04:33.674325 kernel: audit: type=1130 audit(1696273473.667:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.94:22-10.0.0.1:39570 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:33.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.94:22-10.0.0.1:39570 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:33.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.94:22-10.0.0.1:39558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:33.703000 audit[1262]: USER_ACCT pid=1262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:04:33.704441 sshd[1262]: Accepted publickey for core from 10.0.0.1 port 39570 ssh2: RSA SHA256:327EISj6dhgnnLT6sEqi2+uwythtGn0QzwGU+yMaXG4 Oct 2 19:04:33.706000 audit[1262]: CRED_ACQ pid=1262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:04:33.706000 audit[1262]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe9c94020 a2=3 a3=1 items=0 ppid=1 pid=1262 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:04:33.706000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:04:33.707134 sshd[1262]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:04:33.712518 systemd-logind[1123]: New session 7 of user core. Oct 2 19:04:33.713003 systemd[1]: Started session-7.scope. Oct 2 19:04:33.720000 audit[1262]: USER_START pid=1262 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:04:33.722000 audit[1265]: CRED_ACQ pid=1265 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:04:33.771576 sudo[1266]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 19:04:33.770000 audit[1266]: USER_ACCT pid=1266 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:04:33.770000 audit[1266]: CRED_REFR pid=1266 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:04:33.771783 sudo[1266]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:04:33.774000 audit[1266]: USER_START pid=1266 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:04:34.538677 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 19:04:34.545309 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 19:04:34.545661 systemd[1]: Reached target network-online.target. Oct 2 19:04:34.546915 systemd[1]: Starting docker.service... Oct 2 19:04:34.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:34.648822 env[1284]: time="2023-10-02T19:04:34.648766652Z" level=info msg="Starting up" Oct 2 19:04:34.650462 env[1284]: time="2023-10-02T19:04:34.650410290Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:04:34.650562 env[1284]: time="2023-10-02T19:04:34.650548496Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:04:34.650634 env[1284]: time="2023-10-02T19:04:34.650617861Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:04:34.650684 env[1284]: time="2023-10-02T19:04:34.650672112Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:04:34.652978 env[1284]: time="2023-10-02T19:04:34.652941767Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:04:34.652978 env[1284]: time="2023-10-02T19:04:34.652969457Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:04:34.653079 env[1284]: time="2023-10-02T19:04:34.652984007Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:04:34.653079 env[1284]: time="2023-10-02T19:04:34.652994366Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:04:34.659462 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2161504626-merged.mount: Deactivated successfully. Oct 2 19:04:34.914134 env[1284]: time="2023-10-02T19:04:34.912139465Z" level=info msg="Loading containers: start." Oct 2 19:04:34.962000 audit[1319]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1319 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:04:34.962000 audit[1319]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffd5abcba0 a2=0 a3=1 items=0 ppid=1284 pid=1319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:04:34.962000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 2 19:04:34.964000 audit[1321]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1321 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:04:34.964000 audit[1321]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffc96b1e40 a2=0 a3=1 items=0 ppid=1284 pid=1321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:04:34.964000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 2 19:04:34.966000 audit[1323]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1323 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:04:34.966000 audit[1323]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffdb85cdb0 a2=0 a3=1 items=0 ppid=1284 pid=1323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:04:34.966000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:04:34.968000 audit[1325]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1325 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:04:34.968000 audit[1325]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffff7802e30 a2=0 a3=1 items=0 ppid=1284 pid=1325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:04:34.968000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:04:34.973000 audit[1327]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1327 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:04:34.973000 audit[1327]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffa65cce0 a2=0 a3=1 items=0 ppid=1284 pid=1327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:04:34.973000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 2 19:04:35.002000 audit[1332]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1332 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:04:35.002000 audit[1332]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe8b97db0 a2=0 a3=1 items=0 ppid=1284 pid=1332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:04:35.002000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 2 19:04:35.009000 audit[1334]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1334 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:04:35.009000 audit[1334]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd16b47a0 a2=0 a3=1 items=0 ppid=1284 pid=1334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:04:35.009000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 2 19:04:35.011000 audit[1336]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1336 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:04:35.011000 audit[1336]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffe4c58400 a2=0 a3=1 items=0 ppid=1284 pid=1336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:04:35.011000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 2 19:04:35.013000 audit[1338]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1338 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:04:35.013000 audit[1338]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffdefed230 a2=0 a3=1 items=0 ppid=1284 pid=1338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:04:35.013000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:04:35.020000 audit[1342]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1342 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:04:35.020000 audit[1342]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffff1357ed0 a2=0 a3=1 items=0 ppid=1284 pid=1342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:04:35.020000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:04:35.021000 audit[1343]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1343 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:04:35.021000 audit[1343]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffc28e1b30 a2=0 a3=1 items=0 ppid=1284 pid=1343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:04:35.021000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:04:35.027444 kernel: Initializing XFRM netlink socket Oct 2 19:04:35.051336 env[1284]: time="2023-10-02T19:04:35.051280597Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 2 19:04:35.064000 audit[1351]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1351 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:04:35.064000 audit[1351]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffe5b07a20 a2=0 a3=1 items=0 ppid=1284 pid=1351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:04:35.064000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 2 19:04:35.084000 audit[1354]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1354 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:04:35.084000 audit[1354]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffc00af660 a2=0 a3=1 items=0 ppid=1284 pid=1354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:04:35.084000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 2 19:04:35.087000 audit[1357]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1357 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:04:35.087000 audit[1357]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffdf179bb0 a2=0 a3=1 items=0 ppid=1284 pid=1357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:04:35.087000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 2 19:04:35.089000 audit[1359]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1359 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:04:35.089000 audit[1359]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffc54c06f0 a2=0 a3=1 items=0 ppid=1284 pid=1359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:04:35.089000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 2 19:04:35.091000 audit[1361]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1361 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:04:35.091000 audit[1361]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=fffff44210c0 a2=0 a3=1 items=0 ppid=1284 pid=1361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:04:35.091000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 2 19:04:35.093000 audit[1363]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1363 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:04:35.093000 audit[1363]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffcf0f18f0 a2=0 a3=1 items=0 ppid=1284 pid=1363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:04:35.093000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 2 19:04:35.095000 audit[1365]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1365 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:04:35.095000 audit[1365]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffec2bd7f0 a2=0 a3=1 items=0 ppid=1284 pid=1365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:04:35.095000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 2 19:04:35.104000 audit[1368]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1368 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:04:35.104000 audit[1368]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffc32dc590 a2=0 a3=1 items=0 ppid=1284 pid=1368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:04:35.104000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 2 19:04:35.106000 audit[1370]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1370 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:04:35.106000 audit[1370]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffc3db6df0 a2=0 a3=1 items=0 ppid=1284 pid=1370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:04:35.106000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:04:35.108000 audit[1372]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1372 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:04:35.108000 audit[1372]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffe048f1c0 a2=0 a3=1 items=0 ppid=1284 pid=1372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:04:35.108000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:04:35.110000 audit[1374]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1374 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:04:35.110000 audit[1374]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff710d810 a2=0 a3=1 items=0 ppid=1284 pid=1374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:04:35.110000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 2 19:04:35.112630 systemd-networkd[1043]: docker0: Link UP Oct 2 19:04:35.121000 audit[1378]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1378 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:04:35.121000 audit[1378]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffc2b6f10 a2=0 a3=1 items=0 ppid=1284 pid=1378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:04:35.121000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:04:35.122000 audit[1379]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1379 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:04:35.122000 audit[1379]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffefde0570 a2=0 a3=1 items=0 ppid=1284 pid=1379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:04:35.122000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:04:35.124264 env[1284]: time="2023-10-02T19:04:35.124229333Z" level=info msg="Loading containers: done." Oct 2 19:04:35.145800 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck894461426-merged.mount: Deactivated successfully. Oct 2 19:04:35.153448 env[1284]: time="2023-10-02T19:04:35.153381108Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 2 19:04:35.153594 env[1284]: time="2023-10-02T19:04:35.153581355Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 2 19:04:35.153704 env[1284]: time="2023-10-02T19:04:35.153676224Z" level=info msg="Daemon has completed initialization" Oct 2 19:04:35.171294 systemd[1]: Started docker.service. Oct 2 19:04:35.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:35.180520 env[1284]: time="2023-10-02T19:04:35.180462118Z" level=info msg="API listen on /run/docker.sock" Oct 2 19:04:35.199886 systemd[1]: Reloading. Oct 2 19:04:35.251453 /usr/lib/systemd/system-generators/torcx-generator[1428]: time="2023-10-02T19:04:35Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:04:35.251488 /usr/lib/systemd/system-generators/torcx-generator[1428]: time="2023-10-02T19:04:35Z" level=info msg="torcx already run" Oct 2 19:04:35.323737 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:04:35.323756 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:04:35.339522 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:04:35.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.387000 audit: BPF prog-id=31 op=LOAD Oct 2 19:04:35.387000 audit: BPF prog-id=20 op=UNLOAD Oct 2 19:04:35.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.387000 audit: BPF prog-id=32 op=LOAD Oct 2 19:04:35.387000 audit: BPF prog-id=29 op=UNLOAD Oct 2 19:04:35.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.388000 audit: BPF prog-id=33 op=LOAD Oct 2 19:04:35.388000 audit: BPF prog-id=26 op=UNLOAD Oct 2 19:04:35.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.391000 audit: BPF prog-id=34 op=LOAD Oct 2 19:04:35.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.391000 audit: BPF prog-id=35 op=LOAD Oct 2 19:04:35.391000 audit: BPF prog-id=27 op=UNLOAD Oct 2 19:04:35.391000 audit: BPF prog-id=28 op=UNLOAD Oct 2 19:04:35.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.395000 audit: BPF prog-id=36 op=LOAD Oct 2 19:04:35.395000 audit: BPF prog-id=24 op=UNLOAD Oct 2 19:04:35.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.396000 audit: BPF prog-id=37 op=LOAD Oct 2 19:04:35.396000 audit: BPF prog-id=25 op=UNLOAD Oct 2 19:04:35.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.397000 audit: BPF prog-id=38 op=LOAD Oct 2 19:04:35.397000 audit: BPF prog-id=21 op=UNLOAD Oct 2 19:04:35.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.397000 audit: BPF prog-id=39 op=LOAD Oct 2 19:04:35.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.397000 audit: BPF prog-id=40 op=LOAD Oct 2 19:04:35.397000 audit: BPF prog-id=22 op=UNLOAD Oct 2 19:04:35.397000 audit: BPF prog-id=23 op=UNLOAD Oct 2 19:04:35.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit: BPF prog-id=41 op=LOAD Oct 2 19:04:35.399000 audit: BPF prog-id=15 op=UNLOAD Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit: BPF prog-id=42 op=LOAD Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit: BPF prog-id=43 op=LOAD Oct 2 19:04:35.399000 audit: BPF prog-id=16 op=UNLOAD Oct 2 19:04:35.399000 audit: BPF prog-id=17 op=UNLOAD Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit: BPF prog-id=44 op=LOAD Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:04:35.399000 audit: BPF prog-id=45 op=LOAD Oct 2 19:04:35.399000 audit: BPF prog-id=18 op=UNLOAD Oct 2 19:04:35.399000 audit: BPF prog-id=19 op=UNLOAD Oct 2 19:04:35.407599 systemd[1]: Started kubelet.service. Oct 2 19:04:35.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:35.535699 kubelet[1465]: E1002 19:04:35.535568 1465 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 2 19:04:35.539130 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:04:35.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:04:35.539256 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:04:35.834693 env[1139]: time="2023-10-02T19:04:35.834572775Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.2\"" Oct 2 19:04:36.523234 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3126578649.mount: Deactivated successfully. Oct 2 19:04:41.130342 env[1139]: time="2023-10-02T19:04:41.130261403Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:04:41.131336 env[1139]: time="2023-10-02T19:04:41.131310415Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:30bb499447fe1bc655853e2e8ac386cdeb28c80263536259cb54f290f9a58d6c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:04:41.133119 env[1139]: time="2023-10-02T19:04:41.133085153Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:04:41.136867 env[1139]: time="2023-10-02T19:04:41.136831096Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:6beea2e5531a0606613594fd3ed92d71bbdcef99dd3237522049a0b32cad736c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:04:41.137676 env[1139]: time="2023-10-02T19:04:41.137643963Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.2\" returns image reference \"sha256:30bb499447fe1bc655853e2e8ac386cdeb28c80263536259cb54f290f9a58d6c\"" Oct 2 19:04:41.151469 env[1139]: time="2023-10-02T19:04:41.151430884Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.2\"" Oct 2 19:04:44.882757 env[1139]: time="2023-10-02T19:04:44.882689685Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:04:44.884464 env[1139]: time="2023-10-02T19:04:44.884411291Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:89d57b83c17862d0ca2dd214e9e5ad425f8d67ecba32d10b846f8d22d3b5597c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:04:44.886297 env[1139]: time="2023-10-02T19:04:44.886245684Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:04:44.888004 env[1139]: time="2023-10-02T19:04:44.887953222Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:6a42ce14d716205a99763f3c732c0a8f0ea041bdbbea7d2dfffcc53dafd7cac4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:04:44.888778 env[1139]: time="2023-10-02T19:04:44.888732142Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.2\" returns image reference \"sha256:89d57b83c17862d0ca2dd214e9e5ad425f8d67ecba32d10b846f8d22d3b5597c\"" Oct 2 19:04:44.899009 env[1139]: time="2023-10-02T19:04:44.898975409Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.2\"" Oct 2 19:04:45.790099 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 2 19:04:45.794015 kernel: kauditd_printk_skb: 259 callbacks suppressed Oct 2 19:04:45.794065 kernel: audit: type=1130 audit(1696273485.788:372): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:45.794087 kernel: audit: type=1131 audit(1696273485.788:373): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:45.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:45.788000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:45.790286 systemd[1]: Stopped kubelet.service. Oct 2 19:04:45.794288 kernel: audit: type=1130 audit(1696273485.789:374): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:45.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:45.791803 systemd[1]: Started kubelet.service. Oct 2 19:04:45.847332 kubelet[1503]: E1002 19:04:45.847286 1503 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 2 19:04:45.850221 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:04:45.850386 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:04:45.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:04:45.853443 kernel: audit: type=1131 audit(1696273485.849:375): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:04:47.095560 env[1139]: time="2023-10-02T19:04:47.095493786Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:04:47.097281 env[1139]: time="2023-10-02T19:04:47.097235683Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:64fc40cee3716a4596d219b360ce536adb7998eaeae3f5dbb774d6503f5039d7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:04:47.101168 env[1139]: time="2023-10-02T19:04:47.101129189Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:04:47.103298 env[1139]: time="2023-10-02T19:04:47.103229568Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:6511193f8114a2f011790619698efe12a8119ed9a17e2e36f4c1c759ccf173ab,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:04:47.104015 env[1139]: time="2023-10-02T19:04:47.103980856Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.2\" returns image reference \"sha256:64fc40cee3716a4596d219b360ce536adb7998eaeae3f5dbb774d6503f5039d7\"" Oct 2 19:04:47.114391 env[1139]: time="2023-10-02T19:04:47.114345005Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.2\"" Oct 2 19:04:48.661128 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2876341430.mount: Deactivated successfully. Oct 2 19:04:49.369223 env[1139]: time="2023-10-02T19:04:49.369150115Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:04:49.370374 env[1139]: time="2023-10-02T19:04:49.370343822Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7da62c127fc0f2c3473babe4dd0fe1da874278c4e524a490b1781e3e0e6dddfa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:04:49.371797 env[1139]: time="2023-10-02T19:04:49.371769407Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:04:49.373190 env[1139]: time="2023-10-02T19:04:49.373145301Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:41c8f92d1cd571e0e36af431f35c78379f84f5daf5b85d43014a9940d697afcf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:04:49.373393 env[1139]: time="2023-10-02T19:04:49.373356959Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.2\" returns image reference \"sha256:7da62c127fc0f2c3473babe4dd0fe1da874278c4e524a490b1781e3e0e6dddfa\"" Oct 2 19:04:49.388870 env[1139]: time="2023-10-02T19:04:49.388844037Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Oct 2 19:04:49.931616 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3807116488.mount: Deactivated successfully. Oct 2 19:04:49.936189 env[1139]: time="2023-10-02T19:04:49.936148824Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:04:49.939038 env[1139]: time="2023-10-02T19:04:49.938616160Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:04:49.941058 env[1139]: time="2023-10-02T19:04:49.940395309Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:04:49.943684 env[1139]: time="2023-10-02T19:04:49.942460992Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:04:49.943684 env[1139]: time="2023-10-02T19:04:49.943006873Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Oct 2 19:04:49.958748 env[1139]: time="2023-10-02T19:04:49.958711215Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\"" Oct 2 19:04:56.101189 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Oct 2 19:04:56.110225 kernel: audit: type=1130 audit(1696273496.100:376): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:56.110269 kernel: audit: type=1131 audit(1696273496.101:377): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:56.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:56.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:56.101383 systemd[1]: Stopped kubelet.service. Oct 2 19:04:56.113579 kernel: audit: type=1130 audit(1696273496.110:378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:56.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:04:56.111192 systemd[1]: Started kubelet.service. Oct 2 19:04:56.189856 kubelet[1529]: E1002 19:04:56.184330 1529 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 2 19:04:56.192956 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:04:56.193091 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:04:56.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:04:56.195434 kernel: audit: type=1131 audit(1696273496.192:379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:04:57.185850 env[1139]: time="2023-10-02T19:04:57.185803165Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:04:57.187588 env[1139]: time="2023-10-02T19:04:57.187544740Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9cdd6470f48c8b127530b7ce6ea4b3524137984481e48bcde619735890840ace,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:04:57.189557 env[1139]: time="2023-10-02T19:04:57.189530042Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:04:57.192604 env[1139]: time="2023-10-02T19:04:57.192525060Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:9cdd6470f48c8b127530b7ce6ea4b3524137984481e48bcde619735890840ace\"" Oct 2 19:04:57.194820 env[1139]: time="2023-10-02T19:04:57.194780658Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:04:57.203000 env[1139]: time="2023-10-02T19:04:57.202967071Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Oct 2 19:04:57.759070 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount572719935.mount: Deactivated successfully. Oct 2 19:04:58.290010 env[1139]: time="2023-10-02T19:04:58.289939803Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:04:58.291904 env[1139]: time="2023-10-02T19:04:58.291864038Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:04:58.293702 env[1139]: time="2023-10-02T19:04:58.293673518Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:04:58.295047 env[1139]: time="2023-10-02T19:04:58.295006930Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:04:58.295609 env[1139]: time="2023-10-02T19:04:58.295583468Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108\"" Oct 2 19:05:02.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:02.629012 systemd[1]: Stopped kubelet.service. Oct 2 19:05:02.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:02.633298 kernel: audit: type=1130 audit(1696273502.628:380): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:02.633371 kernel: audit: type=1131 audit(1696273502.628:381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:02.656733 systemd[1]: Reloading. Oct 2 19:05:02.720947 /usr/lib/systemd/system-generators/torcx-generator[1638]: time="2023-10-02T19:05:02Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:05:02.720978 /usr/lib/systemd/system-generators/torcx-generator[1638]: time="2023-10-02T19:05:02Z" level=info msg="torcx already run" Oct 2 19:05:02.778081 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:05:02.778107 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:05:02.793754 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:05:02.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.849663 kernel: audit: type=1400 audit(1696273502.845:382): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.849718 kernel: audit: type=1400 audit(1696273502.845:383): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.849739 kernel: audit: type=1400 audit(1696273502.845:384): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.853648 kernel: audit: type=1400 audit(1696273502.845:385): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.853760 kernel: audit: type=1400 audit(1696273502.845:386): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.857779 kernel: audit: type=1400 audit(1696273502.845:387): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.857821 kernel: audit: type=1400 audit(1696273502.845:388): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.859442 kernel: audit: type=1400 audit(1696273502.845:389): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.847000 audit: BPF prog-id=46 op=LOAD Oct 2 19:05:02.847000 audit: BPF prog-id=31 op=UNLOAD Oct 2 19:05:02.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.849000 audit: BPF prog-id=47 op=LOAD Oct 2 19:05:02.849000 audit: BPF prog-id=32 op=UNLOAD Oct 2 19:05:02.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.851000 audit: BPF prog-id=48 op=LOAD Oct 2 19:05:02.851000 audit: BPF prog-id=33 op=UNLOAD Oct 2 19:05:02.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.853000 audit: BPF prog-id=49 op=LOAD Oct 2 19:05:02.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.855000 audit: BPF prog-id=50 op=LOAD Oct 2 19:05:02.855000 audit: BPF prog-id=34 op=UNLOAD Oct 2 19:05:02.855000 audit: BPF prog-id=35 op=UNLOAD Oct 2 19:05:02.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.859000 audit: BPF prog-id=51 op=LOAD Oct 2 19:05:02.859000 audit: BPF prog-id=36 op=UNLOAD Oct 2 19:05:02.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.861000 audit: BPF prog-id=37 op=UNLOAD Oct 2 19:05:02.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.861000 audit: BPF prog-id=53 op=LOAD Oct 2 19:05:02.861000 audit: BPF prog-id=38 op=UNLOAD Oct 2 19:05:02.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.861000 audit: BPF prog-id=54 op=LOAD Oct 2 19:05:02.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit: BPF prog-id=55 op=LOAD Oct 2 19:05:02.862000 audit: BPF prog-id=39 op=UNLOAD Oct 2 19:05:02.862000 audit: BPF prog-id=40 op=UNLOAD Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit: BPF prog-id=56 op=LOAD Oct 2 19:05:02.862000 audit: BPF prog-id=41 op=UNLOAD Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit: BPF prog-id=57 op=LOAD Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.862000 audit: BPF prog-id=58 op=LOAD Oct 2 19:05:02.862000 audit: BPF prog-id=42 op=UNLOAD Oct 2 19:05:02.862000 audit: BPF prog-id=43 op=UNLOAD Oct 2 19:05:02.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.863000 audit: BPF prog-id=59 op=LOAD Oct 2 19:05:02.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:02.863000 audit: BPF prog-id=60 op=LOAD Oct 2 19:05:02.863000 audit: BPF prog-id=44 op=UNLOAD Oct 2 19:05:02.863000 audit: BPF prog-id=45 op=UNLOAD Oct 2 19:05:02.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:02.875568 systemd[1]: Started kubelet.service. Oct 2 19:05:02.921681 kubelet[1676]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:05:02.921681 kubelet[1676]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 19:05:02.921681 kubelet[1676]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:05:02.921681 kubelet[1676]: I1002 19:05:02.920942 1676 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:05:03.383236 kubelet[1676]: I1002 19:05:03.383143 1676 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Oct 2 19:05:03.383487 kubelet[1676]: I1002 19:05:03.383353 1676 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:05:03.383847 kubelet[1676]: I1002 19:05:03.383830 1676 server.go:895] "Client rotation is on, will bootstrap in background" Oct 2 19:05:03.388929 kubelet[1676]: I1002 19:05:03.388902 1676 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:05:03.390249 kubelet[1676]: E1002 19:05:03.390231 1676 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.94:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.94:6443: connect: connection refused Oct 2 19:05:03.393438 kubelet[1676]: W1002 19:05:03.393391 1676 machine.go:65] Cannot read vendor id correctly, set empty. Oct 2 19:05:03.394218 kubelet[1676]: I1002 19:05:03.394197 1676 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:05:03.394563 kubelet[1676]: I1002 19:05:03.394547 1676 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:05:03.394798 kubelet[1676]: I1002 19:05:03.394777 1676 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Oct 2 19:05:03.394960 kubelet[1676]: I1002 19:05:03.394944 1676 topology_manager.go:138] "Creating topology manager with none policy" Oct 2 19:05:03.395021 kubelet[1676]: I1002 19:05:03.395011 1676 container_manager_linux.go:301] "Creating device plugin manager" Oct 2 19:05:03.395179 kubelet[1676]: I1002 19:05:03.395165 1676 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:05:03.395523 kubelet[1676]: I1002 19:05:03.395508 1676 kubelet.go:393] "Attempting to sync node with API server" Oct 2 19:05:03.395624 kubelet[1676]: I1002 19:05:03.395612 1676 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:05:03.395708 kubelet[1676]: I1002 19:05:03.395698 1676 kubelet.go:309] "Adding apiserver pod source" Oct 2 19:05:03.396073 kubelet[1676]: W1002 19:05:03.396023 1676 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.0.0.94:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.94:6443: connect: connection refused Oct 2 19:05:03.396126 kubelet[1676]: E1002 19:05:03.396079 1676 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.94:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.94:6443: connect: connection refused Oct 2 19:05:03.396197 kubelet[1676]: I1002 19:05:03.396181 1676 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:05:03.397206 kubelet[1676]: W1002 19:05:03.397157 1676 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.0.0.94:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.94:6443: connect: connection refused Oct 2 19:05:03.397307 kubelet[1676]: E1002 19:05:03.397295 1676 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.94:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.94:6443: connect: connection refused Oct 2 19:05:03.397519 kubelet[1676]: I1002 19:05:03.397501 1676 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:05:03.398017 kubelet[1676]: W1002 19:05:03.397992 1676 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 19:05:03.398939 kubelet[1676]: I1002 19:05:03.398917 1676 server.go:1232] "Started kubelet" Oct 2 19:05:03.399750 kubelet[1676]: I1002 19:05:03.399549 1676 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 19:05:03.400253 kubelet[1676]: I1002 19:05:03.400219 1676 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 2 19:05:03.400720 kubelet[1676]: I1002 19:05:03.400696 1676 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:05:03.401091 kubelet[1676]: E1002 19:05:03.400784 1676 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.178a5fc39bff85fa", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 5, 3, 398888954, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 5, 3, 398888954, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"localhost"}': 'Post "https://10.0.0.94:6443/api/v1/namespaces/default/events": dial tcp 10.0.0.94:6443: connect: connection refused'(may retry after sleeping) Oct 2 19:05:03.400000 audit[1676]: AVC avc: denied { mac_admin } for pid=1676 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:03.400000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:05:03.400000 audit[1676]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000dd0240 a1=4000d38c48 a2=4000dd0210 a3=25 items=0 ppid=1 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:03.400000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:05:03.401759 kubelet[1676]: I1002 19:05:03.401730 1676 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:05:03.401000 audit[1676]: AVC avc: denied { mac_admin } for pid=1676 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:03.401000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:05:03.401000 audit[1676]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000dae620 a1=4000d38c60 a2=4000dd02d0 a3=25 items=0 ppid=1 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:03.401000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:05:03.402246 kubelet[1676]: E1002 19:05:03.402219 1676 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:05:03.402625 kubelet[1676]: E1002 19:05:03.402597 1676 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:05:03.402799 kubelet[1676]: I1002 19:05:03.402784 1676 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:05:03.402959 kubelet[1676]: I1002 19:05:03.402933 1676 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:05:03.403272 kubelet[1676]: I1002 19:05:03.403239 1676 server.go:462] "Adding debug handlers to kubelet server" Oct 2 19:05:03.404804 kubelet[1676]: E1002 19:05:03.404773 1676 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 2 19:05:03.404804 kubelet[1676]: I1002 19:05:03.404775 1676 volume_manager.go:291] "Starting Kubelet Volume Manager" Oct 2 19:05:03.405025 kubelet[1676]: I1002 19:05:03.405003 1676 reconciler_new.go:29] "Reconciler: start to sync state" Oct 2 19:05:03.405797 kubelet[1676]: W1002 19:05:03.405699 1676 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.0.0.94:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.94:6443: connect: connection refused Oct 2 19:05:03.405797 kubelet[1676]: E1002 19:05:03.405796 1676 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.94:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.94:6443: connect: connection refused Oct 2 19:05:03.405932 kubelet[1676]: I1002 19:05:03.405913 1676 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Oct 2 19:05:03.406125 kubelet[1676]: E1002 19:05:03.406094 1676 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.94:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.94:6443: connect: connection refused" interval="200ms" Oct 2 19:05:03.408000 audit[1689]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1689 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:05:03.408000 audit[1689]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe72c5100 a2=0 a3=1 items=0 ppid=1676 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:03.408000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:05:03.409000 audit[1690]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1690 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:05:03.409000 audit[1690]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd5f86ac0 a2=0 a3=1 items=0 ppid=1676 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:03.409000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:05:03.412000 audit[1694]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1694 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:05:03.412000 audit[1694]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff1c29020 a2=0 a3=1 items=0 ppid=1676 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:03.412000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:05:03.414000 audit[1696]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1696 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:05:03.414000 audit[1696]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe1c656a0 a2=0 a3=1 items=0 ppid=1676 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:03.414000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:05:03.420000 audit[1699]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1699 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:05:03.420000 audit[1699]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffcc82ea90 a2=0 a3=1 items=0 ppid=1676 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:03.420000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 19:05:03.421873 kubelet[1676]: I1002 19:05:03.421849 1676 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Oct 2 19:05:03.422000 audit[1701]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1701 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:05:03.422000 audit[1701]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff56e4090 a2=0 a3=1 items=0 ppid=1676 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:03.422000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:05:03.423192 kubelet[1676]: I1002 19:05:03.423175 1676 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Oct 2 19:05:03.423287 kubelet[1676]: I1002 19:05:03.423276 1676 status_manager.go:217] "Starting to sync pod status with apiserver" Oct 2 19:05:03.423499 kubelet[1676]: I1002 19:05:03.423482 1676 kubelet.go:2303] "Starting kubelet main sync loop" Oct 2 19:05:03.423626 kubelet[1676]: E1002 19:05:03.423615 1676 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 19:05:03.424198 kubelet[1676]: W1002 19:05:03.424151 1676 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.0.0.94:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.94:6443: connect: connection refused Oct 2 19:05:03.424283 kubelet[1676]: E1002 19:05:03.424204 1676 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.94:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.94:6443: connect: connection refused Oct 2 19:05:03.424000 audit[1702]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1702 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:05:03.424000 audit[1702]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd4d5c170 a2=0 a3=1 items=0 ppid=1676 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:03.424000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:05:03.424000 audit[1704]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1704 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:05:03.424000 audit[1704]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffea7a88d0 a2=0 a3=1 items=0 ppid=1676 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:03.424000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:05:03.425000 audit[1705]: NETFILTER_CFG table=nat:34 family=10 entries=2 op=nft_register_chain pid=1705 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:05:03.425000 audit[1705]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe7c72f60 a2=0 a3=1 items=0 ppid=1676 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:03.425000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:05:03.426000 audit[1707]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=1707 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:05:03.426000 audit[1707]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeb158700 a2=0 a3=1 items=0 ppid=1676 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:03.426000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:05:03.426000 audit[1708]: NETFILTER_CFG table=filter:36 family=10 entries=2 op=nft_register_chain pid=1708 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:05:03.426000 audit[1708]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd0478a10 a2=0 a3=1 items=0 ppid=1676 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:03.426000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:05:03.428000 audit[1710]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:05:03.428000 audit[1710]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffee7e0560 a2=0 a3=1 items=0 ppid=1676 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:03.428000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:05:03.429391 kubelet[1676]: I1002 19:05:03.429374 1676 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:05:03.429391 kubelet[1676]: I1002 19:05:03.429393 1676 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:05:03.429499 kubelet[1676]: I1002 19:05:03.429441 1676 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:05:03.431014 kubelet[1676]: I1002 19:05:03.430976 1676 policy_none.go:49] "None policy: Start" Oct 2 19:05:03.431672 kubelet[1676]: I1002 19:05:03.431646 1676 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:05:03.431704 kubelet[1676]: I1002 19:05:03.431677 1676 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:05:03.435913 systemd[1]: Created slice kubepods.slice. Oct 2 19:05:03.439940 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 19:05:03.442571 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 19:05:03.452164 kubelet[1676]: I1002 19:05:03.452141 1676 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:05:03.451000 audit[1676]: AVC avc: denied { mac_admin } for pid=1676 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:03.451000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:05:03.451000 audit[1676]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000dd1aa0 a1=4000f8b9c8 a2=4000dd1a70 a3=25 items=0 ppid=1 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:03.451000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:05:03.452692 kubelet[1676]: I1002 19:05:03.452677 1676 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:05:03.453100 kubelet[1676]: I1002 19:05:03.453083 1676 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:05:03.453496 kubelet[1676]: E1002 19:05:03.453473 1676 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Oct 2 19:05:03.507116 kubelet[1676]: I1002 19:05:03.507077 1676 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Oct 2 19:05:03.508967 kubelet[1676]: E1002 19:05:03.508938 1676 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.94:6443/api/v1/nodes\": dial tcp 10.0.0.94:6443: connect: connection refused" node="localhost" Oct 2 19:05:03.525131 kubelet[1676]: I1002 19:05:03.524164 1676 topology_manager.go:215] "Topology Admit Handler" podUID="4e76ba37cc0b818c76d46be0f5ef0a05" podNamespace="kube-system" podName="kube-apiserver-localhost" Oct 2 19:05:03.525385 kubelet[1676]: I1002 19:05:03.525359 1676 topology_manager.go:215] "Topology Admit Handler" podUID="6961ff1365464b1e2d286a48d6c5e40f" podNamespace="kube-system" podName="kube-controller-manager-localhost" Oct 2 19:05:03.526487 kubelet[1676]: I1002 19:05:03.526464 1676 topology_manager.go:215] "Topology Admit Handler" podUID="b619222ebfcfd1a0c9478200f0921497" podNamespace="kube-system" podName="kube-scheduler-localhost" Oct 2 19:05:03.531553 systemd[1]: Created slice kubepods-burstable-pod4e76ba37cc0b818c76d46be0f5ef0a05.slice. Oct 2 19:05:03.557047 systemd[1]: Created slice kubepods-burstable-pod6961ff1365464b1e2d286a48d6c5e40f.slice. Oct 2 19:05:03.572974 systemd[1]: Created slice kubepods-burstable-podb619222ebfcfd1a0c9478200f0921497.slice. Oct 2 19:05:03.606594 kubelet[1676]: I1002 19:05:03.606561 1676 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4e76ba37cc0b818c76d46be0f5ef0a05-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"4e76ba37cc0b818c76d46be0f5ef0a05\") " pod="kube-system/kube-apiserver-localhost" Oct 2 19:05:03.606752 kubelet[1676]: I1002 19:05:03.606741 1676 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4e76ba37cc0b818c76d46be0f5ef0a05-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"4e76ba37cc0b818c76d46be0f5ef0a05\") " pod="kube-system/kube-apiserver-localhost" Oct 2 19:05:03.606849 kubelet[1676]: E1002 19:05:03.606604 1676 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.94:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.94:6443: connect: connection refused" interval="400ms" Oct 2 19:05:03.606919 kubelet[1676]: I1002 19:05:03.606907 1676 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/6961ff1365464b1e2d286a48d6c5e40f-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"6961ff1365464b1e2d286a48d6c5e40f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:05:03.606998 kubelet[1676]: I1002 19:05:03.606988 1676 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6961ff1365464b1e2d286a48d6c5e40f-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"6961ff1365464b1e2d286a48d6c5e40f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:05:03.607149 kubelet[1676]: I1002 19:05:03.607135 1676 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6961ff1365464b1e2d286a48d6c5e40f-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"6961ff1365464b1e2d286a48d6c5e40f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:05:03.607251 kubelet[1676]: I1002 19:05:03.607239 1676 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4e76ba37cc0b818c76d46be0f5ef0a05-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"4e76ba37cc0b818c76d46be0f5ef0a05\") " pod="kube-system/kube-apiserver-localhost" Oct 2 19:05:03.607346 kubelet[1676]: I1002 19:05:03.607334 1676 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6961ff1365464b1e2d286a48d6c5e40f-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"6961ff1365464b1e2d286a48d6c5e40f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:05:03.607434 kubelet[1676]: I1002 19:05:03.607409 1676 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6961ff1365464b1e2d286a48d6c5e40f-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"6961ff1365464b1e2d286a48d6c5e40f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:05:03.607506 kubelet[1676]: I1002 19:05:03.607496 1676 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b619222ebfcfd1a0c9478200f0921497-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"b619222ebfcfd1a0c9478200f0921497\") " pod="kube-system/kube-scheduler-localhost" Oct 2 19:05:03.713099 kubelet[1676]: I1002 19:05:03.712999 1676 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Oct 2 19:05:03.714124 kubelet[1676]: E1002 19:05:03.714077 1676 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.94:6443/api/v1/nodes\": dial tcp 10.0.0.94:6443: connect: connection refused" node="localhost" Oct 2 19:05:03.854857 kubelet[1676]: E1002 19:05:03.854827 1676 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:03.855736 env[1139]: time="2023-10-02T19:05:03.855693533Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:4e76ba37cc0b818c76d46be0f5ef0a05,Namespace:kube-system,Attempt:0,}" Oct 2 19:05:03.861875 kubelet[1676]: E1002 19:05:03.861854 1676 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:03.862710 env[1139]: time="2023-10-02T19:05:03.862676286Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:6961ff1365464b1e2d286a48d6c5e40f,Namespace:kube-system,Attempt:0,}" Oct 2 19:05:03.875043 kubelet[1676]: E1002 19:05:03.875019 1676 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:03.875685 env[1139]: time="2023-10-02T19:05:03.875648920Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:b619222ebfcfd1a0c9478200f0921497,Namespace:kube-system,Attempt:0,}" Oct 2 19:05:04.008527 kubelet[1676]: E1002 19:05:04.008427 1676 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.94:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.94:6443: connect: connection refused" interval="800ms" Oct 2 19:05:04.115924 kubelet[1676]: I1002 19:05:04.115894 1676 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Oct 2 19:05:04.116230 kubelet[1676]: E1002 19:05:04.116215 1676 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.94:6443/api/v1/nodes\": dial tcp 10.0.0.94:6443: connect: connection refused" node="localhost" Oct 2 19:05:04.353780 kubelet[1676]: W1002 19:05:04.353642 1676 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.0.0.94:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.94:6443: connect: connection refused Oct 2 19:05:04.353780 kubelet[1676]: E1002 19:05:04.353705 1676 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.94:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.94:6443: connect: connection refused Oct 2 19:05:04.405376 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1956594971.mount: Deactivated successfully. Oct 2 19:05:04.411287 env[1139]: time="2023-10-02T19:05:04.409865302Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:04.411287 env[1139]: time="2023-10-02T19:05:04.410713545Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:04.416041 env[1139]: time="2023-10-02T19:05:04.411557627Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:04.416145 env[1139]: time="2023-10-02T19:05:04.416046519Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:04.419616 env[1139]: time="2023-10-02T19:05:04.419567390Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:04.422164 env[1139]: time="2023-10-02T19:05:04.422098518Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:04.424126 env[1139]: time="2023-10-02T19:05:04.424077325Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:04.428886 env[1139]: time="2023-10-02T19:05:04.428828215Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:04.430508 env[1139]: time="2023-10-02T19:05:04.430175450Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:04.431470 env[1139]: time="2023-10-02T19:05:04.431438434Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:04.433124 env[1139]: time="2023-10-02T19:05:04.433087193Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:04.441764 env[1139]: time="2023-10-02T19:05:04.441717326Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:04.482677 env[1139]: time="2023-10-02T19:05:04.482589540Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:05:04.482814 env[1139]: time="2023-10-02T19:05:04.482692595Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:05:04.482814 env[1139]: time="2023-10-02T19:05:04.482732841Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:05:04.482814 env[1139]: time="2023-10-02T19:05:04.482743802Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:05:04.482814 env[1139]: time="2023-10-02T19:05:04.482684033Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:05:04.482814 env[1139]: time="2023-10-02T19:05:04.482791289Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:05:04.482960 env[1139]: time="2023-10-02T19:05:04.482894224Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:05:04.482960 env[1139]: time="2023-10-02T19:05:04.482949312Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:05:04.483011 env[1139]: time="2023-10-02T19:05:04.482965314Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:05:04.483143 env[1139]: time="2023-10-02T19:05:04.483109615Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dcd0c6ae8a0fb9776bb7c3f6d51816a12b56e91d2744be26a9f9f150b9052a27 pid=1731 runtime=io.containerd.runc.v2 Oct 2 19:05:04.483143 env[1139]: time="2023-10-02T19:05:04.483096653Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bd07130fa6262c1cb9f7748714d5c8fea4d28c3d536878a07856cff74b770d43 pid=1733 runtime=io.containerd.runc.v2 Oct 2 19:05:04.483210 env[1139]: time="2023-10-02T19:05:04.483109575Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2bb19b7dfd640b61b9a15df24f32fdb9f227edbdb622116481ecb83ea056e540 pid=1734 runtime=io.containerd.runc.v2 Oct 2 19:05:04.498171 systemd[1]: Started cri-containerd-dcd0c6ae8a0fb9776bb7c3f6d51816a12b56e91d2744be26a9f9f150b9052a27.scope. Oct 2 19:05:04.508599 systemd[1]: Started cri-containerd-bd07130fa6262c1cb9f7748714d5c8fea4d28c3d536878a07856cff74b770d43.scope. Oct 2 19:05:04.519287 systemd[1]: Started cri-containerd-2bb19b7dfd640b61b9a15df24f32fdb9f227edbdb622116481ecb83ea056e540.scope. Oct 2 19:05:04.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.547000 audit: BPF prog-id=61 op=LOAD Oct 2 19:05:04.548000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.548000 audit[1762]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=1731 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:04.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463643063366165386130666239373736626237633366366435313831 Oct 2 19:05:04.548000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.548000 audit[1762]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1731 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:04.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463643063366165386130666239373736626237633366366435313831 Oct 2 19:05:04.548000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.548000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.548000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.548000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.548000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.548000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.548000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.548000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.548000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.548000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.548000 audit: BPF prog-id=62 op=LOAD Oct 2 19:05:04.548000 audit[1762]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1731 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:04.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463643063366165386130666239373736626237633366366435313831 Oct 2 19:05:04.548000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.548000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.548000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.548000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.548000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.548000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.548000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.548000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.548000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.548000 audit: BPF prog-id=63 op=LOAD Oct 2 19:05:04.548000 audit[1762]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1731 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:04.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463643063366165386130666239373736626237633366366435313831 Oct 2 19:05:04.548000 audit: BPF prog-id=63 op=UNLOAD Oct 2 19:05:04.548000 audit: BPF prog-id=62 op=UNLOAD Oct 2 19:05:04.548000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.548000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.548000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.548000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.548000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.548000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.548000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.548000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.548000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.548000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.548000 audit: BPF prog-id=64 op=LOAD Oct 2 19:05:04.548000 audit[1762]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1731 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:04.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463643063366165386130666239373736626237633366366435313831 Oct 2 19:05:04.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.551000 audit: BPF prog-id=65 op=LOAD Oct 2 19:05:04.552000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.552000 audit[1764]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=1734 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:04.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262623139623764666436343062363162396131356466323466333266 Oct 2 19:05:04.552000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.552000 audit[1764]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1734 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:04.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262623139623764666436343062363162396131356466323466333266 Oct 2 19:05:04.552000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.552000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.552000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.552000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.552000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.552000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.552000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.552000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.552000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.552000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.552000 audit: BPF prog-id=66 op=LOAD Oct 2 19:05:04.552000 audit[1764]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=1734 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:04.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262623139623764666436343062363162396131356466323466333266 Oct 2 19:05:04.552000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.552000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.552000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.552000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.552000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.552000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.552000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.552000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.552000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.552000 audit: BPF prog-id=67 op=LOAD Oct 2 19:05:04.552000 audit[1764]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=1734 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:04.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262623139623764666436343062363162396131356466323466333266 Oct 2 19:05:04.552000 audit: BPF prog-id=67 op=UNLOAD Oct 2 19:05:04.552000 audit: BPF prog-id=66 op=UNLOAD Oct 2 19:05:04.552000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.552000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.552000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.552000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.552000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.552000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.552000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.552000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.552000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.552000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.552000 audit: BPF prog-id=68 op=LOAD Oct 2 19:05:04.552000 audit[1764]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=1734 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:04.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262623139623764666436343062363162396131356466323466333266 Oct 2 19:05:04.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.557000 audit: BPF prog-id=69 op=LOAD Oct 2 19:05:04.557000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.557000 audit[1763]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000149b38 a2=10 a3=0 items=0 ppid=1733 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:04.557000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264303731333066613632363263316362396637373438373134643563 Oct 2 19:05:04.558000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.558000 audit[1763]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001495a0 a2=3c a3=0 items=0 ppid=1733 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:04.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264303731333066613632363263316362396637373438373134643563 Oct 2 19:05:04.558000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.558000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.558000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.558000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.558000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.558000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.558000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.558000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.558000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.558000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.558000 audit: BPF prog-id=70 op=LOAD Oct 2 19:05:04.558000 audit[1763]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001498e0 a2=78 a3=0 items=0 ppid=1733 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:04.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264303731333066613632363263316362396637373438373134643563 Oct 2 19:05:04.559000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.559000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.559000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.559000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.559000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.559000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.559000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.559000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.559000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.559000 audit: BPF prog-id=71 op=LOAD Oct 2 19:05:04.559000 audit[1763]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000149670 a2=78 a3=0 items=0 ppid=1733 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:04.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264303731333066613632363263316362396637373438373134643563 Oct 2 19:05:04.559000 audit: BPF prog-id=71 op=UNLOAD Oct 2 19:05:04.559000 audit: BPF prog-id=70 op=UNLOAD Oct 2 19:05:04.559000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.559000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.559000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.559000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.559000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.559000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.559000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.559000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.559000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.559000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.559000 audit: BPF prog-id=72 op=LOAD Oct 2 19:05:04.559000 audit[1763]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000149b40 a2=78 a3=0 items=0 ppid=1733 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:04.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264303731333066613632363263316362396637373438373134643563 Oct 2 19:05:04.564938 kubelet[1676]: W1002 19:05:04.564826 1676 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.0.0.94:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.94:6443: connect: connection refused Oct 2 19:05:04.564938 kubelet[1676]: E1002 19:05:04.564898 1676 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.94:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.94:6443: connect: connection refused Oct 2 19:05:04.582611 env[1139]: time="2023-10-02T19:05:04.582553852Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:4e76ba37cc0b818c76d46be0f5ef0a05,Namespace:kube-system,Attempt:0,} returns sandbox id \"dcd0c6ae8a0fb9776bb7c3f6d51816a12b56e91d2744be26a9f9f150b9052a27\"" Oct 2 19:05:04.585178 kubelet[1676]: E1002 19:05:04.585145 1676 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:04.589104 env[1139]: time="2023-10-02T19:05:04.588802560Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:b619222ebfcfd1a0c9478200f0921497,Namespace:kube-system,Attempt:0,} returns sandbox id \"2bb19b7dfd640b61b9a15df24f32fdb9f227edbdb622116481ecb83ea056e540\"" Oct 2 19:05:04.589104 env[1139]: time="2023-10-02T19:05:04.588859248Z" level=info msg="CreateContainer within sandbox \"dcd0c6ae8a0fb9776bb7c3f6d51816a12b56e91d2744be26a9f9f150b9052a27\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 2 19:05:04.590346 env[1139]: time="2023-10-02T19:05:04.590307058Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:6961ff1365464b1e2d286a48d6c5e40f,Namespace:kube-system,Attempt:0,} returns sandbox id \"bd07130fa6262c1cb9f7748714d5c8fea4d28c3d536878a07856cff74b770d43\"" Oct 2 19:05:04.590638 kubelet[1676]: E1002 19:05:04.590613 1676 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:04.592205 kubelet[1676]: E1002 19:05:04.592182 1676 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:04.592612 env[1139]: time="2023-10-02T19:05:04.592580148Z" level=info msg="CreateContainer within sandbox \"2bb19b7dfd640b61b9a15df24f32fdb9f227edbdb622116481ecb83ea056e540\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 2 19:05:04.594419 env[1139]: time="2023-10-02T19:05:04.594360046Z" level=info msg="CreateContainer within sandbox \"bd07130fa6262c1cb9f7748714d5c8fea4d28c3d536878a07856cff74b770d43\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 2 19:05:04.611681 env[1139]: time="2023-10-02T19:05:04.611555543Z" level=info msg="CreateContainer within sandbox \"dcd0c6ae8a0fb9776bb7c3f6d51816a12b56e91d2744be26a9f9f150b9052a27\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"b7ed2299207f038aa6ace8e6e1ddc16674594cd2f1d3c30687b3bd40345e2db6\"" Oct 2 19:05:04.614505 env[1139]: time="2023-10-02T19:05:04.614400196Z" level=info msg="StartContainer for \"b7ed2299207f038aa6ace8e6e1ddc16674594cd2f1d3c30687b3bd40345e2db6\"" Oct 2 19:05:04.619216 env[1139]: time="2023-10-02T19:05:04.619165128Z" level=info msg="CreateContainer within sandbox \"2bb19b7dfd640b61b9a15df24f32fdb9f227edbdb622116481ecb83ea056e540\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"1028e77ec859325f03c079703e8be9d2072fa1d69c83af6c0a58db7c003291ec\"" Oct 2 19:05:04.619871 env[1139]: time="2023-10-02T19:05:04.619841266Z" level=info msg="StartContainer for \"1028e77ec859325f03c079703e8be9d2072fa1d69c83af6c0a58db7c003291ec\"" Oct 2 19:05:04.624955 env[1139]: time="2023-10-02T19:05:04.624891719Z" level=info msg="CreateContainer within sandbox \"bd07130fa6262c1cb9f7748714d5c8fea4d28c3d536878a07856cff74b770d43\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"0e4a7c271d08d31c637ef800cbc67336237115403c28080924db73341eca80ba\"" Oct 2 19:05:04.625539 env[1139]: time="2023-10-02T19:05:04.625507688Z" level=info msg="StartContainer for \"0e4a7c271d08d31c637ef800cbc67336237115403c28080924db73341eca80ba\"" Oct 2 19:05:04.634258 systemd[1]: Started cri-containerd-b7ed2299207f038aa6ace8e6e1ddc16674594cd2f1d3c30687b3bd40345e2db6.scope. Oct 2 19:05:04.645342 systemd[1]: Started cri-containerd-1028e77ec859325f03c079703e8be9d2072fa1d69c83af6c0a58db7c003291ec.scope. Oct 2 19:05:04.669537 systemd[1]: Started cri-containerd-0e4a7c271d08d31c637ef800cbc67336237115403c28080924db73341eca80ba.scope. Oct 2 19:05:04.669863 kubelet[1676]: W1002 19:05:04.669041 1676 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.0.0.94:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.94:6443: connect: connection refused Oct 2 19:05:04.669863 kubelet[1676]: E1002 19:05:04.669697 1676 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.94:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.94:6443: connect: connection refused Oct 2 19:05:04.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.692000 audit: BPF prog-id=73 op=LOAD Oct 2 19:05:04.693000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.693000 audit[1876]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=1733 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:04.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065346137633237316430386433316336333765663830306362633637 Oct 2 19:05:04.693000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.693000 audit[1876]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=1733 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:04.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065346137633237316430386433316336333765663830306362633637 Oct 2 19:05:04.693000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.693000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.693000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.693000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.693000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.693000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.693000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.693000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.693000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.693000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.693000 audit: BPF prog-id=74 op=LOAD Oct 2 19:05:04.693000 audit[1876]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=1733 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:04.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065346137633237316430386433316336333765663830306362633637 Oct 2 19:05:04.694000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.694000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.694000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.694000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.694000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.694000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.694000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.694000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.694000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.694000 audit: BPF prog-id=76 op=LOAD Oct 2 19:05:04.694000 audit: BPF prog-id=75 op=LOAD Oct 2 19:05:04.694000 audit[1876]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=1733 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:04.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065346137633237316430386433316336333765663830306362633637 Oct 2 19:05:04.694000 audit: BPF prog-id=75 op=UNLOAD Oct 2 19:05:04.695000 audit: BPF prog-id=74 op=UNLOAD Oct 2 19:05:04.695000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.695000 audit[1857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=1734 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:04.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130323865373765633835393332356630336330373937303365386265 Oct 2 19:05:04.695000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.695000 audit[1857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=1734 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:04.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130323865373765633835393332356630336330373937303365386265 Oct 2 19:05:04.695000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.695000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.695000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.695000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.695000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.695000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.695000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.695000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.695000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.695000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.695000 audit: BPF prog-id=77 op=LOAD Oct 2 19:05:04.695000 audit[1857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=1734 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:04.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130323865373765633835393332356630336330373937303365386265 Oct 2 19:05:04.695000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.695000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.695000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.695000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.695000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.695000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.695000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.695000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.695000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.695000 audit: BPF prog-id=78 op=LOAD Oct 2 19:05:04.695000 audit[1857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=1734 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:04.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130323865373765633835393332356630336330373937303365386265 Oct 2 19:05:04.695000 audit: BPF prog-id=78 op=UNLOAD Oct 2 19:05:04.695000 audit: BPF prog-id=77 op=UNLOAD Oct 2 19:05:04.695000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.695000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.695000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.695000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.695000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.695000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.695000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.695000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.695000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.695000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.695000 audit: BPF prog-id=79 op=LOAD Oct 2 19:05:04.695000 audit[1857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=1734 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:04.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130323865373765633835393332356630336330373937303365386265 Oct 2 19:05:04.696000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.696000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.696000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.696000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.696000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.696000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.696000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.696000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.696000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.696000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.696000 audit: BPF prog-id=80 op=LOAD Oct 2 19:05:04.696000 audit[1876]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=1733 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:04.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065346137633237316430386433316336333765663830306362633637 Oct 2 19:05:04.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.698000 audit: BPF prog-id=81 op=LOAD Oct 2 19:05:04.699000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.699000 audit[1847]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=1731 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:04.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237656432323939323037663033386161366163653865366531646463 Oct 2 19:05:04.699000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.699000 audit[1847]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=1731 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:04.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237656432323939323037663033386161366163653865366531646463 Oct 2 19:05:04.699000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.699000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.699000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.699000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.699000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.699000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.699000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.699000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.699000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.699000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.699000 audit: BPF prog-id=82 op=LOAD Oct 2 19:05:04.699000 audit[1847]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=1731 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:04.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237656432323939323037663033386161366163653865366531646463 Oct 2 19:05:04.699000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.699000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.699000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.699000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.699000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.699000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.699000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.699000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.699000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.699000 audit: BPF prog-id=83 op=LOAD Oct 2 19:05:04.699000 audit[1847]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=1731 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:04.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237656432323939323037663033386161366163653865366531646463 Oct 2 19:05:04.699000 audit: BPF prog-id=83 op=UNLOAD Oct 2 19:05:04.699000 audit: BPF prog-id=82 op=UNLOAD Oct 2 19:05:04.699000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.699000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.699000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.699000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.699000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.699000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.699000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.699000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.699000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.699000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:04.699000 audit: BPF prog-id=84 op=LOAD Oct 2 19:05:04.699000 audit[1847]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=1731 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:04.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237656432323939323037663033386161366163653865366531646463 Oct 2 19:05:04.722787 kubelet[1676]: W1002 19:05:04.722685 1676 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.0.0.94:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.94:6443: connect: connection refused Oct 2 19:05:04.722787 kubelet[1676]: E1002 19:05:04.722753 1676 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.94:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.94:6443: connect: connection refused Oct 2 19:05:04.740789 env[1139]: time="2023-10-02T19:05:04.740703332Z" level=info msg="StartContainer for \"1028e77ec859325f03c079703e8be9d2072fa1d69c83af6c0a58db7c003291ec\" returns successfully" Oct 2 19:05:04.749999 env[1139]: time="2023-10-02T19:05:04.749906188Z" level=info msg="StartContainer for \"0e4a7c271d08d31c637ef800cbc67336237115403c28080924db73341eca80ba\" returns successfully" Oct 2 19:05:04.756328 env[1139]: time="2023-10-02T19:05:04.752729118Z" level=info msg="StartContainer for \"b7ed2299207f038aa6ace8e6e1ddc16674594cd2f1d3c30687b3bd40345e2db6\" returns successfully" Oct 2 19:05:04.816101 kubelet[1676]: E1002 19:05:04.809064 1676 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.94:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.94:6443: connect: connection refused" interval="1.6s" Oct 2 19:05:04.922200 kubelet[1676]: I1002 19:05:04.918437 1676 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Oct 2 19:05:04.922200 kubelet[1676]: E1002 19:05:04.918771 1676 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.94:6443/api/v1/nodes\": dial tcp 10.0.0.94:6443: connect: connection refused" node="localhost" Oct 2 19:05:05.435019 kubelet[1676]: E1002 19:05:05.434986 1676 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:05.437576 kubelet[1676]: E1002 19:05:05.437551 1676 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:05.440076 kubelet[1676]: E1002 19:05:05.440053 1676 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:06.441541 kubelet[1676]: E1002 19:05:06.441483 1676 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:06.520556 kubelet[1676]: I1002 19:05:06.520526 1676 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Oct 2 19:05:06.632000 audit[1900]: AVC avc: denied { watch } for pid=1900 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=4779 scontext=system_u:system_r:svirt_lxc_net_t:s0:c764,c983 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:05:06.632000 audit[1900]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000075710 a2=fc6 a3=0 items=0 ppid=1733 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c764,c983 key=(null) Oct 2 19:05:06.632000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:05:06.632000 audit[1900]: AVC avc: denied { watch } for pid=1900 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=4767 scontext=system_u:system_r:svirt_lxc_net_t:s0:c764,c983 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:05:06.632000 audit[1900]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40011b8040 a2=fc6 a3=0 items=0 ppid=1733 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c764,c983 key=(null) Oct 2 19:05:06.632000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:05:07.210000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=4779 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:05:07.210000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=4767 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:05:07.210000 audit[1875]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=3f a1=400645e020 a2=fc6 a3=0 items=0 ppid=1731 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c953 key=(null) Oct 2 19:05:07.210000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3934002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Oct 2 19:05:07.210000 audit[1875]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=3e a1=4000f53650 a2=fc6 a3=0 items=0 ppid=1731 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c953 key=(null) Oct 2 19:05:07.210000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3934002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Oct 2 19:05:07.211000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=4774 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:05:07.211000 audit[1875]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=3e a1=4000f538c0 a2=fc6 a3=0 items=0 ppid=1731 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c953 key=(null) Oct 2 19:05:07.211000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3934002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Oct 2 19:05:07.219000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=4781 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:05:07.219000 audit[1875]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4d a1=4001211140 a2=fc6 a3=0 items=0 ppid=1731 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c953 key=(null) Oct 2 19:05:07.219000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3934002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Oct 2 19:05:07.225000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=4767 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:05:07.225000 audit[1875]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=65 a1=40043ba1c0 a2=fc6 a3=0 items=0 ppid=1731 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c953 key=(null) Oct 2 19:05:07.225000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3934002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Oct 2 19:05:07.225000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=4779 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:05:07.225000 audit[1875]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=65 a1=4002aaebd0 a2=fc6 a3=0 items=0 ppid=1731 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c953 key=(null) Oct 2 19:05:07.225000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3934002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Oct 2 19:05:07.293704 kubelet[1676]: E1002 19:05:07.293667 1676 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Oct 2 19:05:07.345784 kubelet[1676]: I1002 19:05:07.345642 1676 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Oct 2 19:05:07.399525 kubelet[1676]: I1002 19:05:07.399208 1676 apiserver.go:52] "Watching apiserver" Oct 2 19:05:07.406830 kubelet[1676]: I1002 19:05:07.406796 1676 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Oct 2 19:05:08.832446 kubelet[1676]: E1002 19:05:08.832391 1676 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:09.444742 kubelet[1676]: E1002 19:05:09.444713 1676 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:09.796247 kubelet[1676]: E1002 19:05:09.796215 1676 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:09.994906 systemd[1]: Reloading. Oct 2 19:05:10.065866 /usr/lib/systemd/system-generators/torcx-generator[1972]: time="2023-10-02T19:05:10Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:05:10.065892 /usr/lib/systemd/system-generators/torcx-generator[1972]: time="2023-10-02T19:05:10Z" level=info msg="torcx already run" Oct 2 19:05:10.131183 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:05:10.131378 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:05:10.146883 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:05:10.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.206475 kernel: kauditd_printk_skb: 593 callbacks suppressed Oct 2 19:05:10.206529 kernel: audit: type=1400 audit(1696273510.205:679): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.209980 kernel: audit: type=1400 audit(1696273510.205:680): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.212935 kernel: audit: type=1400 audit(1696273510.205:681): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.214801 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:05:10.214856 kernel: audit: audit_lost=8 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 19:05:10.214876 kernel: audit: backlog limit exceeded Oct 2 19:05:10.214900 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:05:10.215713 kernel: audit: audit_lost=9 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 19:05:10.215770 kernel: audit: type=1400 audit(1696273510.205:682): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.217376 kernel: audit: backlog limit exceeded Oct 2 19:05:10.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.205000 audit: BPF prog-id=85 op=LOAD Oct 2 19:05:10.205000 audit: BPF prog-id=46 op=UNLOAD Oct 2 19:05:10.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.207000 audit: BPF prog-id=86 op=LOAD Oct 2 19:05:10.207000 audit: BPF prog-id=47 op=UNLOAD Oct 2 19:05:10.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.209000 audit: BPF prog-id=87 op=LOAD Oct 2 19:05:10.209000 audit: BPF prog-id=81 op=UNLOAD Oct 2 19:05:10.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.210000 audit: BPF prog-id=88 op=LOAD Oct 2 19:05:10.210000 audit: BPF prog-id=48 op=UNLOAD Oct 2 19:05:10.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.210000 audit: BPF prog-id=89 op=LOAD Oct 2 19:05:10.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.212000 audit: BPF prog-id=90 op=LOAD Oct 2 19:05:10.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.217000 audit: BPF prog-id=91 op=LOAD Oct 2 19:05:10.217000 audit: BPF prog-id=76 op=UNLOAD Oct 2 19:05:10.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.218000 audit: BPF prog-id=92 op=LOAD Oct 2 19:05:10.218000 audit: BPF prog-id=73 op=UNLOAD Oct 2 19:05:10.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.220000 audit: BPF prog-id=93 op=LOAD Oct 2 19:05:10.220000 audit: BPF prog-id=51 op=UNLOAD Oct 2 19:05:10.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.221000 audit: BPF prog-id=94 op=LOAD Oct 2 19:05:10.221000 audit: BPF prog-id=69 op=UNLOAD Oct 2 19:05:10.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.222000 audit: BPF prog-id=95 op=LOAD Oct 2 19:05:10.222000 audit: BPF prog-id=52 op=UNLOAD Oct 2 19:05:10.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit: BPF prog-id=96 op=LOAD Oct 2 19:05:10.223000 audit: BPF prog-id=61 op=UNLOAD Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit: BPF prog-id=97 op=LOAD Oct 2 19:05:10.223000 audit: BPF prog-id=53 op=UNLOAD Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit: BPF prog-id=98 op=LOAD Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit: BPF prog-id=99 op=LOAD Oct 2 19:05:10.223000 audit: BPF prog-id=54 op=UNLOAD Oct 2 19:05:10.223000 audit: BPF prog-id=55 op=UNLOAD Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.224000 audit: BPF prog-id=100 op=LOAD Oct 2 19:05:10.224000 audit: BPF prog-id=65 op=UNLOAD Oct 2 19:05:10.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit: BPF prog-id=101 op=LOAD Oct 2 19:05:10.225000 audit: BPF prog-id=56 op=UNLOAD Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit: BPF prog-id=102 op=LOAD Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit: BPF prog-id=103 op=LOAD Oct 2 19:05:10.225000 audit: BPF prog-id=57 op=UNLOAD Oct 2 19:05:10.225000 audit: BPF prog-id=58 op=UNLOAD Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit: BPF prog-id=104 op=LOAD Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.225000 audit: BPF prog-id=105 op=LOAD Oct 2 19:05:10.225000 audit: BPF prog-id=59 op=UNLOAD Oct 2 19:05:10.225000 audit: BPF prog-id=60 op=UNLOAD Oct 2 19:05:10.236259 kubelet[1676]: I1002 19:05:10.236236 1676 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:05:10.236441 systemd[1]: Stopping kubelet.service... Oct 2 19:05:10.258855 systemd[1]: kubelet.service: Deactivated successfully. Oct 2 19:05:10.259066 systemd[1]: Stopped kubelet.service. Oct 2 19:05:10.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:10.260834 systemd[1]: Started kubelet.service. Oct 2 19:05:10.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:10.333842 kubelet[2007]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:05:10.333842 kubelet[2007]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 19:05:10.333842 kubelet[2007]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:05:10.333842 kubelet[2007]: I1002 19:05:10.328360 2007 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:05:10.339180 kubelet[2007]: I1002 19:05:10.339152 2007 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Oct 2 19:05:10.339301 kubelet[2007]: I1002 19:05:10.339290 2007 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:05:10.339559 kubelet[2007]: I1002 19:05:10.339540 2007 server.go:895] "Client rotation is on, will bootstrap in background" Oct 2 19:05:10.341409 kubelet[2007]: I1002 19:05:10.341387 2007 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Oct 2 19:05:10.342747 kubelet[2007]: I1002 19:05:10.342713 2007 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:05:10.355734 kubelet[2007]: W1002 19:05:10.353465 2007 machine.go:65] Cannot read vendor id correctly, set empty. Oct 2 19:05:10.355734 kubelet[2007]: I1002 19:05:10.354362 2007 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:05:10.355734 kubelet[2007]: I1002 19:05:10.354595 2007 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:05:10.355734 kubelet[2007]: I1002 19:05:10.354749 2007 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Oct 2 19:05:10.355734 kubelet[2007]: I1002 19:05:10.354775 2007 topology_manager.go:138] "Creating topology manager with none policy" Oct 2 19:05:10.355734 kubelet[2007]: I1002 19:05:10.354783 2007 container_manager_linux.go:301] "Creating device plugin manager" Oct 2 19:05:10.357000 audit[2007]: AVC avc: denied { mac_admin } for pid=2007 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.357000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:05:10.357000 audit[2007]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40003f6f60 a1=40009c8210 a2=40003f6f30 a3=25 items=0 ppid=1 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:10.357000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:05:10.357000 audit[2007]: AVC avc: denied { mac_admin } for pid=2007 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.357000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:05:10.357000 audit[2007]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400021f9a0 a1=40009c8228 a2=40003f6ff0 a3=25 items=0 ppid=1 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:10.357000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:05:10.358806 kubelet[2007]: I1002 19:05:10.354817 2007 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:05:10.358806 kubelet[2007]: I1002 19:05:10.354926 2007 kubelet.go:393] "Attempting to sync node with API server" Oct 2 19:05:10.358806 kubelet[2007]: I1002 19:05:10.354938 2007 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:05:10.358806 kubelet[2007]: I1002 19:05:10.354970 2007 kubelet.go:309] "Adding apiserver pod source" Oct 2 19:05:10.358806 kubelet[2007]: I1002 19:05:10.354992 2007 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:05:10.358806 kubelet[2007]: I1002 19:05:10.356110 2007 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:05:10.358806 kubelet[2007]: I1002 19:05:10.356711 2007 server.go:1232] "Started kubelet" Oct 2 19:05:10.358806 kubelet[2007]: I1002 19:05:10.357258 2007 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:05:10.358806 kubelet[2007]: I1002 19:05:10.357876 2007 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:05:10.358806 kubelet[2007]: I1002 19:05:10.357908 2007 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:05:10.358806 kubelet[2007]: I1002 19:05:10.357926 2007 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:05:10.358806 kubelet[2007]: I1002 19:05:10.358209 2007 server.go:462] "Adding debug handlers to kubelet server" Oct 2 19:05:10.359430 kubelet[2007]: I1002 19:05:10.359392 2007 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 19:05:10.359684 kubelet[2007]: I1002 19:05:10.359658 2007 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 2 19:05:10.360524 kubelet[2007]: I1002 19:05:10.360505 2007 volume_manager.go:291] "Starting Kubelet Volume Manager" Oct 2 19:05:10.360827 kubelet[2007]: I1002 19:05:10.360805 2007 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Oct 2 19:05:10.361029 kubelet[2007]: I1002 19:05:10.361015 2007 reconciler_new.go:29] "Reconciler: start to sync state" Oct 2 19:05:10.361127 kubelet[2007]: E1002 19:05:10.361115 2007 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 2 19:05:10.380480 kubelet[2007]: E1002 19:05:10.379168 2007 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:05:10.380480 kubelet[2007]: E1002 19:05:10.379207 2007 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:05:10.402289 kubelet[2007]: I1002 19:05:10.402261 2007 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Oct 2 19:05:10.404602 kubelet[2007]: I1002 19:05:10.404571 2007 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Oct 2 19:05:10.404711 kubelet[2007]: I1002 19:05:10.404617 2007 status_manager.go:217] "Starting to sync pod status with apiserver" Oct 2 19:05:10.404711 kubelet[2007]: I1002 19:05:10.404635 2007 kubelet.go:2303] "Starting kubelet main sync loop" Oct 2 19:05:10.404711 kubelet[2007]: E1002 19:05:10.404702 2007 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 19:05:10.437788 kubelet[2007]: I1002 19:05:10.437750 2007 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:05:10.437788 kubelet[2007]: I1002 19:05:10.437776 2007 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:05:10.437788 kubelet[2007]: I1002 19:05:10.437795 2007 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:05:10.438037 kubelet[2007]: I1002 19:05:10.437975 2007 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 2 19:05:10.438037 kubelet[2007]: I1002 19:05:10.437997 2007 state_mem.go:96] "Updated CPUSet assignments" assignments={} Oct 2 19:05:10.438037 kubelet[2007]: I1002 19:05:10.438003 2007 policy_none.go:49] "None policy: Start" Oct 2 19:05:10.438668 kubelet[2007]: I1002 19:05:10.438650 2007 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:05:10.438729 kubelet[2007]: I1002 19:05:10.438674 2007 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:05:10.438819 kubelet[2007]: I1002 19:05:10.438806 2007 state_mem.go:75] "Updated machine memory state" Oct 2 19:05:10.442599 kubelet[2007]: I1002 19:05:10.442573 2007 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:05:10.442000 audit[2007]: AVC avc: denied { mac_admin } for pid=2007 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:10.442000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:05:10.442000 audit[2007]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40013d81b0 a1=40013e03d8 a2=40013d8180 a3=25 items=0 ppid=1 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:10.442000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:05:10.442832 kubelet[2007]: I1002 19:05:10.442643 2007 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:05:10.442862 kubelet[2007]: I1002 19:05:10.442833 2007 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:05:10.464796 kubelet[2007]: I1002 19:05:10.464764 2007 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Oct 2 19:05:10.473138 kubelet[2007]: I1002 19:05:10.473109 2007 kubelet_node_status.go:108] "Node was previously registered" node="localhost" Oct 2 19:05:10.473323 kubelet[2007]: I1002 19:05:10.473304 2007 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Oct 2 19:05:10.505338 kubelet[2007]: I1002 19:05:10.505294 2007 topology_manager.go:215] "Topology Admit Handler" podUID="6961ff1365464b1e2d286a48d6c5e40f" podNamespace="kube-system" podName="kube-controller-manager-localhost" Oct 2 19:05:10.505479 kubelet[2007]: I1002 19:05:10.505456 2007 topology_manager.go:215] "Topology Admit Handler" podUID="b619222ebfcfd1a0c9478200f0921497" podNamespace="kube-system" podName="kube-scheduler-localhost" Oct 2 19:05:10.507658 kubelet[2007]: I1002 19:05:10.505494 2007 topology_manager.go:215] "Topology Admit Handler" podUID="4e76ba37cc0b818c76d46be0f5ef0a05" podNamespace="kube-system" podName="kube-apiserver-localhost" Oct 2 19:05:10.511932 kubelet[2007]: E1002 19:05:10.511906 2007 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" Oct 2 19:05:10.514842 kubelet[2007]: E1002 19:05:10.514819 2007 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Oct 2 19:05:10.662787 kubelet[2007]: I1002 19:05:10.662671 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6961ff1365464b1e2d286a48d6c5e40f-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"6961ff1365464b1e2d286a48d6c5e40f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:05:10.662787 kubelet[2007]: I1002 19:05:10.662727 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4e76ba37cc0b818c76d46be0f5ef0a05-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"4e76ba37cc0b818c76d46be0f5ef0a05\") " pod="kube-system/kube-apiserver-localhost" Oct 2 19:05:10.662787 kubelet[2007]: I1002 19:05:10.662761 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6961ff1365464b1e2d286a48d6c5e40f-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"6961ff1365464b1e2d286a48d6c5e40f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:05:10.662787 kubelet[2007]: I1002 19:05:10.662793 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/6961ff1365464b1e2d286a48d6c5e40f-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"6961ff1365464b1e2d286a48d6c5e40f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:05:10.662983 kubelet[2007]: I1002 19:05:10.662813 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6961ff1365464b1e2d286a48d6c5e40f-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"6961ff1365464b1e2d286a48d6c5e40f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:05:10.662983 kubelet[2007]: I1002 19:05:10.662833 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b619222ebfcfd1a0c9478200f0921497-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"b619222ebfcfd1a0c9478200f0921497\") " pod="kube-system/kube-scheduler-localhost" Oct 2 19:05:10.662983 kubelet[2007]: I1002 19:05:10.662866 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4e76ba37cc0b818c76d46be0f5ef0a05-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"4e76ba37cc0b818c76d46be0f5ef0a05\") " pod="kube-system/kube-apiserver-localhost" Oct 2 19:05:10.662983 kubelet[2007]: I1002 19:05:10.662886 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4e76ba37cc0b818c76d46be0f5ef0a05-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"4e76ba37cc0b818c76d46be0f5ef0a05\") " pod="kube-system/kube-apiserver-localhost" Oct 2 19:05:10.662983 kubelet[2007]: I1002 19:05:10.662948 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6961ff1365464b1e2d286a48d6c5e40f-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"6961ff1365464b1e2d286a48d6c5e40f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:05:10.813400 kubelet[2007]: E1002 19:05:10.813357 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:10.813944 kubelet[2007]: E1002 19:05:10.813915 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:10.815800 kubelet[2007]: E1002 19:05:10.815779 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:10.886000 audit[1900]: AVC avc: denied { watch } for pid=1900 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=4767 scontext=system_u:system_r:svirt_lxc_net_t:s0:c764,c983 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:05:10.886000 audit[1900]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001042420 a2=fc6 a3=0 items=0 ppid=1733 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c764,c983 key=(null) Oct 2 19:05:10.886000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:05:10.887000 audit[1900]: AVC avc: denied { watch } for pid=1900 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=4767 scontext=system_u:system_r:svirt_lxc_net_t:s0:c764,c983 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:05:10.887000 audit[1900]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001042560 a2=fc6 a3=0 items=0 ppid=1733 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c764,c983 key=(null) Oct 2 19:05:10.887000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:05:10.889000 audit[1900]: AVC avc: denied { watch } for pid=1900 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=4767 scontext=system_u:system_r:svirt_lxc_net_t:s0:c764,c983 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:05:10.889000 audit[1900]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40010be140 a2=fc6 a3=0 items=0 ppid=1733 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c764,c983 key=(null) Oct 2 19:05:10.889000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:05:10.889000 audit[1900]: AVC avc: denied { watch } for pid=1900 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=4767 scontext=system_u:system_r:svirt_lxc_net_t:s0:c764,c983 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:05:10.889000 audit[1900]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e0f7e0 a2=fc6 a3=0 items=0 ppid=1733 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c764,c983 key=(null) Oct 2 19:05:10.889000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:05:10.897000 audit[1900]: AVC avc: denied { watch } for pid=1900 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=32581 scontext=system_u:system_r:svirt_lxc_net_t:s0:c764,c983 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 19:05:10.897000 audit[1900]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000525880 a2=fc6 a3=0 items=0 ppid=1733 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c764,c983 key=(null) Oct 2 19:05:10.897000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:05:11.356084 kubelet[2007]: I1002 19:05:11.356047 2007 apiserver.go:52] "Watching apiserver" Oct 2 19:05:11.361331 kubelet[2007]: I1002 19:05:11.361295 2007 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Oct 2 19:05:11.416970 kubelet[2007]: E1002 19:05:11.415483 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:11.428111 kubelet[2007]: E1002 19:05:11.428084 2007 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" Oct 2 19:05:11.428604 kubelet[2007]: E1002 19:05:11.428587 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:11.429203 kubelet[2007]: E1002 19:05:11.429186 2007 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Oct 2 19:05:11.429800 kubelet[2007]: E1002 19:05:11.429776 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:11.469845 kubelet[2007]: I1002 19:05:11.469796 2007 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=2.4695950079999998 podCreationTimestamp="2023-10-02 19:05:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:05:11.459695792 +0000 UTC m=+1.192156674" watchObservedRunningTime="2023-10-02 19:05:11.469595008 +0000 UTC m=+1.202055930" Oct 2 19:05:11.492751 kubelet[2007]: I1002 19:05:11.492720 2007 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=3.492663963 podCreationTimestamp="2023-10-02 19:05:08 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:05:11.4701179 +0000 UTC m=+1.202578782" watchObservedRunningTime="2023-10-02 19:05:11.492663963 +0000 UTC m=+1.225124885" Oct 2 19:05:11.493007 kubelet[2007]: I1002 19:05:11.492992 2007 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.492972594 podCreationTimestamp="2023-10-02 19:05:10 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:05:11.491802318 +0000 UTC m=+1.224263200" watchObservedRunningTime="2023-10-02 19:05:11.492972594 +0000 UTC m=+1.225433516" Oct 2 19:05:12.416852 kubelet[2007]: E1002 19:05:12.416809 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:12.417195 kubelet[2007]: E1002 19:05:12.417170 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:13.419060 kubelet[2007]: E1002 19:05:13.419027 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:13.420648 kubelet[2007]: E1002 19:05:13.419099 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:14.744757 kubelet[2007]: E1002 19:05:14.744728 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:14.989179 update_engine[1126]: I1002 19:05:14.988826 1126 update_attempter.cc:505] Updating boot flags... Oct 2 19:05:15.056002 sudo[1266]: pam_unix(sudo:session): session closed for user root Oct 2 19:05:15.054000 audit[1266]: USER_END pid=1266 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:05:15.054000 audit[1266]: CRED_DISP pid=1266 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:05:15.057471 sshd[1262]: pam_unix(sshd:session): session closed for user core Oct 2 19:05:15.059000 audit[1262]: USER_END pid=1262 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:05:15.059000 audit[1262]: CRED_DISP pid=1262 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:05:15.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.94:22-10.0.0.1:39570 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:15.062398 systemd[1]: sshd@6-10.0.0.94:22-10.0.0.1:39570.service: Deactivated successfully. Oct 2 19:05:15.063447 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 19:05:15.063676 systemd[1]: session-7.scope: Consumed 6.004s CPU time. Oct 2 19:05:15.066680 systemd-logind[1123]: Session 7 logged out. Waiting for processes to exit. Oct 2 19:05:15.070943 systemd-logind[1123]: Removed session 7. Oct 2 19:05:15.422598 kubelet[2007]: E1002 19:05:15.421699 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:21.464461 kubelet[2007]: E1002 19:05:21.464354 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:23.349259 kubelet[2007]: E1002 19:05:23.349221 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:23.917376 kubelet[2007]: I1002 19:05:23.917233 2007 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Oct 2 19:05:23.917735 env[1139]: time="2023-10-02T19:05:23.917691764Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 19:05:23.918249 kubelet[2007]: I1002 19:05:23.917871 2007 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Oct 2 19:05:24.011387 kubelet[2007]: I1002 19:05:24.011239 2007 topology_manager.go:215] "Topology Admit Handler" podUID="ef7aa138-6241-4c62-b7f7-9c0a4b9321ce" podNamespace="kube-system" podName="kube-proxy-8qr5v" Oct 2 19:05:24.017051 systemd[1]: Created slice kubepods-besteffort-podef7aa138_6241_4c62_b7f7_9c0a4b9321ce.slice. Oct 2 19:05:24.065712 kubelet[2007]: I1002 19:05:24.065661 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ef7aa138-6241-4c62-b7f7-9c0a4b9321ce-xtables-lock\") pod \"kube-proxy-8qr5v\" (UID: \"ef7aa138-6241-4c62-b7f7-9c0a4b9321ce\") " pod="kube-system/kube-proxy-8qr5v" Oct 2 19:05:24.065712 kubelet[2007]: I1002 19:05:24.065712 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/ef7aa138-6241-4c62-b7f7-9c0a4b9321ce-kube-proxy\") pod \"kube-proxy-8qr5v\" (UID: \"ef7aa138-6241-4c62-b7f7-9c0a4b9321ce\") " pod="kube-system/kube-proxy-8qr5v" Oct 2 19:05:24.065712 kubelet[2007]: I1002 19:05:24.065734 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ef7aa138-6241-4c62-b7f7-9c0a4b9321ce-lib-modules\") pod \"kube-proxy-8qr5v\" (UID: \"ef7aa138-6241-4c62-b7f7-9c0a4b9321ce\") " pod="kube-system/kube-proxy-8qr5v" Oct 2 19:05:24.065931 kubelet[2007]: I1002 19:05:24.065757 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ttf8d\" (UniqueName: \"kubernetes.io/projected/ef7aa138-6241-4c62-b7f7-9c0a4b9321ce-kube-api-access-ttf8d\") pod \"kube-proxy-8qr5v\" (UID: \"ef7aa138-6241-4c62-b7f7-9c0a4b9321ce\") " pod="kube-system/kube-proxy-8qr5v" Oct 2 19:05:24.174536 kubelet[2007]: E1002 19:05:24.174447 2007 projected.go:292] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found Oct 2 19:05:24.174536 kubelet[2007]: E1002 19:05:24.174485 2007 projected.go:198] Error preparing data for projected volume kube-api-access-ttf8d for pod kube-system/kube-proxy-8qr5v: configmap "kube-root-ca.crt" not found Oct 2 19:05:24.174536 kubelet[2007]: E1002 19:05:24.174538 2007 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/ef7aa138-6241-4c62-b7f7-9c0a4b9321ce-kube-api-access-ttf8d podName:ef7aa138-6241-4c62-b7f7-9c0a4b9321ce nodeName:}" failed. No retries permitted until 2023-10-02 19:05:24.674518996 +0000 UTC m=+14.406979918 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-ttf8d" (UniqueName: "kubernetes.io/projected/ef7aa138-6241-4c62-b7f7-9c0a4b9321ce-kube-api-access-ttf8d") pod "kube-proxy-8qr5v" (UID: "ef7aa138-6241-4c62-b7f7-9c0a4b9321ce") : configmap "kube-root-ca.crt" not found Oct 2 19:05:24.746755 kubelet[2007]: I1002 19:05:24.744314 2007 topology_manager.go:215] "Topology Admit Handler" podUID="0ddf427c-7baf-4a1e-8e72-80d2c8664c54" podNamespace="tigera-operator" podName="tigera-operator-8547bd6cc6-vqvhs" Oct 2 19:05:24.751555 systemd[1]: Created slice kubepods-besteffort-pod0ddf427c_7baf_4a1e_8e72_80d2c8664c54.slice. Oct 2 19:05:24.770680 kubelet[2007]: I1002 19:05:24.770636 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/0ddf427c-7baf-4a1e-8e72-80d2c8664c54-var-lib-calico\") pod \"tigera-operator-8547bd6cc6-vqvhs\" (UID: \"0ddf427c-7baf-4a1e-8e72-80d2c8664c54\") " pod="tigera-operator/tigera-operator-8547bd6cc6-vqvhs" Oct 2 19:05:24.770811 kubelet[2007]: I1002 19:05:24.770706 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mm9j8\" (UniqueName: \"kubernetes.io/projected/0ddf427c-7baf-4a1e-8e72-80d2c8664c54-kube-api-access-mm9j8\") pod \"tigera-operator-8547bd6cc6-vqvhs\" (UID: \"0ddf427c-7baf-4a1e-8e72-80d2c8664c54\") " pod="tigera-operator/tigera-operator-8547bd6cc6-vqvhs" Oct 2 19:05:24.923931 kubelet[2007]: E1002 19:05:24.923882 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:24.925152 env[1139]: time="2023-10-02T19:05:24.924762008Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-8qr5v,Uid:ef7aa138-6241-4c62-b7f7-9c0a4b9321ce,Namespace:kube-system,Attempt:0,}" Oct 2 19:05:24.937499 env[1139]: time="2023-10-02T19:05:24.937427551Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:05:24.937499 env[1139]: time="2023-10-02T19:05:24.937468793Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:05:24.937499 env[1139]: time="2023-10-02T19:05:24.937478953Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:05:24.937686 env[1139]: time="2023-10-02T19:05:24.937633401Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/555e2e9e5005230f168f3441aba420a2c64a2bbd699a7a6632877a59969c5c95 pid=2120 runtime=io.containerd.runc.v2 Oct 2 19:05:24.957512 systemd[1]: Started cri-containerd-555e2e9e5005230f168f3441aba420a2c64a2bbd699a7a6632877a59969c5c95.scope. Oct 2 19:05:24.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.981663 kernel: kauditd_printk_skb: 272 callbacks suppressed Oct 2 19:05:24.981719 kernel: audit: type=1400 audit(1696273524.980:936): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.984936 kernel: audit: type=1400 audit(1696273524.980:937): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.984992 kernel: audit: type=1400 audit(1696273524.980:938): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.988178 kernel: audit: type=1400 audit(1696273524.980:939): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.988232 kernel: audit: type=1400 audit(1696273524.980:940): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.991534 kernel: audit: type=1400 audit(1696273524.980:941): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.991598 kernel: audit: type=1400 audit(1696273524.980:942): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.994972 kernel: audit: type=1400 audit(1696273524.980:943): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.995032 kernel: audit: type=1400 audit(1696273524.980:944): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.999057 kernel: audit: type=1400 audit(1696273524.981:945): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.981000 audit: BPF prog-id=106 op=LOAD Oct 2 19:05:24.981000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.981000 audit[2130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=2120 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:24.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535356532653965353030353233306631363866333434316162613432 Oct 2 19:05:24.981000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.981000 audit[2130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2120 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:24.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535356532653965353030353233306631363866333434316162613432 Oct 2 19:05:24.981000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.981000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.981000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.981000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.981000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.981000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.981000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.981000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.981000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.981000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.981000 audit: BPF prog-id=107 op=LOAD Oct 2 19:05:24.981000 audit[2130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=2120 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:24.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535356532653965353030353233306631363866333434316162613432 Oct 2 19:05:24.982000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.982000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.982000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.982000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.982000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.982000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.982000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.982000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.982000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.982000 audit: BPF prog-id=108 op=LOAD Oct 2 19:05:24.982000 audit[2130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=2120 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:24.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535356532653965353030353233306631363866333434316162613432 Oct 2 19:05:24.984000 audit: BPF prog-id=108 op=UNLOAD Oct 2 19:05:24.984000 audit: BPF prog-id=107 op=UNLOAD Oct 2 19:05:24.984000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.984000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.984000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.984000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.984000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.984000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.984000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.984000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.984000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.984000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:24.984000 audit: BPF prog-id=109 op=LOAD Oct 2 19:05:24.984000 audit[2130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=2120 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:24.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535356532653965353030353233306631363866333434316162613432 Oct 2 19:05:25.006931 env[1139]: time="2023-10-02T19:05:25.006883770Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-8qr5v,Uid:ef7aa138-6241-4c62-b7f7-9c0a4b9321ce,Namespace:kube-system,Attempt:0,} returns sandbox id \"555e2e9e5005230f168f3441aba420a2c64a2bbd699a7a6632877a59969c5c95\"" Oct 2 19:05:25.007706 kubelet[2007]: E1002 19:05:25.007682 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:25.010752 env[1139]: time="2023-10-02T19:05:25.010708962Z" level=info msg="CreateContainer within sandbox \"555e2e9e5005230f168f3441aba420a2c64a2bbd699a7a6632877a59969c5c95\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 19:05:25.023540 env[1139]: time="2023-10-02T19:05:25.023480362Z" level=info msg="CreateContainer within sandbox \"555e2e9e5005230f168f3441aba420a2c64a2bbd699a7a6632877a59969c5c95\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"4270d2eabcc5150b2da54e3cf0ee1defaf259b8407cee75c297e4c213cdb5477\"" Oct 2 19:05:25.024072 env[1139]: time="2023-10-02T19:05:25.024019429Z" level=info msg="StartContainer for \"4270d2eabcc5150b2da54e3cf0ee1defaf259b8407cee75c297e4c213cdb5477\"" Oct 2 19:05:25.042683 systemd[1]: Started cri-containerd-4270d2eabcc5150b2da54e3cf0ee1defaf259b8407cee75c297e4c213cdb5477.scope. Oct 2 19:05:25.058892 env[1139]: time="2023-10-02T19:05:25.057279896Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-8547bd6cc6-vqvhs,Uid:0ddf427c-7baf-4a1e-8e72-80d2c8664c54,Namespace:tigera-operator,Attempt:0,}" Oct 2 19:05:25.071850 env[1139]: time="2023-10-02T19:05:25.070191623Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:05:25.071850 env[1139]: time="2023-10-02T19:05:25.070234305Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:05:25.071850 env[1139]: time="2023-10-02T19:05:25.070244626Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:05:25.071850 env[1139]: time="2023-10-02T19:05:25.070371472Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5749ab6208339d87230d1e877a06c5542a1397eae57687aa51d384cf169a03d6 pid=2182 runtime=io.containerd.runc.v2 Oct 2 19:05:25.082383 systemd[1]: Started cri-containerd-5749ab6208339d87230d1e877a06c5542a1397eae57687aa51d384cf169a03d6.scope. Oct 2 19:05:25.109000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.109000 audit[2162]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2120 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432373064326561626363353135306232646135346533636630656531 Oct 2 19:05:25.109000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.109000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.109000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.109000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.109000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.109000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.109000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.109000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.109000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.109000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.109000 audit: BPF prog-id=110 op=LOAD Oct 2 19:05:25.109000 audit[2162]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2120 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432373064326561626363353135306232646135346533636630656531 Oct 2 19:05:25.109000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.109000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.109000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.109000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.109000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.109000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.109000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.109000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.109000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.109000 audit: BPF prog-id=111 op=LOAD Oct 2 19:05:25.109000 audit[2162]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2120 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432373064326561626363353135306232646135346533636630656531 Oct 2 19:05:25.109000 audit: BPF prog-id=111 op=UNLOAD Oct 2 19:05:25.109000 audit: BPF prog-id=110 op=UNLOAD Oct 2 19:05:25.109000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.109000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.109000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.109000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.109000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.109000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.109000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.109000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.109000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.109000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.109000 audit: BPF prog-id=112 op=LOAD Oct 2 19:05:25.109000 audit[2162]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2120 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432373064326561626363353135306232646135346533636630656531 Oct 2 19:05:25.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.119000 audit: BPF prog-id=113 op=LOAD Oct 2 19:05:25.120000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.120000 audit[2196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=2182 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537343961623632303833333964383732333064316538373761303663 Oct 2 19:05:25.120000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.120000 audit[2196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2182 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537343961623632303833333964383732333064316538373761303663 Oct 2 19:05:25.120000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.120000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.120000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.120000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.120000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.120000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.120000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.120000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.120000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.120000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.120000 audit: BPF prog-id=114 op=LOAD Oct 2 19:05:25.120000 audit[2196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=2182 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537343961623632303833333964383732333064316538373761303663 Oct 2 19:05:25.120000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.120000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.120000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.120000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.120000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.120000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.120000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.120000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.120000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.120000 audit: BPF prog-id=115 op=LOAD Oct 2 19:05:25.120000 audit[2196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=2182 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537343961623632303833333964383732333064316538373761303663 Oct 2 19:05:25.120000 audit: BPF prog-id=115 op=UNLOAD Oct 2 19:05:25.120000 audit: BPF prog-id=114 op=UNLOAD Oct 2 19:05:25.120000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.120000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.120000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.120000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.120000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.120000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.120000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.120000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.120000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.120000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:25.120000 audit: BPF prog-id=116 op=LOAD Oct 2 19:05:25.120000 audit[2196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=2182 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537343961623632303833333964383732333064316538373761303663 Oct 2 19:05:25.143593 env[1139]: time="2023-10-02T19:05:25.142714458Z" level=info msg="StartContainer for \"4270d2eabcc5150b2da54e3cf0ee1defaf259b8407cee75c297e4c213cdb5477\" returns successfully" Oct 2 19:05:25.147458 env[1139]: time="2023-10-02T19:05:25.147388892Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-8547bd6cc6-vqvhs,Uid:0ddf427c-7baf-4a1e-8e72-80d2c8664c54,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"5749ab6208339d87230d1e877a06c5542a1397eae57687aa51d384cf169a03d6\"" Oct 2 19:05:25.149098 env[1139]: time="2023-10-02T19:05:25.149067576Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\"" Oct 2 19:05:25.303000 audit[2256]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:05:25.303000 audit[2256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc50d9eb0 a2=0 a3=ffffbb4fa6c0 items=0 ppid=2173 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.303000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:05:25.304000 audit[2257]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:05:25.304000 audit[2257]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd7a00b80 a2=0 a3=ffff7fa356c0 items=0 ppid=2173 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.304000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:05:25.305000 audit[2255]: NETFILTER_CFG table=mangle:40 family=10 entries=1 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:05:25.305000 audit[2255]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd791a920 a2=0 a3=ffff9f9986c0 items=0 ppid=2173 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.305000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:05:25.306000 audit[2258]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2258 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:05:25.306000 audit[2258]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc389d190 a2=0 a3=ffffa9c4d6c0 items=0 ppid=2173 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.306000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:05:25.307000 audit[2259]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:05:25.307000 audit[2259]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcb056970 a2=0 a3=ffff8eaf86c0 items=0 ppid=2173 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.307000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:05:25.309000 audit[2260]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:05:25.309000 audit[2260]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffce207b20 a2=0 a3=ffffb1eb06c0 items=0 ppid=2173 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.309000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:05:25.406000 audit[2261]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:05:25.406000 audit[2261]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc22c1320 a2=0 a3=ffffa5ec06c0 items=0 ppid=2173 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.406000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:05:25.409000 audit[2263]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2263 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:05:25.409000 audit[2263]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffcc109be0 a2=0 a3=ffffba6726c0 items=0 ppid=2173 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.409000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 19:05:25.413000 audit[2266]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2266 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:05:25.413000 audit[2266]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffcba9d7a0 a2=0 a3=ffff7f86c6c0 items=0 ppid=2173 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.413000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 19:05:25.414000 audit[2267]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2267 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:05:25.414000 audit[2267]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdbb7aa80 a2=0 a3=ffff8199c6c0 items=0 ppid=2173 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.414000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:05:25.417000 audit[2269]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2269 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:05:25.417000 audit[2269]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe106f4d0 a2=0 a3=ffff91bd16c0 items=0 ppid=2173 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.417000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:05:25.417000 audit[2270]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2270 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:05:25.417000 audit[2270]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffed398990 a2=0 a3=ffffa42856c0 items=0 ppid=2173 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.417000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:05:25.421000 audit[2272]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2272 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:05:25.421000 audit[2272]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd6442fb0 a2=0 a3=ffff7f9836c0 items=0 ppid=2173 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.421000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:05:25.425000 audit[2275]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2275 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:05:25.425000 audit[2275]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffe6f3ad0 a2=0 a3=ffff924826c0 items=0 ppid=2173 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.425000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 19:05:25.427000 audit[2276]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2276 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:05:25.427000 audit[2276]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd9c25620 a2=0 a3=ffffaa4686c0 items=0 ppid=2173 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.427000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:05:25.430000 audit[2278]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2278 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:05:25.430000 audit[2278]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffee836080 a2=0 a3=ffffbf29b6c0 items=0 ppid=2173 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.430000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:05:25.430000 audit[2279]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:05:25.430000 audit[2279]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe1235c20 a2=0 a3=ffffa50166c0 items=0 ppid=2173 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.430000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:05:25.431000 audit[2281]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2281 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:05:25.431000 audit[2281]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffce86d910 a2=0 a3=ffffa3bd66c0 items=0 ppid=2173 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.431000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:05:25.440700 kubelet[2007]: E1002 19:05:25.440662 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:25.440000 audit[2284]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2284 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:05:25.440000 audit[2284]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdc2a7490 a2=0 a3=ffff813b96c0 items=0 ppid=2173 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.440000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:05:25.444000 audit[2287]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2287 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:05:25.444000 audit[2287]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff711bde0 a2=0 a3=ffffa24976c0 items=0 ppid=2173 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.444000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:05:25.445000 audit[2288]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:05:25.445000 audit[2288]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff89bbe00 a2=0 a3=ffff8b0116c0 items=0 ppid=2173 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.445000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:05:25.448000 audit[2290]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2290 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:05:25.448000 audit[2290]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=fffffe310060 a2=0 a3=ffff80eff6c0 items=0 ppid=2173 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.448000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:05:25.452823 kubelet[2007]: I1002 19:05:25.452784 2007 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-8qr5v" podStartSLOduration=1.452729875 podCreationTimestamp="2023-10-02 19:05:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:05:25.452190968 +0000 UTC m=+15.184651850" watchObservedRunningTime="2023-10-02 19:05:25.452729875 +0000 UTC m=+15.185190797" Oct 2 19:05:25.455000 audit[2293]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2293 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:05:25.455000 audit[2293]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcd51e720 a2=0 a3=ffff9da9c6c0 items=0 ppid=2173 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.455000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:05:25.456000 audit[2294]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:05:25.456000 audit[2294]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc01f9ea0 a2=0 a3=ffffa3c6b6c0 items=0 ppid=2173 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.456000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:05:25.460000 audit[2296]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2296 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:05:25.460000 audit[2296]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffcec90da0 a2=0 a3=ffff817136c0 items=0 ppid=2173 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.460000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:05:25.482000 audit[2302]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2302 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:05:25.482000 audit[2302]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffc3420630 a2=0 a3=ffff9823d6c0 items=0 ppid=2173 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.482000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:05:25.498000 audit[2302]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:05:25.498000 audit[2302]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffc3420630 a2=0 a3=ffff9823d6c0 items=0 ppid=2173 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.498000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:05:25.499000 audit[2308]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:05:25.499000 audit[2308]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd8ceebc0 a2=0 a3=ffff808576c0 items=0 ppid=2173 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.499000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:05:25.502000 audit[2310]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:05:25.502000 audit[2310]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd84a3410 a2=0 a3=ffffb63806c0 items=0 ppid=2173 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.502000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 19:05:25.507000 audit[2313]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:05:25.507000 audit[2313]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffffa5c6240 a2=0 a3=ffff95aae6c0 items=0 ppid=2173 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.507000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 19:05:25.508000 audit[2314]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:05:25.508000 audit[2314]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff542fc00 a2=0 a3=ffff99ab26c0 items=0 ppid=2173 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.508000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:05:25.510000 audit[2316]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2316 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:05:25.510000 audit[2316]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff2b85fa0 a2=0 a3=ffff815d36c0 items=0 ppid=2173 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.510000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:05:25.512000 audit[2317]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:05:25.512000 audit[2317]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc5572530 a2=0 a3=ffffaacdb6c0 items=0 ppid=2173 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.512000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:05:25.515000 audit[2319]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:05:25.515000 audit[2319]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc7578810 a2=0 a3=ffffb1eaf6c0 items=0 ppid=2173 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.515000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 19:05:25.518000 audit[2322]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2322 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:05:25.518000 audit[2322]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffc9f12770 a2=0 a3=ffffa3e3a6c0 items=0 ppid=2173 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.518000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:05:25.519000 audit[2323]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2323 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:05:25.519000 audit[2323]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff1ec4da0 a2=0 a3=ffffb14256c0 items=0 ppid=2173 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.519000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:05:25.522000 audit[2325]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:05:25.522000 audit[2325]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe366adc0 a2=0 a3=ffff87b2b6c0 items=0 ppid=2173 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.522000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:05:25.523000 audit[2326]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2326 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:05:25.523000 audit[2326]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffefba44c0 a2=0 a3=ffff855e36c0 items=0 ppid=2173 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.523000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:05:25.526000 audit[2328]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2328 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:05:25.526000 audit[2328]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff3d14610 a2=0 a3=ffff93a306c0 items=0 ppid=2173 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.526000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:05:25.529000 audit[2331]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2331 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:05:25.529000 audit[2331]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc0aaa010 a2=0 a3=ffffb9e576c0 items=0 ppid=2173 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.529000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:05:25.533000 audit[2334]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2334 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:05:25.533000 audit[2334]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff8e0b650 a2=0 a3=ffff9e2f66c0 items=0 ppid=2173 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.533000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 19:05:25.534000 audit[2335]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2335 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:05:25.534000 audit[2335]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe350b1a0 a2=0 a3=ffffaf5206c0 items=0 ppid=2173 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.534000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:05:25.536000 audit[2337]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2337 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:05:25.536000 audit[2337]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe9cf24d0 a2=0 a3=ffffa86f56c0 items=0 ppid=2173 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.536000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:05:25.541000 audit[2340]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2340 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:05:25.541000 audit[2340]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc1fa6c80 a2=0 a3=ffff985d86c0 items=0 ppid=2173 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.541000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:05:25.542000 audit[2341]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2341 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:05:25.542000 audit[2341]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffca3d71c0 a2=0 a3=ffffab2386c0 items=0 ppid=2173 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.542000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:05:25.544000 audit[2343]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:05:25.544000 audit[2343]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffd80067e0 a2=0 a3=ffff923236c0 items=0 ppid=2173 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.544000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:05:25.546000 audit[2344]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2344 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:05:25.546000 audit[2344]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd1ac39d0 a2=0 a3=ffff99b206c0 items=0 ppid=2173 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.546000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:05:25.548000 audit[2346]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2346 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:05:25.548000 audit[2346]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe0805300 a2=0 a3=ffff813206c0 items=0 ppid=2173 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.548000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:05:25.552000 audit[2349]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2349 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:05:25.552000 audit[2349]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe829e460 a2=0 a3=ffff8ba076c0 items=0 ppid=2173 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.552000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:05:25.555000 audit[2351]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2351 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:05:25.555000 audit[2351]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=fffff0994590 a2=0 a3=ffff8ade16c0 items=0 ppid=2173 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.555000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:05:25.556000 audit[2351]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2351 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:05:25.556000 audit[2351]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=fffff0994590 a2=0 a3=ffff8ade16c0 items=0 ppid=2173 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:25.556000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:05:25.776478 systemd[1]: run-containerd-runc-k8s.io-555e2e9e5005230f168f3441aba420a2c64a2bbd699a7a6632877a59969c5c95-runc.gr3gas.mount: Deactivated successfully. Oct 2 19:05:26.121862 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3719619169.mount: Deactivated successfully. Oct 2 19:05:26.644682 env[1139]: time="2023-10-02T19:05:26.644635281Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:26.645720 env[1139]: time="2023-10-02T19:05:26.645682931Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2bfa083ce51f1c757f20693cfea8ad121e2748f96a90fef52f087057eac59214,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:26.647171 env[1139]: time="2023-10-02T19:05:26.647139401Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:26.648689 env[1139]: time="2023-10-02T19:05:26.648664154Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:89eef35e1bbe8c88792ce69c3f3f38fb9838e58602c570524350b5f3ab127582,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:26.650193 env[1139]: time="2023-10-02T19:05:26.650137425Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\" returns image reference \"sha256:2bfa083ce51f1c757f20693cfea8ad121e2748f96a90fef52f087057eac59214\"" Oct 2 19:05:26.652293 env[1139]: time="2023-10-02T19:05:26.651946352Z" level=info msg="CreateContainer within sandbox \"5749ab6208339d87230d1e877a06c5542a1397eae57687aa51d384cf169a03d6\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Oct 2 19:05:26.662385 env[1139]: time="2023-10-02T19:05:26.662329691Z" level=info msg="CreateContainer within sandbox \"5749ab6208339d87230d1e877a06c5542a1397eae57687aa51d384cf169a03d6\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"dbdb52964b14d43bc78f0dbe6304a55bb1b9a19350318e3ab2a2e63838c6e818\"" Oct 2 19:05:26.664608 env[1139]: time="2023-10-02T19:05:26.664570639Z" level=info msg="StartContainer for \"dbdb52964b14d43bc78f0dbe6304a55bb1b9a19350318e3ab2a2e63838c6e818\"" Oct 2 19:05:26.681114 systemd[1]: Started cri-containerd-dbdb52964b14d43bc78f0dbe6304a55bb1b9a19350318e3ab2a2e63838c6e818.scope. Oct 2 19:05:26.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.707000 audit: BPF prog-id=117 op=LOAD Oct 2 19:05:26.708000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.708000 audit[2359]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2182 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:26.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462646235323936346231346434336263373866306462653633303461 Oct 2 19:05:26.709000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.709000 audit[2359]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2182 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:26.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462646235323936346231346434336263373866306462653633303461 Oct 2 19:05:26.709000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.709000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.709000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.709000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.709000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.709000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.709000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.709000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.709000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.709000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.709000 audit: BPF prog-id=118 op=LOAD Oct 2 19:05:26.709000 audit[2359]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2182 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:26.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462646235323936346231346434336263373866306462653633303461 Oct 2 19:05:26.710000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.710000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.710000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.710000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.710000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.710000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.710000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.710000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.710000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.710000 audit: BPF prog-id=119 op=LOAD Oct 2 19:05:26.710000 audit[2359]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2182 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:26.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462646235323936346231346434336263373866306462653633303461 Oct 2 19:05:26.711000 audit: BPF prog-id=119 op=UNLOAD Oct 2 19:05:26.711000 audit: BPF prog-id=118 op=UNLOAD Oct 2 19:05:26.711000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.711000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.711000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.711000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.711000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.711000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.711000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.711000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.711000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.711000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:26.711000 audit: BPF prog-id=120 op=LOAD Oct 2 19:05:26.711000 audit[2359]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2182 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:26.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462646235323936346231346434336263373866306462653633303461 Oct 2 19:05:26.730920 env[1139]: time="2023-10-02T19:05:26.730876305Z" level=info msg="StartContainer for \"dbdb52964b14d43bc78f0dbe6304a55bb1b9a19350318e3ab2a2e63838c6e818\" returns successfully" Oct 2 19:05:27.452975 kubelet[2007]: I1002 19:05:27.452926 2007 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-8547bd6cc6-vqvhs" podStartSLOduration=1.951078199 podCreationTimestamp="2023-10-02 19:05:24 +0000 UTC" firstStartedPulling="2023-10-02 19:05:25.148653475 +0000 UTC m=+14.881114397" lastFinishedPulling="2023-10-02 19:05:26.650463561 +0000 UTC m=+16.382924483" observedRunningTime="2023-10-02 19:05:27.452306218 +0000 UTC m=+17.184767140" watchObservedRunningTime="2023-10-02 19:05:27.452888285 +0000 UTC m=+17.185349207" Oct 2 19:05:29.837000 audit[2394]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2394 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:05:29.837000 audit[2394]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffdd5dbff0 a2=0 a3=ffff848626c0 items=0 ppid=2173 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:29.837000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:05:29.837000 audit[2394]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2394 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:05:29.837000 audit[2394]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffdd5dbff0 a2=0 a3=ffff848626c0 items=0 ppid=2173 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:29.837000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:05:29.847000 audit[2396]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2396 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:05:29.847000 audit[2396]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=fffffc731cf0 a2=0 a3=ffff8217f6c0 items=0 ppid=2173 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:29.847000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:05:29.850000 audit[2396]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2396 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:05:29.850000 audit[2396]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=fffffc731cf0 a2=0 a3=ffff8217f6c0 items=0 ppid=2173 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:29.850000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:05:30.068404 kubelet[2007]: I1002 19:05:30.068335 2007 topology_manager.go:215] "Topology Admit Handler" podUID="ad6fc35c-6d2e-40a8-835c-16fe8033a06a" podNamespace="calico-system" podName="calico-typha-77b6cfc648-8w7zr" Oct 2 19:05:30.074442 systemd[1]: Created slice kubepods-besteffort-podad6fc35c_6d2e_40a8_835c_16fe8033a06a.slice. Oct 2 19:05:30.104598 kubelet[2007]: I1002 19:05:30.104487 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ad6fc35c-6d2e-40a8-835c-16fe8033a06a-tigera-ca-bundle\") pod \"calico-typha-77b6cfc648-8w7zr\" (UID: \"ad6fc35c-6d2e-40a8-835c-16fe8033a06a\") " pod="calico-system/calico-typha-77b6cfc648-8w7zr" Oct 2 19:05:30.104598 kubelet[2007]: I1002 19:05:30.104545 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z549f\" (UniqueName: \"kubernetes.io/projected/ad6fc35c-6d2e-40a8-835c-16fe8033a06a-kube-api-access-z549f\") pod \"calico-typha-77b6cfc648-8w7zr\" (UID: \"ad6fc35c-6d2e-40a8-835c-16fe8033a06a\") " pod="calico-system/calico-typha-77b6cfc648-8w7zr" Oct 2 19:05:30.104598 kubelet[2007]: I1002 19:05:30.104592 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/ad6fc35c-6d2e-40a8-835c-16fe8033a06a-typha-certs\") pod \"calico-typha-77b6cfc648-8w7zr\" (UID: \"ad6fc35c-6d2e-40a8-835c-16fe8033a06a\") " pod="calico-system/calico-typha-77b6cfc648-8w7zr" Oct 2 19:05:30.112598 kubelet[2007]: I1002 19:05:30.112551 2007 topology_manager.go:215] "Topology Admit Handler" podUID="ab296477-f006-4ec6-bad9-970c22508731" podNamespace="calico-system" podName="calico-node-zdhnd" Oct 2 19:05:30.117613 systemd[1]: Created slice kubepods-besteffort-podab296477_f006_4ec6_bad9_970c22508731.slice. Oct 2 19:05:30.205528 kubelet[2007]: I1002 19:05:30.205386 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/ab296477-f006-4ec6-bad9-970c22508731-node-certs\") pod \"calico-node-zdhnd\" (UID: \"ab296477-f006-4ec6-bad9-970c22508731\") " pod="calico-system/calico-node-zdhnd" Oct 2 19:05:30.205528 kubelet[2007]: I1002 19:05:30.205461 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/ab296477-f006-4ec6-bad9-970c22508731-flexvol-driver-host\") pod \"calico-node-zdhnd\" (UID: \"ab296477-f006-4ec6-bad9-970c22508731\") " pod="calico-system/calico-node-zdhnd" Oct 2 19:05:30.205528 kubelet[2007]: I1002 19:05:30.205494 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ab296477-f006-4ec6-bad9-970c22508731-xtables-lock\") pod \"calico-node-zdhnd\" (UID: \"ab296477-f006-4ec6-bad9-970c22508731\") " pod="calico-system/calico-node-zdhnd" Oct 2 19:05:30.205904 kubelet[2007]: I1002 19:05:30.205879 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ab296477-f006-4ec6-bad9-970c22508731-lib-modules\") pod \"calico-node-zdhnd\" (UID: \"ab296477-f006-4ec6-bad9-970c22508731\") " pod="calico-system/calico-node-zdhnd" Oct 2 19:05:30.206002 kubelet[2007]: I1002 19:05:30.205988 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/ab296477-f006-4ec6-bad9-970c22508731-cni-net-dir\") pod \"calico-node-zdhnd\" (UID: \"ab296477-f006-4ec6-bad9-970c22508731\") " pod="calico-system/calico-node-zdhnd" Oct 2 19:05:30.206096 kubelet[2007]: I1002 19:05:30.206083 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/ab296477-f006-4ec6-bad9-970c22508731-cni-log-dir\") pod \"calico-node-zdhnd\" (UID: \"ab296477-f006-4ec6-bad9-970c22508731\") " pod="calico-system/calico-node-zdhnd" Oct 2 19:05:30.206180 kubelet[2007]: I1002 19:05:30.206168 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ab296477-f006-4ec6-bad9-970c22508731-var-lib-calico\") pod \"calico-node-zdhnd\" (UID: \"ab296477-f006-4ec6-bad9-970c22508731\") " pod="calico-system/calico-node-zdhnd" Oct 2 19:05:30.206262 kubelet[2007]: I1002 19:05:30.206251 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p7bx9\" (UniqueName: \"kubernetes.io/projected/ab296477-f006-4ec6-bad9-970c22508731-kube-api-access-p7bx9\") pod \"calico-node-zdhnd\" (UID: \"ab296477-f006-4ec6-bad9-970c22508731\") " pod="calico-system/calico-node-zdhnd" Oct 2 19:05:30.206394 kubelet[2007]: I1002 19:05:30.206373 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/ab296477-f006-4ec6-bad9-970c22508731-policysync\") pod \"calico-node-zdhnd\" (UID: \"ab296477-f006-4ec6-bad9-970c22508731\") " pod="calico-system/calico-node-zdhnd" Oct 2 19:05:30.206526 kubelet[2007]: I1002 19:05:30.206511 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ab296477-f006-4ec6-bad9-970c22508731-tigera-ca-bundle\") pod \"calico-node-zdhnd\" (UID: \"ab296477-f006-4ec6-bad9-970c22508731\") " pod="calico-system/calico-node-zdhnd" Oct 2 19:05:30.206612 kubelet[2007]: I1002 19:05:30.206600 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/ab296477-f006-4ec6-bad9-970c22508731-var-run-calico\") pod \"calico-node-zdhnd\" (UID: \"ab296477-f006-4ec6-bad9-970c22508731\") " pod="calico-system/calico-node-zdhnd" Oct 2 19:05:30.206702 kubelet[2007]: I1002 19:05:30.206690 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/ab296477-f006-4ec6-bad9-970c22508731-cni-bin-dir\") pod \"calico-node-zdhnd\" (UID: \"ab296477-f006-4ec6-bad9-970c22508731\") " pod="calico-system/calico-node-zdhnd" Oct 2 19:05:30.308547 kubelet[2007]: E1002 19:05:30.308499 2007 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:05:30.308547 kubelet[2007]: W1002 19:05:30.308525 2007 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:05:30.308547 kubelet[2007]: E1002 19:05:30.308546 2007 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:05:30.308737 kubelet[2007]: E1002 19:05:30.308674 2007 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:05:30.308737 kubelet[2007]: W1002 19:05:30.308682 2007 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:05:30.308737 kubelet[2007]: E1002 19:05:30.308692 2007 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:05:30.308814 kubelet[2007]: E1002 19:05:30.308798 2007 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:05:30.308814 kubelet[2007]: W1002 19:05:30.308805 2007 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:05:30.308814 kubelet[2007]: E1002 19:05:30.308814 2007 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:05:30.309019 kubelet[2007]: E1002 19:05:30.308958 2007 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:05:30.309019 kubelet[2007]: W1002 19:05:30.308972 2007 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:05:30.309019 kubelet[2007]: E1002 19:05:30.308982 2007 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:05:30.309289 kubelet[2007]: E1002 19:05:30.309264 2007 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:05:30.309289 kubelet[2007]: W1002 19:05:30.309281 2007 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:05:30.309373 kubelet[2007]: E1002 19:05:30.309301 2007 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:05:30.309552 kubelet[2007]: E1002 19:05:30.309526 2007 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:05:30.309552 kubelet[2007]: W1002 19:05:30.309540 2007 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:05:30.309552 kubelet[2007]: E1002 19:05:30.309555 2007 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:05:30.309789 kubelet[2007]: E1002 19:05:30.309764 2007 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:05:30.309789 kubelet[2007]: W1002 19:05:30.309777 2007 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:05:30.309789 kubelet[2007]: E1002 19:05:30.309788 2007 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:05:30.309989 kubelet[2007]: E1002 19:05:30.309962 2007 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:05:30.309989 kubelet[2007]: W1002 19:05:30.309975 2007 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:05:30.309989 kubelet[2007]: E1002 19:05:30.309987 2007 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:05:30.310196 kubelet[2007]: E1002 19:05:30.310176 2007 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:05:30.310196 kubelet[2007]: W1002 19:05:30.310189 2007 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:05:30.310269 kubelet[2007]: E1002 19:05:30.310205 2007 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:05:30.312377 kubelet[2007]: E1002 19:05:30.312354 2007 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:05:30.312478 kubelet[2007]: W1002 19:05:30.312383 2007 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:05:30.312478 kubelet[2007]: E1002 19:05:30.312401 2007 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:05:30.328446 kubelet[2007]: E1002 19:05:30.328409 2007 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:05:30.328610 kubelet[2007]: W1002 19:05:30.328591 2007 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:05:30.328676 kubelet[2007]: E1002 19:05:30.328666 2007 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:05:30.376956 kubelet[2007]: E1002 19:05:30.376847 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:30.378211 env[1139]: time="2023-10-02T19:05:30.378167169Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-77b6cfc648-8w7zr,Uid:ad6fc35c-6d2e-40a8-835c-16fe8033a06a,Namespace:calico-system,Attempt:0,}" Oct 2 19:05:30.420462 kubelet[2007]: E1002 19:05:30.420423 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:30.420995 env[1139]: time="2023-10-02T19:05:30.420950724Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zdhnd,Uid:ab296477-f006-4ec6-bad9-970c22508731,Namespace:calico-system,Attempt:0,}" Oct 2 19:05:30.494480 env[1139]: time="2023-10-02T19:05:30.494377895Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:05:30.494480 env[1139]: time="2023-10-02T19:05:30.494447657Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:05:30.494664 env[1139]: time="2023-10-02T19:05:30.494478899Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:05:30.494705 env[1139]: time="2023-10-02T19:05:30.494660986Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:05:30.494705 env[1139]: time="2023-10-02T19:05:30.494693908Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:05:30.494798 env[1139]: time="2023-10-02T19:05:30.494704148Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:05:30.494963 env[1139]: time="2023-10-02T19:05:30.494905716Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4c169f8ef9173ec3ae85ed8d76e41bc70d980a3d25c76b5bbeb8e0039b97daf7 pid=2424 runtime=io.containerd.runc.v2 Oct 2 19:05:30.495871 env[1139]: time="2023-10-02T19:05:30.495816994Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7a0c30ad991cfe13fa550bdfe7b8d2dd1426867fe1e4085d3393670553e85fb1 pid=2432 runtime=io.containerd.runc.v2 Oct 2 19:05:30.510832 systemd[1]: Started cri-containerd-7a0c30ad991cfe13fa550bdfe7b8d2dd1426867fe1e4085d3393670553e85fb1.scope. Oct 2 19:05:30.517683 systemd[1]: Started cri-containerd-4c169f8ef9173ec3ae85ed8d76e41bc70d980a3d25c76b5bbeb8e0039b97daf7.scope. Oct 2 19:05:30.544442 kernel: kauditd_printk_skb: 369 callbacks suppressed Oct 2 19:05:30.544551 kernel: audit: type=1400 audit(1696273530.538:1051): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.544573 kernel: audit: type=1400 audit(1696273530.538:1052): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.544591 kernel: audit: type=1400 audit(1696273530.538:1053): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.545881 kernel: audit: type=1400 audit(1696273530.538:1054): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.549877 kernel: audit: type=1400 audit(1696273530.538:1055): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.549952 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:05:30.549975 kernel: audit: type=1400 audit(1696273530.538:1056): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.549995 kernel: audit: type=1400 audit(1696273530.538:1057): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.550008 kernel: audit: type=1400 audit(1696273530.538:1058): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.550029 kernel: audit: type=1400 audit(1696273530.538:1059): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.539000 audit: BPF prog-id=121 op=LOAD Oct 2 19:05:30.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.544000 audit: BPF prog-id=122 op=LOAD Oct 2 19:05:30.546000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit[2447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001cdb38 a2=10 a3=0 items=0 ppid=2432 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:30.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761306333306164393931636665313366613535306264666537623864 Oct 2 19:05:30.546000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit[2447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001cd5a0 a2=3c a3=0 items=0 ppid=2432 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:30.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761306333306164393931636665313366613535306264666537623864 Oct 2 19:05:30.546000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit[2445]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=2424 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:30.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463313639663865663931373365633361653835656438643736653431 Oct 2 19:05:30.546000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit[2445]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2424 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:30.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463313639663865663931373365633361653835656438643736653431 Oct 2 19:05:30.546000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit: BPF prog-id=123 op=LOAD Oct 2 19:05:30.546000 audit[2447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001cd8e0 a2=78 a3=0 items=0 ppid=2432 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:30.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761306333306164393931636665313366613535306264666537623864 Oct 2 19:05:30.546000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.546000 audit: BPF prog-id=125 op=LOAD Oct 2 19:05:30.546000 audit[2447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001cd670 a2=78 a3=0 items=0 ppid=2432 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:30.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761306333306164393931636665313366613535306264666537623864 Oct 2 19:05:30.548000 audit: BPF prog-id=125 op=UNLOAD Oct 2 19:05:30.548000 audit: BPF prog-id=123 op=UNLOAD Oct 2 19:05:30.548000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.548000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.548000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.548000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.548000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.548000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.548000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.548000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.548000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.548000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.548000 audit: BPF prog-id=126 op=LOAD Oct 2 19:05:30.548000 audit[2447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001cdb40 a2=78 a3=0 items=0 ppid=2432 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:30.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761306333306164393931636665313366613535306264666537623864 Oct 2 19:05:30.546000 audit[2445]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2424 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:30.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463313639663865663931373365633361653835656438643736653431 Oct 2 19:05:30.556000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.556000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.556000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.556000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.556000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.556000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.556000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.556000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.556000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.556000 audit: BPF prog-id=127 op=LOAD Oct 2 19:05:30.556000 audit[2445]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2424 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:30.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463313639663865663931373365633361653835656438643736653431 Oct 2 19:05:30.556000 audit: BPF prog-id=127 op=UNLOAD Oct 2 19:05:30.556000 audit: BPF prog-id=124 op=UNLOAD Oct 2 19:05:30.556000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.556000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.556000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.556000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.556000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.556000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.556000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.556000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.556000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.556000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:30.556000 audit: BPF prog-id=128 op=LOAD Oct 2 19:05:30.556000 audit[2445]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2424 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:30.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463313639663865663931373365633361653835656438643736653431 Oct 2 19:05:30.581700 env[1139]: time="2023-10-02T19:05:30.581658394Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zdhnd,Uid:ab296477-f006-4ec6-bad9-970c22508731,Namespace:calico-system,Attempt:0,} returns sandbox id \"4c169f8ef9173ec3ae85ed8d76e41bc70d980a3d25c76b5bbeb8e0039b97daf7\"" Oct 2 19:05:30.585074 kubelet[2007]: E1002 19:05:30.584444 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:30.585919 env[1139]: time="2023-10-02T19:05:30.585858486Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\"" Oct 2 19:05:30.587509 env[1139]: time="2023-10-02T19:05:30.587466872Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-77b6cfc648-8w7zr,Uid:ad6fc35c-6d2e-40a8-835c-16fe8033a06a,Namespace:calico-system,Attempt:0,} returns sandbox id \"7a0c30ad991cfe13fa550bdfe7b8d2dd1426867fe1e4085d3393670553e85fb1\"" Oct 2 19:05:30.588228 kubelet[2007]: E1002 19:05:30.588207 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:30.870000 audit[2494]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2494 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:05:30.870000 audit[2494]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=fffff3ebda80 a2=0 a3=ffff9afc26c0 items=0 ppid=2173 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:30.870000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:05:30.870000 audit[2494]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2494 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:05:30.870000 audit[2494]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=fffff3ebda80 a2=0 a3=ffff9afc26c0 items=0 ppid=2173 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:30.870000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:05:31.909289 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3955914298.mount: Deactivated successfully. Oct 2 19:05:31.972578 env[1139]: time="2023-10-02T19:05:31.972515055Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:31.973555 env[1139]: time="2023-10-02T19:05:31.973517974Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:125b9deae5a04d82056336c1aff8ab9c7ed64cdc224c7139c7433a3a29c21fc8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:31.975336 env[1139]: time="2023-10-02T19:05:31.975285564Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:31.976383 env[1139]: time="2023-10-02T19:05:31.976347726Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:31.976887 env[1139]: time="2023-10-02T19:05:31.976847026Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:125b9deae5a04d82056336c1aff8ab9c7ed64cdc224c7139c7433a3a29c21fc8\"" Oct 2 19:05:31.977427 env[1139]: time="2023-10-02T19:05:31.977389527Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\"" Oct 2 19:05:31.979197 env[1139]: time="2023-10-02T19:05:31.979163637Z" level=info msg="CreateContainer within sandbox \"4c169f8ef9173ec3ae85ed8d76e41bc70d980a3d25c76b5bbeb8e0039b97daf7\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 2 19:05:31.991910 env[1139]: time="2023-10-02T19:05:31.991853139Z" level=info msg="CreateContainer within sandbox \"4c169f8ef9173ec3ae85ed8d76e41bc70d980a3d25c76b5bbeb8e0039b97daf7\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"0bae016d0290a16554d52055140d433c629d927c0e7924e6ac6c351b5ecd5b00\"" Oct 2 19:05:31.992731 env[1139]: time="2023-10-02T19:05:31.992555727Z" level=info msg="StartContainer for \"0bae016d0290a16554d52055140d433c629d927c0e7924e6ac6c351b5ecd5b00\"" Oct 2 19:05:32.015395 systemd[1]: Started cri-containerd-0bae016d0290a16554d52055140d433c629d927c0e7924e6ac6c351b5ecd5b00.scope. Oct 2 19:05:32.036000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:32.036000 audit[2503]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2424 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:32.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062616530313664303239306131363535346435323035353134306434 Oct 2 19:05:32.036000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:32.036000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:32.036000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:32.036000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:32.036000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:32.036000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:32.036000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:32.036000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:32.036000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:32.036000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:32.036000 audit: BPF prog-id=129 op=LOAD Oct 2 19:05:32.036000 audit[2503]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2424 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:32.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062616530313664303239306131363535346435323035353134306434 Oct 2 19:05:32.036000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:32.036000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:32.036000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:32.036000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:32.036000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:32.036000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:32.036000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:32.036000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:32.036000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:32.036000 audit: BPF prog-id=130 op=LOAD Oct 2 19:05:32.036000 audit[2503]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2424 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:32.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062616530313664303239306131363535346435323035353134306434 Oct 2 19:05:32.037000 audit: BPF prog-id=130 op=UNLOAD Oct 2 19:05:32.037000 audit: BPF prog-id=129 op=UNLOAD Oct 2 19:05:32.037000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:32.037000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:32.037000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:32.037000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:32.037000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:32.037000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:32.037000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:32.037000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:32.037000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:32.037000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:32.037000 audit: BPF prog-id=131 op=LOAD Oct 2 19:05:32.037000 audit[2503]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2424 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:32.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062616530313664303239306131363535346435323035353134306434 Oct 2 19:05:32.065443 env[1139]: time="2023-10-02T19:05:32.059857584Z" level=info msg="StartContainer for \"0bae016d0290a16554d52055140d433c629d927c0e7924e6ac6c351b5ecd5b00\" returns successfully" Oct 2 19:05:32.070420 systemd[1]: cri-containerd-0bae016d0290a16554d52055140d433c629d927c0e7924e6ac6c351b5ecd5b00.scope: Deactivated successfully. Oct 2 19:05:32.073000 audit: BPF prog-id=131 op=UNLOAD Oct 2 19:05:32.243010 env[1139]: time="2023-10-02T19:05:32.242859758Z" level=info msg="shim disconnected" id=0bae016d0290a16554d52055140d433c629d927c0e7924e6ac6c351b5ecd5b00 Oct 2 19:05:32.243010 env[1139]: time="2023-10-02T19:05:32.242907840Z" level=warning msg="cleaning up after shim disconnected" id=0bae016d0290a16554d52055140d433c629d927c0e7924e6ac6c351b5ecd5b00 namespace=k8s.io Oct 2 19:05:32.243010 env[1139]: time="2023-10-02T19:05:32.242917000Z" level=info msg="cleaning up dead shim" Oct 2 19:05:32.253126 env[1139]: time="2023-10-02T19:05:32.253084907Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:05:32Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2541 runtime=io.containerd.runc.v2\n" Oct 2 19:05:32.460561 kubelet[2007]: E1002 19:05:32.459479 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:33.107618 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3569798817.mount: Deactivated successfully. Oct 2 19:05:33.804634 env[1139]: time="2023-10-02T19:05:33.804590498Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:33.805828 env[1139]: time="2023-10-02T19:05:33.805798782Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a549a5fe632d63eae6f8f617934a309e3e901a6e8cfb0b038a70b8b950fc4dd5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:33.807269 env[1139]: time="2023-10-02T19:05:33.807244196Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:33.809308 env[1139]: time="2023-10-02T19:05:33.809264390Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:7fb0e011ffae9f88333b7a7488dae37f1d534b46d2b11a0fe2b5d129df58789c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:33.813524 env[1139]: time="2023-10-02T19:05:33.810868329Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\" returns image reference \"sha256:a549a5fe632d63eae6f8f617934a309e3e901a6e8cfb0b038a70b8b950fc4dd5\"" Oct 2 19:05:33.816070 env[1139]: time="2023-10-02T19:05:33.814602506Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\"" Oct 2 19:05:33.817164 env[1139]: time="2023-10-02T19:05:33.817121359Z" level=info msg="CreateContainer within sandbox \"7a0c30ad991cfe13fa550bdfe7b8d2dd1426867fe1e4085d3393670553e85fb1\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Oct 2 19:05:33.832724 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1649351138.mount: Deactivated successfully. Oct 2 19:05:33.834895 env[1139]: time="2023-10-02T19:05:33.834834731Z" level=info msg="CreateContainer within sandbox \"7a0c30ad991cfe13fa550bdfe7b8d2dd1426867fe1e4085d3393670553e85fb1\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"7d2af89c5769a44d863d3c60e3251a54304cc9bd7811665eeb06f800545ec16a\"" Oct 2 19:05:33.838468 env[1139]: time="2023-10-02T19:05:33.837666875Z" level=info msg="StartContainer for \"7d2af89c5769a44d863d3c60e3251a54304cc9bd7811665eeb06f800545ec16a\"" Oct 2 19:05:33.866498 systemd[1]: Started cri-containerd-7d2af89c5769a44d863d3c60e3251a54304cc9bd7811665eeb06f800545ec16a.scope. Oct 2 19:05:33.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.895000 audit: BPF prog-id=132 op=LOAD Oct 2 19:05:33.896000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.896000 audit[2566]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2432 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:33.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764326166383963353736396134346438363364336336306533323531 Oct 2 19:05:33.896000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.896000 audit[2566]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2432 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:33.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764326166383963353736396134346438363364336336306533323531 Oct 2 19:05:33.896000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.896000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.896000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.896000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.896000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.896000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.896000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.896000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.896000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.896000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.896000 audit: BPF prog-id=133 op=LOAD Oct 2 19:05:33.896000 audit[2566]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2432 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:33.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764326166383963353736396134346438363364336336306533323531 Oct 2 19:05:33.896000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.896000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.896000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.896000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.896000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.896000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.896000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.896000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.896000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.896000 audit: BPF prog-id=134 op=LOAD Oct 2 19:05:33.896000 audit[2566]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2432 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:33.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764326166383963353736396134346438363364336336306533323531 Oct 2 19:05:33.896000 audit: BPF prog-id=134 op=UNLOAD Oct 2 19:05:33.896000 audit: BPF prog-id=133 op=UNLOAD Oct 2 19:05:33.896000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.896000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.896000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.896000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.896000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.896000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.896000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.896000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.896000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.896000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:33.896000 audit: BPF prog-id=135 op=LOAD Oct 2 19:05:33.896000 audit[2566]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2432 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:33.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764326166383963353736396134346438363364336336306533323531 Oct 2 19:05:33.918053 env[1139]: time="2023-10-02T19:05:33.917989230Z" level=info msg="StartContainer for \"7d2af89c5769a44d863d3c60e3251a54304cc9bd7811665eeb06f800545ec16a\" returns successfully" Oct 2 19:05:34.468050 kubelet[2007]: E1002 19:05:34.467071 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:34.481655 kubelet[2007]: I1002 19:05:34.481587 2007 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-77b6cfc648-8w7zr" podStartSLOduration=1.256636828 podCreationTimestamp="2023-10-02 19:05:30 +0000 UTC" firstStartedPulling="2023-10-02 19:05:30.588916771 +0000 UTC m=+20.321377693" lastFinishedPulling="2023-10-02 19:05:33.813830678 +0000 UTC m=+23.546291560" observedRunningTime="2023-10-02 19:05:34.478652032 +0000 UTC m=+24.211112954" watchObservedRunningTime="2023-10-02 19:05:34.481550695 +0000 UTC m=+24.214011657" Oct 2 19:05:34.505000 audit[2602]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=2602 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:05:34.505000 audit[2602]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffcd13b980 a2=0 a3=ffffa526a6c0 items=0 ppid=2173 pid=2602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:34.505000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:05:34.505000 audit[2602]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2602 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:05:34.505000 audit[2602]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6068 a0=3 a1=ffffcd13b980 a2=0 a3=ffffa526a6c0 items=0 ppid=2173 pid=2602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:34.505000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:05:35.469269 kubelet[2007]: E1002 19:05:35.469228 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:36.470348 kubelet[2007]: E1002 19:05:36.470314 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:37.269755 env[1139]: time="2023-10-02T19:05:37.269699184Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:37.271690 env[1139]: time="2023-10-02T19:05:37.271436480Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0bb8d6f033a0548573ff857c26574d89a8ad4b691aa88a32eddf0c7db06599ef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:37.272901 env[1139]: time="2023-10-02T19:05:37.272876727Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:37.274327 env[1139]: time="2023-10-02T19:05:37.274292573Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:37.275051 env[1139]: time="2023-10-02T19:05:37.274703786Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:0bb8d6f033a0548573ff857c26574d89a8ad4b691aa88a32eddf0c7db06599ef\"" Oct 2 19:05:37.276599 env[1139]: time="2023-10-02T19:05:37.276567366Z" level=info msg="CreateContainer within sandbox \"4c169f8ef9173ec3ae85ed8d76e41bc70d980a3d25c76b5bbeb8e0039b97daf7\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 2 19:05:37.312007 env[1139]: time="2023-10-02T19:05:37.311932189Z" level=info msg="CreateContainer within sandbox \"4c169f8ef9173ec3ae85ed8d76e41bc70d980a3d25c76b5bbeb8e0039b97daf7\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"b4c249b4fddad577f8ee0bf933c58b54ca3cdcd4cdf0f7f950e8fa849f54ba61\"" Oct 2 19:05:37.312785 env[1139]: time="2023-10-02T19:05:37.312716534Z" level=info msg="StartContainer for \"b4c249b4fddad577f8ee0bf933c58b54ca3cdcd4cdf0f7f950e8fa849f54ba61\"" Oct 2 19:05:37.344720 systemd[1]: run-containerd-runc-k8s.io-b4c249b4fddad577f8ee0bf933c58b54ca3cdcd4cdf0f7f950e8fa849f54ba61-runc.LsFrVk.mount: Deactivated successfully. Oct 2 19:05:37.346876 systemd[1]: Started cri-containerd-b4c249b4fddad577f8ee0bf933c58b54ca3cdcd4cdf0f7f950e8fa849f54ba61.scope. Oct 2 19:05:37.406000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.410330 kernel: kauditd_printk_skb: 219 callbacks suppressed Oct 2 19:05:37.410410 kernel: audit: type=1400 audit(1696273537.406:1116): avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.410458 kernel: audit: type=1300 audit(1696273537.406:1116): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2424 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:37.406000 audit[2611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2424 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:37.412649 kernel: audit: type=1327 audit(1696273537.406:1116): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234633234396234666464616435373766386565306266393333633538 Oct 2 19:05:37.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234633234396234666464616435373766386565306266393333633538 Oct 2 19:05:37.406000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.417009 kernel: audit: type=1400 audit(1696273537.406:1117): avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.417067 kernel: audit: type=1400 audit(1696273537.406:1117): avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.406000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.406000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.420408 kernel: audit: type=1400 audit(1696273537.406:1117): avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.420464 kernel: audit: type=1400 audit(1696273537.406:1117): avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.406000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.406000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.423871 kernel: audit: type=1400 audit(1696273537.406:1117): avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.423937 kernel: audit: type=1400 audit(1696273537.406:1117): avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.406000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.406000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.427183 kernel: audit: type=1400 audit(1696273537.406:1117): avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.406000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.406000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.406000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.406000 audit: BPF prog-id=136 op=LOAD Oct 2 19:05:37.406000 audit[2611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2424 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:37.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234633234396234666464616435373766386565306266393333633538 Oct 2 19:05:37.406000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.406000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.406000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.406000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.406000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.406000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.406000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.406000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.406000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.406000 audit: BPF prog-id=137 op=LOAD Oct 2 19:05:37.406000 audit[2611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2424 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:37.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234633234396234666464616435373766386565306266393333633538 Oct 2 19:05:37.408000 audit: BPF prog-id=137 op=UNLOAD Oct 2 19:05:37.408000 audit: BPF prog-id=136 op=UNLOAD Oct 2 19:05:37.408000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.408000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.408000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.408000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.408000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.408000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.408000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.408000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.408000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.408000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:37.408000 audit: BPF prog-id=138 op=LOAD Oct 2 19:05:37.408000 audit[2611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2424 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:37.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234633234396234666464616435373766386565306266393333633538 Oct 2 19:05:37.433363 env[1139]: time="2023-10-02T19:05:37.433317351Z" level=info msg="StartContainer for \"b4c249b4fddad577f8ee0bf933c58b54ca3cdcd4cdf0f7f950e8fa849f54ba61\" returns successfully" Oct 2 19:05:37.473745 kubelet[2007]: E1002 19:05:37.473532 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:38.232302 env[1139]: time="2023-10-02T19:05:38.232236624Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:05:38.251469 systemd[1]: cri-containerd-b4c249b4fddad577f8ee0bf933c58b54ca3cdcd4cdf0f7f950e8fa849f54ba61.scope: Deactivated successfully. Oct 2 19:05:38.255000 audit: BPF prog-id=138 op=UNLOAD Oct 2 19:05:38.277823 kubelet[2007]: I1002 19:05:38.277791 2007 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Oct 2 19:05:38.284142 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b4c249b4fddad577f8ee0bf933c58b54ca3cdcd4cdf0f7f950e8fa849f54ba61-rootfs.mount: Deactivated successfully. Oct 2 19:05:38.451448 kubelet[2007]: I1002 19:05:38.451391 2007 topology_manager.go:215] "Topology Admit Handler" podUID="ef92d702-be63-4add-b3cb-5802a224a11e" podNamespace="kube-system" podName="coredns-5dd5756b68-z2z9h" Oct 2 19:05:38.458279 systemd[1]: Created slice kubepods-burstable-podef92d702_be63_4add_b3cb_5802a224a11e.slice. Oct 2 19:05:38.460088 kubelet[2007]: I1002 19:05:38.460053 2007 topology_manager.go:215] "Topology Admit Handler" podUID="1c72268b-aac6-447a-851c-e4e6f761535e" podNamespace="kube-system" podName="coredns-5dd5756b68-hsmbh" Oct 2 19:05:38.460591 kubelet[2007]: I1002 19:05:38.460409 2007 topology_manager.go:215] "Topology Admit Handler" podUID="63f22f2d-0c3c-4e0c-8566-62ff386c04aa" podNamespace="calico-system" podName="calico-kube-controllers-74b9887bb6-g94f7" Oct 2 19:05:38.466466 systemd[1]: Created slice kubepods-burstable-pod1c72268b_aac6_447a_851c_e4e6f761535e.slice. Oct 2 19:05:38.471072 systemd[1]: Created slice kubepods-besteffort-pod63f22f2d_0c3c_4e0c_8566_62ff386c04aa.slice. Oct 2 19:05:38.472560 kubelet[2007]: I1002 19:05:38.472525 2007 topology_manager.go:215] "Topology Admit Handler" podUID="6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8" podNamespace="calico-system" podName="csi-node-driver-vp4kr" Oct 2 19:05:38.474675 kubelet[2007]: E1002 19:05:38.474640 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:38.477817 systemd[1]: Created slice kubepods-besteffort-pod6a50e944_da43_4b8c_8b59_6ac7fb8dc4f8.slice. Oct 2 19:05:38.517766 env[1139]: time="2023-10-02T19:05:38.517716096Z" level=info msg="shim disconnected" id=b4c249b4fddad577f8ee0bf933c58b54ca3cdcd4cdf0f7f950e8fa849f54ba61 Oct 2 19:05:38.517766 env[1139]: time="2023-10-02T19:05:38.517764778Z" level=warning msg="cleaning up after shim disconnected" id=b4c249b4fddad577f8ee0bf933c58b54ca3cdcd4cdf0f7f950e8fa849f54ba61 namespace=k8s.io Oct 2 19:05:38.517766 env[1139]: time="2023-10-02T19:05:38.517774098Z" level=info msg="cleaning up dead shim" Oct 2 19:05:38.531396 env[1139]: time="2023-10-02T19:05:38.531341123Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:05:38Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2659 runtime=io.containerd.runc.v2\n" Oct 2 19:05:38.575012 kubelet[2007]: I1002 19:05:38.574965 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8-socket-dir\") pod \"csi-node-driver-vp4kr\" (UID: \"6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8\") " pod="calico-system/csi-node-driver-vp4kr" Oct 2 19:05:38.575236 kubelet[2007]: I1002 19:05:38.575090 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8-registration-dir\") pod \"csi-node-driver-vp4kr\" (UID: \"6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8\") " pod="calico-system/csi-node-driver-vp4kr" Oct 2 19:05:38.575236 kubelet[2007]: I1002 19:05:38.575145 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8-etccalico\") pod \"csi-node-driver-vp4kr\" (UID: \"6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8\") " pod="calico-system/csi-node-driver-vp4kr" Oct 2 19:05:38.575236 kubelet[2007]: I1002 19:05:38.575178 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/1c72268b-aac6-447a-851c-e4e6f761535e-config-volume\") pod \"coredns-5dd5756b68-hsmbh\" (UID: \"1c72268b-aac6-447a-851c-e4e6f761535e\") " pod="kube-system/coredns-5dd5756b68-hsmbh" Oct 2 19:05:38.575236 kubelet[2007]: I1002 19:05:38.575203 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rtf9s\" (UniqueName: \"kubernetes.io/projected/63f22f2d-0c3c-4e0c-8566-62ff386c04aa-kube-api-access-rtf9s\") pod \"calico-kube-controllers-74b9887bb6-g94f7\" (UID: \"63f22f2d-0c3c-4e0c-8566-62ff386c04aa\") " pod="calico-system/calico-kube-controllers-74b9887bb6-g94f7" Oct 2 19:05:38.575236 kubelet[2007]: I1002 19:05:38.575223 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8-kubelet-dir\") pod \"csi-node-driver-vp4kr\" (UID: \"6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8\") " pod="calico-system/csi-node-driver-vp4kr" Oct 2 19:05:38.575369 kubelet[2007]: I1002 19:05:38.575244 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/ef92d702-be63-4add-b3cb-5802a224a11e-config-volume\") pod \"coredns-5dd5756b68-z2z9h\" (UID: \"ef92d702-be63-4add-b3cb-5802a224a11e\") " pod="kube-system/coredns-5dd5756b68-z2z9h" Oct 2 19:05:38.575369 kubelet[2007]: I1002 19:05:38.575266 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dgn5d\" (UniqueName: \"kubernetes.io/projected/6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8-kube-api-access-dgn5d\") pod \"csi-node-driver-vp4kr\" (UID: \"6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8\") " pod="calico-system/csi-node-driver-vp4kr" Oct 2 19:05:38.575369 kubelet[2007]: I1002 19:05:38.575305 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x2v8w\" (UniqueName: \"kubernetes.io/projected/1c72268b-aac6-447a-851c-e4e6f761535e-kube-api-access-x2v8w\") pod \"coredns-5dd5756b68-hsmbh\" (UID: \"1c72268b-aac6-447a-851c-e4e6f761535e\") " pod="kube-system/coredns-5dd5756b68-hsmbh" Oct 2 19:05:38.575369 kubelet[2007]: I1002 19:05:38.575324 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z5wgp\" (UniqueName: \"kubernetes.io/projected/ef92d702-be63-4add-b3cb-5802a224a11e-kube-api-access-z5wgp\") pod \"coredns-5dd5756b68-z2z9h\" (UID: \"ef92d702-be63-4add-b3cb-5802a224a11e\") " pod="kube-system/coredns-5dd5756b68-z2z9h" Oct 2 19:05:38.575369 kubelet[2007]: I1002 19:05:38.575343 2007 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8-varrun\") pod \"csi-node-driver-vp4kr\" (UID: \"6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8\") " pod="calico-system/csi-node-driver-vp4kr" Oct 2 19:05:38.762693 kubelet[2007]: E1002 19:05:38.762648 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:38.765274 env[1139]: time="2023-10-02T19:05:38.765231338Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-z2z9h,Uid:ef92d702-be63-4add-b3cb-5802a224a11e,Namespace:kube-system,Attempt:0,}" Oct 2 19:05:38.769111 kubelet[2007]: E1002 19:05:38.769033 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:38.773328 env[1139]: time="2023-10-02T19:05:38.773293551Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-hsmbh,Uid:1c72268b-aac6-447a-851c-e4e6f761535e,Namespace:kube-system,Attempt:0,}" Oct 2 19:05:38.775227 env[1139]: time="2023-10-02T19:05:38.775186450Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-g94f7,Uid:63f22f2d-0c3c-4e0c-8566-62ff386c04aa,Namespace:calico-system,Attempt:0,}" Oct 2 19:05:38.781691 env[1139]: time="2023-10-02T19:05:38.781657093Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vp4kr,Uid:6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8,Namespace:calico-system,Attempt:0,}" Oct 2 19:05:38.915855 env[1139]: time="2023-10-02T19:05:38.915773978Z" level=error msg="Failed to destroy network for sandbox \"1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:05:38.916210 env[1139]: time="2023-10-02T19:05:38.916176071Z" level=error msg="encountered an error cleaning up failed sandbox \"1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:05:38.916257 env[1139]: time="2023-10-02T19:05:38.916234313Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-g94f7,Uid:63f22f2d-0c3c-4e0c-8566-62ff386c04aa,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:05:38.917471 kubelet[2007]: E1002 19:05:38.917436 2007 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:05:38.917596 kubelet[2007]: E1002 19:05:38.917526 2007 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-74b9887bb6-g94f7" Oct 2 19:05:38.917596 kubelet[2007]: E1002 19:05:38.917548 2007 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-74b9887bb6-g94f7" Oct 2 19:05:38.917999 kubelet[2007]: E1002 19:05:38.917850 2007 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-74b9887bb6-g94f7_calico-system(63f22f2d-0c3c-4e0c-8566-62ff386c04aa)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-74b9887bb6-g94f7_calico-system(63f22f2d-0c3c-4e0c-8566-62ff386c04aa)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-74b9887bb6-g94f7" podUID="63f22f2d-0c3c-4e0c-8566-62ff386c04aa" Oct 2 19:05:38.921888 env[1139]: time="2023-10-02T19:05:38.921836489Z" level=error msg="Failed to destroy network for sandbox \"0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:05:38.922278 env[1139]: time="2023-10-02T19:05:38.922234221Z" level=error msg="encountered an error cleaning up failed sandbox \"0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:05:38.922358 env[1139]: time="2023-10-02T19:05:38.922295103Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-hsmbh,Uid:1c72268b-aac6-447a-851c-e4e6f761535e,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:05:38.922967 kubelet[2007]: E1002 19:05:38.922560 2007 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:05:38.922967 kubelet[2007]: E1002 19:05:38.922605 2007 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-hsmbh" Oct 2 19:05:38.922967 kubelet[2007]: E1002 19:05:38.922627 2007 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-hsmbh" Oct 2 19:05:38.923098 kubelet[2007]: E1002 19:05:38.922673 2007 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-hsmbh_kube-system(1c72268b-aac6-447a-851c-e4e6f761535e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-hsmbh_kube-system(1c72268b-aac6-447a-851c-e4e6f761535e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-hsmbh" podUID="1c72268b-aac6-447a-851c-e4e6f761535e" Oct 2 19:05:38.929435 env[1139]: time="2023-10-02T19:05:38.929366605Z" level=error msg="Failed to destroy network for sandbox \"32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:05:38.929781 env[1139]: time="2023-10-02T19:05:38.929736496Z" level=error msg="encountered an error cleaning up failed sandbox \"32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:05:38.929826 env[1139]: time="2023-10-02T19:05:38.929790498Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-z2z9h,Uid:ef92d702-be63-4add-b3cb-5802a224a11e,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:05:38.930337 kubelet[2007]: E1002 19:05:38.929994 2007 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:05:38.930337 kubelet[2007]: E1002 19:05:38.930047 2007 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-z2z9h" Oct 2 19:05:38.930337 kubelet[2007]: E1002 19:05:38.930068 2007 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-z2z9h" Oct 2 19:05:38.930491 kubelet[2007]: E1002 19:05:38.930115 2007 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-z2z9h_kube-system(ef92d702-be63-4add-b3cb-5802a224a11e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-z2z9h_kube-system(ef92d702-be63-4add-b3cb-5802a224a11e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-z2z9h" podUID="ef92d702-be63-4add-b3cb-5802a224a11e" Oct 2 19:05:38.930667 env[1139]: time="2023-10-02T19:05:38.930625644Z" level=error msg="Failed to destroy network for sandbox \"54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:05:38.931125 env[1139]: time="2023-10-02T19:05:38.931088739Z" level=error msg="encountered an error cleaning up failed sandbox \"54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:05:38.931268 env[1139]: time="2023-10-02T19:05:38.931238383Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vp4kr,Uid:6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:05:38.931657 kubelet[2007]: E1002 19:05:38.931507 2007 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:05:38.931657 kubelet[2007]: E1002 19:05:38.931556 2007 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-vp4kr" Oct 2 19:05:38.931657 kubelet[2007]: E1002 19:05:38.931574 2007 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-vp4kr" Oct 2 19:05:38.931778 kubelet[2007]: E1002 19:05:38.931615 2007 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-vp4kr_calico-system(6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-vp4kr_calico-system(6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-vp4kr" podUID="6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8" Oct 2 19:05:39.285276 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a-shm.mount: Deactivated successfully. Oct 2 19:05:39.479663 kubelet[2007]: I1002 19:05:39.479623 2007 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" Oct 2 19:05:39.480288 env[1139]: time="2023-10-02T19:05:39.480232331Z" level=info msg="StopPodSandbox for \"1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8\"" Oct 2 19:05:39.484100 kubelet[2007]: I1002 19:05:39.483621 2007 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" Oct 2 19:05:39.484225 env[1139]: time="2023-10-02T19:05:39.484193932Z" level=info msg="StopPodSandbox for \"54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed\"" Oct 2 19:05:39.487607 kubelet[2007]: I1002 19:05:39.487446 2007 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" Oct 2 19:05:39.489423 env[1139]: time="2023-10-02T19:05:39.489384170Z" level=info msg="StopPodSandbox for \"0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c\"" Oct 2 19:05:39.492456 kubelet[2007]: I1002 19:05:39.491204 2007 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" Oct 2 19:05:39.492550 env[1139]: time="2023-10-02T19:05:39.491857965Z" level=info msg="StopPodSandbox for \"32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a\"" Oct 2 19:05:39.496817 kubelet[2007]: E1002 19:05:39.494101 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:39.498347 env[1139]: time="2023-10-02T19:05:39.497940311Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\"" Oct 2 19:05:39.530601 env[1139]: time="2023-10-02T19:05:39.530528583Z" level=error msg="StopPodSandbox for \"1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8\" failed" error="failed to destroy network for sandbox \"1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:05:39.531252 kubelet[2007]: E1002 19:05:39.531220 2007 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" Oct 2 19:05:39.531327 kubelet[2007]: E1002 19:05:39.531303 2007 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8"} Oct 2 19:05:39.531356 kubelet[2007]: E1002 19:05:39.531350 2007 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"63f22f2d-0c3c-4e0c-8566-62ff386c04aa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:05:39.531407 kubelet[2007]: E1002 19:05:39.531377 2007 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"63f22f2d-0c3c-4e0c-8566-62ff386c04aa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-74b9887bb6-g94f7" podUID="63f22f2d-0c3c-4e0c-8566-62ff386c04aa" Oct 2 19:05:39.538126 env[1139]: time="2023-10-02T19:05:39.537996651Z" level=error msg="StopPodSandbox for \"0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c\" failed" error="failed to destroy network for sandbox \"0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:05:39.538429 kubelet[2007]: E1002 19:05:39.538382 2007 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" Oct 2 19:05:39.538639 kubelet[2007]: E1002 19:05:39.538446 2007 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c"} Oct 2 19:05:39.538639 kubelet[2007]: E1002 19:05:39.538482 2007 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1c72268b-aac6-447a-851c-e4e6f761535e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:05:39.538639 kubelet[2007]: E1002 19:05:39.538512 2007 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1c72268b-aac6-447a-851c-e4e6f761535e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-hsmbh" podUID="1c72268b-aac6-447a-851c-e4e6f761535e" Oct 2 19:05:39.541969 env[1139]: time="2023-10-02T19:05:39.541918570Z" level=error msg="StopPodSandbox for \"54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed\" failed" error="failed to destroy network for sandbox \"54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:05:39.542316 kubelet[2007]: E1002 19:05:39.542212 2007 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" Oct 2 19:05:39.542505 kubelet[2007]: E1002 19:05:39.542492 2007 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed"} Oct 2 19:05:39.542552 kubelet[2007]: E1002 19:05:39.542542 2007 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:05:39.542603 kubelet[2007]: E1002 19:05:39.542581 2007 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-vp4kr" podUID="6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8" Oct 2 19:05:39.552881 env[1139]: time="2023-10-02T19:05:39.552827143Z" level=error msg="StopPodSandbox for \"32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a\" failed" error="failed to destroy network for sandbox \"32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:05:39.553192 kubelet[2007]: E1002 19:05:39.553156 2007 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" Oct 2 19:05:39.553252 kubelet[2007]: E1002 19:05:39.553201 2007 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a"} Oct 2 19:05:39.553252 kubelet[2007]: E1002 19:05:39.553236 2007 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ef92d702-be63-4add-b3cb-5802a224a11e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:05:39.553331 kubelet[2007]: E1002 19:05:39.553262 2007 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ef92d702-be63-4add-b3cb-5802a224a11e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-z2z9h" podUID="ef92d702-be63-4add-b3cb-5802a224a11e" Oct 2 19:05:40.499356 kubelet[2007]: I1002 19:05:40.499316 2007 eviction_manager.go:342] "Eviction manager: attempting to reclaim" resourceName="ephemeral-storage" Oct 2 19:05:40.502013 kubelet[2007]: I1002 19:05:40.499475 2007 container_gc.go:86] "Attempting to delete unused containers" Oct 2 19:05:40.502013 kubelet[2007]: I1002 19:05:40.501467 2007 image_gc_manager.go:340] "Attempting to delete unused images" Oct 2 19:05:40.504048 kubelet[2007]: I1002 19:05:40.504021 2007 image_gc_manager.go:400] "Removing image to free bytes" imageID="sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e" size=253553 Oct 2 19:05:40.504396 env[1139]: time="2023-10-02T19:05:40.504339271Z" level=info msg="RemoveImage \"sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e\"" Oct 2 19:05:40.505568 env[1139]: time="2023-10-02T19:05:40.505539666Z" level=info msg="ImageDelete event &ImageDelete{Name:registry.k8s.io/pause:3.6,XXX_unrecognized:[],}" Oct 2 19:05:40.506249 env[1139]: time="2023-10-02T19:05:40.506212326Z" level=info msg="ImageDelete event &ImageDelete{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,XXX_unrecognized:[],}" Oct 2 19:05:40.506681 env[1139]: time="2023-10-02T19:05:40.506655459Z" level=info msg="ImageDelete event &ImageDelete{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,XXX_unrecognized:[],}" Oct 2 19:05:40.509795 env[1139]: time="2023-10-02T19:05:40.509765191Z" level=info msg="RemoveImage \"sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e\" returns successfully" Oct 2 19:05:40.510157 kubelet[2007]: I1002 19:05:40.510127 2007 image_gc_manager.go:400] "Removing image to free bytes" imageID="sha256:9cdd6470f48c8b127530b7ce6ea4b3524137984481e48bcde619735890840ace" size=86464836 Oct 2 19:05:40.510340 env[1139]: time="2023-10-02T19:05:40.510317448Z" level=info msg="RemoveImage \"sha256:9cdd6470f48c8b127530b7ce6ea4b3524137984481e48bcde619735890840ace\"" Oct 2 19:05:40.512676 env[1139]: time="2023-10-02T19:05:40.512647917Z" level=info msg="ImageDelete event &ImageDelete{Name:registry.k8s.io/etcd:3.5.9-0,XXX_unrecognized:[],}" Oct 2 19:05:40.513185 env[1139]: time="2023-10-02T19:05:40.513153652Z" level=info msg="ImageDelete event &ImageDelete{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,XXX_unrecognized:[],}" Oct 2 19:05:40.513756 env[1139]: time="2023-10-02T19:05:40.513727669Z" level=info msg="ImageDelete event &ImageDelete{Name:sha256:9cdd6470f48c8b127530b7ce6ea4b3524137984481e48bcde619735890840ace,XXX_unrecognized:[],}" Oct 2 19:05:40.538743 env[1139]: time="2023-10-02T19:05:40.538698369Z" level=info msg="RemoveImage \"sha256:9cdd6470f48c8b127530b7ce6ea4b3524137984481e48bcde619735890840ace\" returns successfully" Oct 2 19:05:40.539012 kubelet[2007]: I1002 19:05:40.538917 2007 image_gc_manager.go:400] "Removing image to free bytes" imageID="sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108" size=14557471 Oct 2 19:05:40.539153 env[1139]: time="2023-10-02T19:05:40.539125661Z" level=info msg="RemoveImage \"sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108\"" Oct 2 19:05:40.540072 env[1139]: time="2023-10-02T19:05:40.540048209Z" level=info msg="ImageDelete event &ImageDelete{Name:registry.k8s.io/coredns/coredns:v1.10.1,XXX_unrecognized:[],}" Oct 2 19:05:40.540780 env[1139]: time="2023-10-02T19:05:40.540677147Z" level=info msg="ImageDelete event &ImageDelete{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,XXX_unrecognized:[],}" Oct 2 19:05:40.541270 env[1139]: time="2023-10-02T19:05:40.541244044Z" level=info msg="ImageDelete event &ImageDelete{Name:sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108,XXX_unrecognized:[],}" Oct 2 19:05:40.551226 env[1139]: time="2023-10-02T19:05:40.551187659Z" level=info msg="RemoveImage \"sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108\" returns successfully" Oct 2 19:05:40.561712 kubelet[2007]: I1002 19:05:40.561680 2007 eviction_manager.go:349] "Eviction manager: able to reduce resource pressure without evicting pods." resourceName="ephemeral-storage" Oct 2 19:05:43.654550 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount262115426.mount: Deactivated successfully. Oct 2 19:05:43.841369 env[1139]: time="2023-10-02T19:05:43.841309584Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:43.843670 env[1139]: time="2023-10-02T19:05:43.843624008Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8a2dff14388de51338e7468b834f0b37232379ce3cd97ac3c4a07b110a41ad00,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:43.845924 env[1139]: time="2023-10-02T19:05:43.845891270Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:43.848261 env[1139]: time="2023-10-02T19:05:43.848223854Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:43.848692 env[1139]: time="2023-10-02T19:05:43.848662666Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:8a2dff14388de51338e7468b834f0b37232379ce3cd97ac3c4a07b110a41ad00\"" Oct 2 19:05:43.851378 env[1139]: time="2023-10-02T19:05:43.851267977Z" level=info msg="CreateContainer within sandbox \"4c169f8ef9173ec3ae85ed8d76e41bc70d980a3d25c76b5bbeb8e0039b97daf7\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 2 19:05:43.876451 env[1139]: time="2023-10-02T19:05:43.876371906Z" level=info msg="CreateContainer within sandbox \"4c169f8ef9173ec3ae85ed8d76e41bc70d980a3d25c76b5bbeb8e0039b97daf7\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"3b20b7157f61fed0ccafbadbf58815084ecf4d7696dc5a445b425fb7df4e2883\"" Oct 2 19:05:43.877248 env[1139]: time="2023-10-02T19:05:43.877211569Z" level=info msg="StartContainer for \"3b20b7157f61fed0ccafbadbf58815084ecf4d7696dc5a445b425fb7df4e2883\"" Oct 2 19:05:43.903767 systemd[1]: Started cri-containerd-3b20b7157f61fed0ccafbadbf58815084ecf4d7696dc5a445b425fb7df4e2883.scope. Oct 2 19:05:43.963000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.966777 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 2 19:05:43.966880 kernel: audit: type=1400 audit(1696273543.963:1123): avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.966913 kernel: audit: type=1300 audit(1696273543.963:1123): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2424 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:43.963000 audit[2923]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2424 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:43.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362323062373135376636316665643063636166626164626635383831 Oct 2 19:05:43.972387 kernel: audit: type=1327 audit(1696273543.963:1123): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362323062373135376636316665643063636166626164626635383831 Oct 2 19:05:43.972496 kernel: audit: type=1400 audit(1696273543.963:1124): avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.963000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.974274 kernel: audit: type=1400 audit(1696273543.963:1124): avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.963000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.963000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.978185 kernel: audit: type=1400 audit(1696273543.963:1124): avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.978261 kernel: audit: type=1400 audit(1696273543.963:1124): avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.963000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.963000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.981951 kernel: audit: type=1400 audit(1696273543.963:1124): avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.982069 kernel: audit: type=1400 audit(1696273543.963:1124): avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.963000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.983608 kernel: audit: type=1400 audit(1696273543.963:1124): avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.963000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.963000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.963000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.963000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.963000 audit: BPF prog-id=139 op=LOAD Oct 2 19:05:43.963000 audit[2923]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=2424 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:43.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362323062373135376636316665643063636166626164626635383831 Oct 2 19:05:43.963000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.963000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.963000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.963000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.963000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.963000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.963000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.963000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.963000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.963000 audit: BPF prog-id=140 op=LOAD Oct 2 19:05:43.963000 audit[2923]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=2424 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:43.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362323062373135376636316665643063636166626164626635383831 Oct 2 19:05:43.965000 audit: BPF prog-id=140 op=UNLOAD Oct 2 19:05:43.965000 audit: BPF prog-id=139 op=UNLOAD Oct 2 19:05:43.965000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.965000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.965000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.965000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.965000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.965000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.965000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.965000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.965000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.965000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:43.965000 audit: BPF prog-id=141 op=LOAD Oct 2 19:05:43.965000 audit[2923]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=2424 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:43.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362323062373135376636316665643063636166626164626635383831 Oct 2 19:05:43.989751 env[1139]: time="2023-10-02T19:05:43.989708174Z" level=info msg="StartContainer for \"3b20b7157f61fed0ccafbadbf58815084ecf4d7696dc5a445b425fb7df4e2883\" returns successfully" Oct 2 19:05:44.137273 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 2 19:05:44.137390 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 2 19:05:44.506065 kubelet[2007]: E1002 19:05:44.506016 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:45.504000 audit[3071]: AVC avc: denied { write } for pid=3071 comm="tee" name="fd" dev="proc" ino=18709 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:05:45.504000 audit[3071]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffc804984 a2=241 a3=1b6 items=1 ppid=3020 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:45.504000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 2 19:05:45.504000 audit: PATH item=0 name="/dev/fd/63" inode=19592 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:45.504000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:05:45.508322 kubelet[2007]: E1002 19:05:45.508284 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:45.512000 audit[3075]: AVC avc: denied { write } for pid=3075 comm="tee" name="fd" dev="proc" ino=18719 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:05:45.512000 audit[3075]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc0af4993 a2=241 a3=1b6 items=1 ppid=3016 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:45.512000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 2 19:05:45.512000 audit: PATH item=0 name="/dev/fd/63" inode=17928 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:45.512000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:05:45.533214 systemd[1]: run-containerd-runc-k8s.io-3b20b7157f61fed0ccafbadbf58815084ecf4d7696dc5a445b425fb7df4e2883-runc.WjA83r.mount: Deactivated successfully. Oct 2 19:05:45.543000 audit[3087]: AVC avc: denied { write } for pid=3087 comm="tee" name="fd" dev="proc" ino=17304 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:05:45.543000 audit[3091]: AVC avc: denied { write } for pid=3091 comm="tee" name="fd" dev="proc" ino=17939 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:05:45.543000 audit[3091]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe586b993 a2=241 a3=1b6 items=1 ppid=3027 pid=3091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:45.543000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 2 19:05:45.543000 audit: PATH item=0 name="/dev/fd/63" inode=17936 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:45.543000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:05:45.543000 audit[3087]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff2b8b995 a2=241 a3=1b6 items=1 ppid=3024 pid=3087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:45.543000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 2 19:05:45.543000 audit: PATH item=0 name="/dev/fd/63" inode=18721 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:45.543000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:05:45.547000 audit[3079]: AVC avc: denied { write } for pid=3079 comm="tee" name="fd" dev="proc" ino=18735 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:05:45.547000 audit[3079]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd7072994 a2=241 a3=1b6 items=1 ppid=3014 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:45.547000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 2 19:05:45.547000 audit: PATH item=0 name="/dev/fd/63" inode=17296 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:45.547000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:05:45.560000 audit[3103]: AVC avc: denied { write } for pid=3103 comm="tee" name="fd" dev="proc" ino=18749 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:05:45.560000 audit[3103]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff3c6a983 a2=241 a3=1b6 items=1 ppid=3022 pid=3103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:45.560000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 2 19:05:45.560000 audit: PATH item=0 name="/dev/fd/63" inode=17308 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:45.560000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:05:45.562000 audit[3106]: AVC avc: denied { write } for pid=3106 comm="tee" name="fd" dev="proc" ino=18753 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:05:45.562000 audit[3106]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff5c2e993 a2=241 a3=1b6 items=1 ppid=3026 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:45.562000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 2 19:05:45.562000 audit: PATH item=0 name="/dev/fd/63" inode=17941 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:45.562000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:05:45.823000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:45.823000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:45.823000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:45.823000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:45.823000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:45.823000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:45.823000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:45.823000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:45.823000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:45.823000 audit: BPF prog-id=142 op=LOAD Oct 2 19:05:45.823000 audit[3185]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd7f518e8 a2=70 a3=0 items=0 ppid=3019 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:45.823000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:05:45.823000 audit: BPF prog-id=142 op=UNLOAD Oct 2 19:05:45.823000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:45.823000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:45.823000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:45.823000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:45.823000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:45.823000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:45.823000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:45.823000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:45.823000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:45.823000 audit: BPF prog-id=143 op=LOAD Oct 2 19:05:45.823000 audit[3185]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd7f518e8 a2=70 a3=4a174c items=0 ppid=3019 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:45.823000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:05:45.823000 audit: BPF prog-id=143 op=UNLOAD Oct 2 19:05:45.823000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:45.823000 audit[3185]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffd7f51918 a2=70 a3=118b279f items=0 ppid=3019 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:45.823000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:05:45.823000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:45.823000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:45.823000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:45.823000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:45.823000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:45.823000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:45.823000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:45.823000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:45.823000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:45.823000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:45.823000 audit: BPF prog-id=144 op=LOAD Oct 2 19:05:45.823000 audit[3185]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffd7f51868 a2=70 a3=118b27b9 items=0 ppid=3019 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:45.823000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:05:45.827000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:45.827000 audit[3189]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff19c4fe8 a2=70 a3=0 items=0 ppid=3019 pid=3189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:45.827000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:05:45.827000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:45.827000 audit[3189]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff19c4ec8 a2=70 a3=2 items=0 ppid=3019 pid=3189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:45.827000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:05:45.833000 audit: BPF prog-id=144 op=UNLOAD Oct 2 19:05:45.833000 audit[1034]: SYSCALL arch=c00000b7 syscall=220 success=yes exit=3197 a0=1200011 a1=0 a2=0 a3=0 items=0 ppid=1 pid=1034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-udevd" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:45.833000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-udevd" Oct 2 19:05:45.907000 audit[3218]: NETFILTER_CFG table=mangle:97 family=2 entries=19 op=nft_register_chain pid=3218 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:05:45.907000 audit[3218]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffe2b2f040 a2=0 a3=ffff8b7a8fa0 items=0 ppid=3019 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:45.907000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:05:45.910000 audit[3216]: NETFILTER_CFG table=raw:98 family=2 entries=19 op=nft_register_chain pid=3216 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:05:45.910000 audit[3216]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=ffffe04c7750 a2=0 a3=ffffb43cdfa0 items=0 ppid=3019 pid=3216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:45.910000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:05:45.915000 audit[3221]: NETFILTER_CFG table=nat:99 family=2 entries=16 op=nft_register_chain pid=3221 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:05:45.915000 audit[3221]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=ffffde7d3bb0 a2=0 a3=ffff98010fa0 items=0 ppid=3019 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:45.915000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:05:45.915000 audit[3217]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=3217 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:05:45.915000 audit[3217]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=ffffe6c3c0d0 a2=0 a3=ffff869e0fa0 items=0 ppid=3019 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:45.915000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:05:46.722105 systemd-networkd[1043]: vxlan.calico: Link UP Oct 2 19:05:46.722111 systemd-networkd[1043]: vxlan.calico: Gained carrier Oct 2 19:05:48.337554 systemd-networkd[1043]: vxlan.calico: Gained IPv6LL Oct 2 19:05:50.408075 env[1139]: time="2023-10-02T19:05:50.407819874Z" level=info msg="StopPodSandbox for \"1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8\"" Oct 2 19:05:50.447196 systemd[1]: run-containerd-runc-k8s.io-3b20b7157f61fed0ccafbadbf58815084ecf4d7696dc5a445b425fb7df4e2883-runc.Wo8bL5.mount: Deactivated successfully. Oct 2 19:05:50.541574 kubelet[2007]: E1002 19:05:50.541502 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:50.553122 kubelet[2007]: I1002 19:05:50.552808 2007 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-zdhnd" podStartSLOduration=7.289237617 podCreationTimestamp="2023-10-02 19:05:30 +0000 UTC" firstStartedPulling="2023-10-02 19:05:30.585382146 +0000 UTC m=+20.317843068" lastFinishedPulling="2023-10-02 19:05:43.848914433 +0000 UTC m=+33.581375355" observedRunningTime="2023-10-02 19:05:44.523139104 +0000 UTC m=+34.255600066" watchObservedRunningTime="2023-10-02 19:05:50.552769904 +0000 UTC m=+40.285230826" Oct 2 19:05:50.583891 kubelet[2007]: I1002 19:05:50.583845 2007 eviction_manager.go:342] "Eviction manager: attempting to reclaim" resourceName="ephemeral-storage" Oct 2 19:05:50.583891 kubelet[2007]: I1002 19:05:50.583894 2007 container_gc.go:86] "Attempting to delete unused containers" Oct 2 19:05:50.585900 kubelet[2007]: I1002 19:05:50.585873 2007 image_gc_manager.go:340] "Attempting to delete unused images" Oct 2 19:05:50.603575 kubelet[2007]: I1002 19:05:50.603541 2007 eviction_manager.go:353] "Eviction manager: must evict pod(s) to reclaim" resourceName="ephemeral-storage" Oct 2 19:05:50.604088 kubelet[2007]: I1002 19:05:50.604029 2007 eviction_manager.go:371] "Eviction manager: pods ranked for eviction" pods=["kube-system/coredns-5dd5756b68-z2z9h","kube-system/coredns-5dd5756b68-hsmbh","calico-system/calico-kube-controllers-74b9887bb6-g94f7","calico-system/csi-node-driver-vp4kr","tigera-operator/tigera-operator-8547bd6cc6-vqvhs","calico-system/calico-typha-77b6cfc648-8w7zr","calico-system/calico-node-zdhnd","kube-system/kube-controller-manager-localhost","kube-system/kube-proxy-8qr5v","kube-system/kube-apiserver-localhost","kube-system/kube-scheduler-localhost"] Oct 2 19:05:50.604238 kubelet[2007]: E1002 19:05:50.604222 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="kube-system/coredns-5dd5756b68-z2z9h" Oct 2 19:05:50.604306 kubelet[2007]: E1002 19:05:50.604240 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="kube-system/coredns-5dd5756b68-hsmbh" Oct 2 19:05:50.604306 kubelet[2007]: E1002 19:05:50.604251 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="calico-system/calico-kube-controllers-74b9887bb6-g94f7" Oct 2 19:05:50.604306 kubelet[2007]: E1002 19:05:50.604260 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="calico-system/csi-node-driver-vp4kr" Oct 2 19:05:50.605378 env[1139]: time="2023-10-02T19:05:50.605337868Z" level=info msg="StopContainer for \"dbdb52964b14d43bc78f0dbe6304a55bb1b9a19350318e3ab2a2e63838c6e818\" with timeout 30 (s)" Oct 2 19:05:50.609164 env[1139]: time="2023-10-02T19:05:50.607599882Z" level=info msg="Stop container \"dbdb52964b14d43bc78f0dbe6304a55bb1b9a19350318e3ab2a2e63838c6e818\" with signal terminated" Oct 2 19:05:50.618261 systemd[1]: cri-containerd-dbdb52964b14d43bc78f0dbe6304a55bb1b9a19350318e3ab2a2e63838c6e818.scope: Deactivated successfully. Oct 2 19:05:50.620256 kernel: kauditd_printk_skb: 131 callbacks suppressed Oct 2 19:05:50.620313 kernel: audit: type=1334 audit(1696273550.618:1149): prog-id=117 op=UNLOAD Oct 2 19:05:50.618000 audit: BPF prog-id=117 op=UNLOAD Oct 2 19:05:50.618608 systemd[1]: cri-containerd-dbdb52964b14d43bc78f0dbe6304a55bb1b9a19350318e3ab2a2e63838c6e818.scope: Consumed 2.126s CPU time. Oct 2 19:05:50.623000 audit: BPF prog-id=120 op=UNLOAD Oct 2 19:05:50.624447 kernel: audit: type=1334 audit(1696273550.623:1150): prog-id=120 op=UNLOAD Oct 2 19:05:50.641696 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-dbdb52964b14d43bc78f0dbe6304a55bb1b9a19350318e3ab2a2e63838c6e818-rootfs.mount: Deactivated successfully. Oct 2 19:05:50.674592 env[1139]: 2023-10-02 19:05:50.559 [INFO][3272] k8s.go 576: Cleaning up netns ContainerID="1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" Oct 2 19:05:50.674592 env[1139]: 2023-10-02 19:05:50.559 [INFO][3272] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" iface="eth0" netns="/var/run/netns/cni-65bf37fc-47ab-9e74-516c-82ea26427063" Oct 2 19:05:50.674592 env[1139]: 2023-10-02 19:05:50.560 [INFO][3272] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" iface="eth0" netns="/var/run/netns/cni-65bf37fc-47ab-9e74-516c-82ea26427063" Oct 2 19:05:50.674592 env[1139]: 2023-10-02 19:05:50.561 [INFO][3272] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" iface="eth0" netns="/var/run/netns/cni-65bf37fc-47ab-9e74-516c-82ea26427063" Oct 2 19:05:50.674592 env[1139]: 2023-10-02 19:05:50.561 [INFO][3272] k8s.go 583: Releasing IP address(es) ContainerID="1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" Oct 2 19:05:50.674592 env[1139]: 2023-10-02 19:05:50.561 [INFO][3272] utils.go 196: Calico CNI releasing IP address ContainerID="1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" Oct 2 19:05:50.674592 env[1139]: 2023-10-02 19:05:50.658 [INFO][3301] ipam_plugin.go 416: Releasing address using handleID ContainerID="1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" HandleID="k8s-pod-network.1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" Workload="localhost-k8s-calico--kube--controllers--74b9887bb6--g94f7-eth0" Oct 2 19:05:50.674592 env[1139]: time="2023-10-02T19:05:50Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:05:50.674592 env[1139]: time="2023-10-02T19:05:50Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:05:50.674592 env[1139]: 2023-10-02 19:05:50.668 [WARNING][3301] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" HandleID="k8s-pod-network.1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" Workload="localhost-k8s-calico--kube--controllers--74b9887bb6--g94f7-eth0" Oct 2 19:05:50.674592 env[1139]: 2023-10-02 19:05:50.668 [INFO][3301] ipam_plugin.go 444: Releasing address using workloadID ContainerID="1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" HandleID="k8s-pod-network.1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" Workload="localhost-k8s-calico--kube--controllers--74b9887bb6--g94f7-eth0" Oct 2 19:05:50.674592 env[1139]: time="2023-10-02T19:05:50Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:05:50.674592 env[1139]: 2023-10-02 19:05:50.673 [INFO][3272] k8s.go 589: Teardown processing complete. ContainerID="1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" Oct 2 19:05:50.675600 env[1139]: time="2023-10-02T19:05:50.675287963Z" level=info msg="TearDown network for sandbox \"1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8\" successfully" Oct 2 19:05:50.675600 env[1139]: time="2023-10-02T19:05:50.675324844Z" level=info msg="StopPodSandbox for \"1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8\" returns successfully" Oct 2 19:05:50.676546 systemd[1]: run-netns-cni\x2d65bf37fc\x2d47ab\x2d9e74\x2d516c\x2d82ea26427063.mount: Deactivated successfully. Oct 2 19:05:50.677643 env[1139]: time="2023-10-02T19:05:50.677607298Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-g94f7,Uid:63f22f2d-0c3c-4e0c-8566-62ff386c04aa,Namespace:calico-system,Attempt:1,}" Oct 2 19:05:50.775271 env[1139]: time="2023-10-02T19:05:50.775225968Z" level=info msg="shim disconnected" id=dbdb52964b14d43bc78f0dbe6304a55bb1b9a19350318e3ab2a2e63838c6e818 Oct 2 19:05:50.775555 env[1139]: time="2023-10-02T19:05:50.775529935Z" level=warning msg="cleaning up after shim disconnected" id=dbdb52964b14d43bc78f0dbe6304a55bb1b9a19350318e3ab2a2e63838c6e818 namespace=k8s.io Oct 2 19:05:50.775669 env[1139]: time="2023-10-02T19:05:50.775652498Z" level=info msg="cleaning up dead shim" Oct 2 19:05:50.784698 env[1139]: time="2023-10-02T19:05:50.784658151Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:05:50Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3328 runtime=io.containerd.runc.v2\n" Oct 2 19:05:50.789869 env[1139]: time="2023-10-02T19:05:50.789830434Z" level=info msg="StopContainer for \"dbdb52964b14d43bc78f0dbe6304a55bb1b9a19350318e3ab2a2e63838c6e818\" returns successfully" Oct 2 19:05:50.790591 env[1139]: time="2023-10-02T19:05:50.790562571Z" level=info msg="StopPodSandbox for \"5749ab6208339d87230d1e877a06c5542a1397eae57687aa51d384cf169a03d6\"" Oct 2 19:05:50.790739 env[1139]: time="2023-10-02T19:05:50.790718055Z" level=info msg="Container to stop \"dbdb52964b14d43bc78f0dbe6304a55bb1b9a19350318e3ab2a2e63838c6e818\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Oct 2 19:05:50.798098 systemd[1]: cri-containerd-5749ab6208339d87230d1e877a06c5542a1397eae57687aa51d384cf169a03d6.scope: Deactivated successfully. Oct 2 19:05:50.797000 audit: BPF prog-id=113 op=UNLOAD Oct 2 19:05:50.799434 kernel: audit: type=1334 audit(1696273550.797:1151): prog-id=113 op=UNLOAD Oct 2 19:05:50.803000 audit: BPF prog-id=116 op=UNLOAD Oct 2 19:05:50.804435 kernel: audit: type=1334 audit(1696273550.803:1152): prog-id=116 op=UNLOAD Oct 2 19:05:50.823664 env[1139]: time="2023-10-02T19:05:50.823617553Z" level=info msg="shim disconnected" id=5749ab6208339d87230d1e877a06c5542a1397eae57687aa51d384cf169a03d6 Oct 2 19:05:50.823877 env[1139]: time="2023-10-02T19:05:50.823856599Z" level=warning msg="cleaning up after shim disconnected" id=5749ab6208339d87230d1e877a06c5542a1397eae57687aa51d384cf169a03d6 namespace=k8s.io Oct 2 19:05:50.823936 env[1139]: time="2023-10-02T19:05:50.823923720Z" level=info msg="cleaning up dead shim" Oct 2 19:05:50.832303 env[1139]: time="2023-10-02T19:05:50.832264118Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:05:50Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3359 runtime=io.containerd.runc.v2\n" Oct 2 19:05:50.832787 env[1139]: time="2023-10-02T19:05:50.832732489Z" level=info msg="TearDown network for sandbox \"5749ab6208339d87230d1e877a06c5542a1397eae57687aa51d384cf169a03d6\" successfully" Oct 2 19:05:50.832886 env[1139]: time="2023-10-02T19:05:50.832867172Z" level=info msg="StopPodSandbox for \"5749ab6208339d87230d1e877a06c5542a1397eae57687aa51d384cf169a03d6\" returns successfully" Oct 2 19:05:50.837201 kubelet[2007]: I1002 19:05:50.837160 2007 eviction_manager.go:592] "Eviction manager: pod is evicted successfully" pod="tigera-operator/tigera-operator-8547bd6cc6-vqvhs" Oct 2 19:05:50.837468 kubelet[2007]: I1002 19:05:50.837452 2007 eviction_manager.go:201] "Eviction manager: pods evicted, waiting for pod to be cleaned up" pods=["tigera-operator/tigera-operator-8547bd6cc6-vqvhs"] Oct 2 19:05:50.864020 kubelet[2007]: I1002 19:05:50.863898 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-c76kq" nodeCondition=["DiskPressure"] Oct 2 19:05:50.884033 kubelet[2007]: I1002 19:05:50.883994 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-99phx" nodeCondition=["DiskPressure"] Oct 2 19:05:50.907185 kubelet[2007]: I1002 19:05:50.906981 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-jw28f" nodeCondition=["DiskPressure"] Oct 2 19:05:50.935281 kubelet[2007]: I1002 19:05:50.935155 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-fr5c6" nodeCondition=["DiskPressure"] Oct 2 19:05:50.959202 kubelet[2007]: I1002 19:05:50.959149 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-qnzt2" nodeCondition=["DiskPressure"] Oct 2 19:05:50.962343 kubelet[2007]: I1002 19:05:50.962309 2007 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/0ddf427c-7baf-4a1e-8e72-80d2c8664c54-var-lib-calico\") pod \"0ddf427c-7baf-4a1e-8e72-80d2c8664c54\" (UID: \"0ddf427c-7baf-4a1e-8e72-80d2c8664c54\") " Oct 2 19:05:50.962343 kubelet[2007]: I1002 19:05:50.962370 2007 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-mm9j8\" (UniqueName: \"kubernetes.io/projected/0ddf427c-7baf-4a1e-8e72-80d2c8664c54-kube-api-access-mm9j8\") pod \"0ddf427c-7baf-4a1e-8e72-80d2c8664c54\" (UID: \"0ddf427c-7baf-4a1e-8e72-80d2c8664c54\") " Oct 2 19:05:50.964731 kubelet[2007]: I1002 19:05:50.964690 2007 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/0ddf427c-7baf-4a1e-8e72-80d2c8664c54-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "0ddf427c-7baf-4a1e-8e72-80d2c8664c54" (UID: "0ddf427c-7baf-4a1e-8e72-80d2c8664c54"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:05:50.970863 kubelet[2007]: I1002 19:05:50.970771 2007 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/0ddf427c-7baf-4a1e-8e72-80d2c8664c54-kube-api-access-mm9j8" (OuterVolumeSpecName: "kube-api-access-mm9j8") pod "0ddf427c-7baf-4a1e-8e72-80d2c8664c54" (UID: "0ddf427c-7baf-4a1e-8e72-80d2c8664c54"). InnerVolumeSpecName "kube-api-access-mm9j8". PluginName "kubernetes.io/projected", VolumeGidValue "" Oct 2 19:05:50.976949 kubelet[2007]: I1002 19:05:50.976909 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-v4gqf" nodeCondition=["DiskPressure"] Oct 2 19:05:50.998042 kubelet[2007]: I1002 19:05:50.997985 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-xfmx8" nodeCondition=["DiskPressure"] Oct 2 19:05:51.063289 kubelet[2007]: I1002 19:05:51.063248 2007 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-mm9j8\" (UniqueName: \"kubernetes.io/projected/0ddf427c-7baf-4a1e-8e72-80d2c8664c54-kube-api-access-mm9j8\") on node \"localhost\" DevicePath \"\"" Oct 2 19:05:51.063289 kubelet[2007]: I1002 19:05:51.063283 2007 reconciler_common.go:300] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/0ddf427c-7baf-4a1e-8e72-80d2c8664c54-var-lib-calico\") on node \"localhost\" DevicePath \"\"" Oct 2 19:05:51.104453 kubelet[2007]: I1002 19:05:51.104386 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-nbwdt" nodeCondition=["DiskPressure"] Oct 2 19:05:51.128377 env[1139]: time="2023-10-02T19:05:51.128330151Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:51.130010 env[1139]: time="2023-10-02T19:05:51.129972109Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:51.132098 env[1139]: time="2023-10-02T19:05:51.132061638Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:51.134196 env[1139]: time="2023-10-02T19:05:51.134162846Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:51.249048 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:05:51.249182 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali31e75c5c6ef: link becomes ready Oct 2 19:05:51.256372 kubelet[2007]: I1002 19:05:51.256329 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-4gwn7" nodeCondition=["DiskPressure"] Oct 2 19:05:51.264727 systemd-networkd[1043]: cali31e75c5c6ef: Link UP Oct 2 19:05:51.264732 systemd-networkd[1043]: cali31e75c5c6ef: Gained carrier Oct 2 19:05:51.278639 env[1139]: 2023-10-02 19:05:51.177 [INFO][3374] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--74b9887bb6--g94f7-eth0 calico-kube-controllers-74b9887bb6- calico-system 63f22f2d-0c3c-4e0c-8566-62ff386c04aa 684 0 2023-10-02 19:05:30 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:74b9887bb6 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-74b9887bb6-g94f7 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali31e75c5c6ef [] []}} ContainerID="1a69edd2fc5244c3e9a9c3e8bf8b8266b3eb1b74533daf9c3e3c32aa5a5e2741" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-g94f7" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74b9887bb6--g94f7-" Oct 2 19:05:51.278639 env[1139]: 2023-10-02 19:05:51.178 [INFO][3374] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="1a69edd2fc5244c3e9a9c3e8bf8b8266b3eb1b74533daf9c3e3c32aa5a5e2741" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-g94f7" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74b9887bb6--g94f7-eth0" Oct 2 19:05:51.278639 env[1139]: 2023-10-02 19:05:51.206 [INFO][3387] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1a69edd2fc5244c3e9a9c3e8bf8b8266b3eb1b74533daf9c3e3c32aa5a5e2741" HandleID="k8s-pod-network.1a69edd2fc5244c3e9a9c3e8bf8b8266b3eb1b74533daf9c3e3c32aa5a5e2741" Workload="localhost-k8s-calico--kube--controllers--74b9887bb6--g94f7-eth0" Oct 2 19:05:51.278639 env[1139]: 2023-10-02 19:05:51.218 [INFO][3387] ipam_plugin.go 269: Auto assigning IP ContainerID="1a69edd2fc5244c3e9a9c3e8bf8b8266b3eb1b74533daf9c3e3c32aa5a5e2741" HandleID="k8s-pod-network.1a69edd2fc5244c3e9a9c3e8bf8b8266b3eb1b74533daf9c3e3c32aa5a5e2741" Workload="localhost-k8s-calico--kube--controllers--74b9887bb6--g94f7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000414e90), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-74b9887bb6-g94f7", "timestamp":"2023-10-02 19:05:51.206666332 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:05:51.278639 env[1139]: time="2023-10-02T19:05:51Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:05:51.278639 env[1139]: time="2023-10-02T19:05:51Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:05:51.278639 env[1139]: 2023-10-02 19:05:51.218 [INFO][3387] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Oct 2 19:05:51.278639 env[1139]: 2023-10-02 19:05:51.220 [INFO][3387] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1a69edd2fc5244c3e9a9c3e8bf8b8266b3eb1b74533daf9c3e3c32aa5a5e2741" host="localhost" Oct 2 19:05:51.278639 env[1139]: 2023-10-02 19:05:51.226 [INFO][3387] ipam.go 372: Looking up existing affinities for host host="localhost" Oct 2 19:05:51.278639 env[1139]: 2023-10-02 19:05:51.229 [INFO][3387] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Oct 2 19:05:51.278639 env[1139]: 2023-10-02 19:05:51.231 [INFO][3387] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Oct 2 19:05:51.278639 env[1139]: 2023-10-02 19:05:51.232 [INFO][3387] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Oct 2 19:05:51.278639 env[1139]: 2023-10-02 19:05:51.233 [INFO][3387] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.1a69edd2fc5244c3e9a9c3e8bf8b8266b3eb1b74533daf9c3e3c32aa5a5e2741" host="localhost" Oct 2 19:05:51.278639 env[1139]: 2023-10-02 19:05:51.234 [INFO][3387] ipam.go 1682: Creating new handle: k8s-pod-network.1a69edd2fc5244c3e9a9c3e8bf8b8266b3eb1b74533daf9c3e3c32aa5a5e2741 Oct 2 19:05:51.278639 env[1139]: 2023-10-02 19:05:51.237 [INFO][3387] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.1a69edd2fc5244c3e9a9c3e8bf8b8266b3eb1b74533daf9c3e3c32aa5a5e2741" host="localhost" Oct 2 19:05:51.278639 env[1139]: 2023-10-02 19:05:51.243 [INFO][3387] ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.1a69edd2fc5244c3e9a9c3e8bf8b8266b3eb1b74533daf9c3e3c32aa5a5e2741" host="localhost" Oct 2 19:05:51.278639 env[1139]: 2023-10-02 19:05:51.243 [INFO][3387] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.1a69edd2fc5244c3e9a9c3e8bf8b8266b3eb1b74533daf9c3e3c32aa5a5e2741" host="localhost" Oct 2 19:05:51.278639 env[1139]: time="2023-10-02T19:05:51Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:05:51.278639 env[1139]: 2023-10-02 19:05:51.244 [INFO][3387] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="1a69edd2fc5244c3e9a9c3e8bf8b8266b3eb1b74533daf9c3e3c32aa5a5e2741" HandleID="k8s-pod-network.1a69edd2fc5244c3e9a9c3e8bf8b8266b3eb1b74533daf9c3e3c32aa5a5e2741" Workload="localhost-k8s-calico--kube--controllers--74b9887bb6--g94f7-eth0" Oct 2 19:05:51.279253 env[1139]: 2023-10-02 19:05:51.246 [INFO][3374] k8s.go 383: Populated endpoint ContainerID="1a69edd2fc5244c3e9a9c3e8bf8b8266b3eb1b74533daf9c3e3c32aa5a5e2741" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-g94f7" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74b9887bb6--g94f7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--74b9887bb6--g94f7-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"63f22f2d-0c3c-4e0c-8566-62ff386c04aa", ResourceVersion:"684", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 5, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-74b9887bb6-g94f7", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali31e75c5c6ef", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:05:51.279253 env[1139]: 2023-10-02 19:05:51.246 [INFO][3374] k8s.go 384: Calico CNI using IPs: [192.168.88.129/32] ContainerID="1a69edd2fc5244c3e9a9c3e8bf8b8266b3eb1b74533daf9c3e3c32aa5a5e2741" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-g94f7" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74b9887bb6--g94f7-eth0" Oct 2 19:05:51.279253 env[1139]: 2023-10-02 19:05:51.246 [INFO][3374] dataplane_linux.go 68: Setting the host side veth name to cali31e75c5c6ef ContainerID="1a69edd2fc5244c3e9a9c3e8bf8b8266b3eb1b74533daf9c3e3c32aa5a5e2741" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-g94f7" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74b9887bb6--g94f7-eth0" Oct 2 19:05:51.279253 env[1139]: 2023-10-02 19:05:51.249 [INFO][3374] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="1a69edd2fc5244c3e9a9c3e8bf8b8266b3eb1b74533daf9c3e3c32aa5a5e2741" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-g94f7" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74b9887bb6--g94f7-eth0" Oct 2 19:05:51.279253 env[1139]: 2023-10-02 19:05:51.263 [INFO][3374] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="1a69edd2fc5244c3e9a9c3e8bf8b8266b3eb1b74533daf9c3e3c32aa5a5e2741" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-g94f7" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74b9887bb6--g94f7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--74b9887bb6--g94f7-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"63f22f2d-0c3c-4e0c-8566-62ff386c04aa", ResourceVersion:"684", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 5, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1a69edd2fc5244c3e9a9c3e8bf8b8266b3eb1b74533daf9c3e3c32aa5a5e2741", Pod:"calico-kube-controllers-74b9887bb6-g94f7", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali31e75c5c6ef", MAC:"06:b0:5a:4c:1c:50", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:05:51.279253 env[1139]: 2023-10-02 19:05:51.272 [INFO][3374] k8s.go 489: Wrote updated endpoint to datastore ContainerID="1a69edd2fc5244c3e9a9c3e8bf8b8266b3eb1b74533daf9c3e3c32aa5a5e2741" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-g94f7" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--74b9887bb6--g94f7-eth0" Oct 2 19:05:51.288000 audit[3410]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=3410 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:05:51.288000 audit[3410]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=fffffc1cc8f0 a2=0 a3=ffffbd21dfa0 items=0 ppid=3019 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:51.293161 kernel: audit: type=1325 audit(1696273551.288:1153): table=filter:101 family=2 entries=36 op=nft_register_chain pid=3410 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:05:51.293250 kernel: audit: type=1300 audit(1696273551.288:1153): arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=fffffc1cc8f0 a2=0 a3=ffffbd21dfa0 items=0 ppid=3019 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:51.293280 kernel: audit: type=1327 audit(1696273551.288:1153): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:05:51.288000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:05:51.296156 env[1139]: time="2023-10-02T19:05:51.296104692Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:05:51.296292 env[1139]: time="2023-10-02T19:05:51.296142453Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:05:51.296292 env[1139]: time="2023-10-02T19:05:51.296153373Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:05:51.296384 env[1139]: time="2023-10-02T19:05:51.296309457Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1a69edd2fc5244c3e9a9c3e8bf8b8266b3eb1b74533daf9c3e3c32aa5a5e2741 pid=3419 runtime=io.containerd.runc.v2 Oct 2 19:05:51.309223 systemd[1]: Started cri-containerd-1a69edd2fc5244c3e9a9c3e8bf8b8266b3eb1b74533daf9c3e3c32aa5a5e2741.scope. Oct 2 19:05:51.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.337903 kernel: audit: type=1400 audit(1696273551.332:1154): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.337968 kernel: audit: type=1400 audit(1696273551.332:1155): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.337987 kernel: audit: type=1400 audit(1696273551.332:1156): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.335000 audit: BPF prog-id=145 op=LOAD Oct 2 19:05:51.337000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.337000 audit[3429]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3419 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:51.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161363965646432666335323434633365396139633365386266386238 Oct 2 19:05:51.338000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.338000 audit[3429]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3419 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:51.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161363965646432666335323434633365396139633365386266386238 Oct 2 19:05:51.338000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.338000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.338000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.338000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.338000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.338000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.338000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.338000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.338000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.338000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.338000 audit: BPF prog-id=146 op=LOAD Oct 2 19:05:51.338000 audit[3429]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3419 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:51.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161363965646432666335323434633365396139633365386266386238 Oct 2 19:05:51.339000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.339000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.339000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.339000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.339000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.339000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.339000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.339000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.339000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.339000 audit: BPF prog-id=147 op=LOAD Oct 2 19:05:51.339000 audit[3429]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3419 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:51.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161363965646432666335323434633365396139633365386266386238 Oct 2 19:05:51.339000 audit: BPF prog-id=147 op=UNLOAD Oct 2 19:05:51.339000 audit: BPF prog-id=146 op=UNLOAD Oct 2 19:05:51.340000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.340000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.340000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.340000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.340000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.340000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.340000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.340000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.340000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.340000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:51.340000 audit: BPF prog-id=148 op=LOAD Oct 2 19:05:51.340000 audit[3429]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3419 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:51.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161363965646432666335323434633365396139633365386266386238 Oct 2 19:05:51.341876 systemd-resolved[1085]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 2 19:05:51.367463 env[1139]: time="2023-10-02T19:05:51.367404750Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-g94f7,Uid:63f22f2d-0c3c-4e0c-8566-62ff386c04aa,Namespace:calico-system,Attempt:1,} returns sandbox id \"1a69edd2fc5244c3e9a9c3e8bf8b8266b3eb1b74533daf9c3e3c32aa5a5e2741\"" Oct 2 19:05:51.369370 env[1139]: time="2023-10-02T19:05:51.369340475Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\"" Oct 2 19:05:51.405311 kubelet[2007]: I1002 19:05:51.405028 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-mvkp7" nodeCondition=["DiskPressure"] Oct 2 19:05:51.444877 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5749ab6208339d87230d1e877a06c5542a1397eae57687aa51d384cf169a03d6-rootfs.mount: Deactivated successfully. Oct 2 19:05:51.444964 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5749ab6208339d87230d1e877a06c5542a1397eae57687aa51d384cf169a03d6-shm.mount: Deactivated successfully. Oct 2 19:05:51.445017 systemd[1]: var-lib-kubelet-pods-0ddf427c\x2d7baf\x2d4a1e\x2d8e72\x2d80d2c8664c54-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dmm9j8.mount: Deactivated successfully. Oct 2 19:05:51.519785 kubelet[2007]: I1002 19:05:51.519614 2007 scope.go:117] "RemoveContainer" containerID="dbdb52964b14d43bc78f0dbe6304a55bb1b9a19350318e3ab2a2e63838c6e818" Oct 2 19:05:51.521474 env[1139]: time="2023-10-02T19:05:51.521410091Z" level=info msg="RemoveContainer for \"dbdb52964b14d43bc78f0dbe6304a55bb1b9a19350318e3ab2a2e63838c6e818\"" Oct 2 19:05:51.523755 systemd[1]: Removed slice kubepods-besteffort-pod0ddf427c_7baf_4a1e_8e72_80d2c8664c54.slice. Oct 2 19:05:51.523835 systemd[1]: kubepods-besteffort-pod0ddf427c_7baf_4a1e_8e72_80d2c8664c54.slice: Consumed 2.168s CPU time. Oct 2 19:05:51.530534 env[1139]: time="2023-10-02T19:05:51.530482861Z" level=info msg="RemoveContainer for \"dbdb52964b14d43bc78f0dbe6304a55bb1b9a19350318e3ab2a2e63838c6e818\" returns successfully" Oct 2 19:05:51.530830 kubelet[2007]: I1002 19:05:51.530805 2007 scope.go:117] "RemoveContainer" containerID="dbdb52964b14d43bc78f0dbe6304a55bb1b9a19350318e3ab2a2e63838c6e818" Oct 2 19:05:51.531131 env[1139]: time="2023-10-02T19:05:51.531045115Z" level=error msg="ContainerStatus for \"dbdb52964b14d43bc78f0dbe6304a55bb1b9a19350318e3ab2a2e63838c6e818\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"dbdb52964b14d43bc78f0dbe6304a55bb1b9a19350318e3ab2a2e63838c6e818\": not found" Oct 2 19:05:51.531467 kubelet[2007]: E1002 19:05:51.531447 2007 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"dbdb52964b14d43bc78f0dbe6304a55bb1b9a19350318e3ab2a2e63838c6e818\": not found" containerID="dbdb52964b14d43bc78f0dbe6304a55bb1b9a19350318e3ab2a2e63838c6e818" Oct 2 19:05:51.531587 kubelet[2007]: I1002 19:05:51.531575 2007 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"dbdb52964b14d43bc78f0dbe6304a55bb1b9a19350318e3ab2a2e63838c6e818"} err="failed to get container status \"dbdb52964b14d43bc78f0dbe6304a55bb1b9a19350318e3ab2a2e63838c6e818\": rpc error: code = NotFound desc = an error occurred when try to find container \"dbdb52964b14d43bc78f0dbe6304a55bb1b9a19350318e3ab2a2e63838c6e818\": not found" Oct 2 19:05:51.554754 kubelet[2007]: I1002 19:05:51.554724 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-972kw" nodeCondition=["DiskPressure"] Oct 2 19:05:51.705436 kubelet[2007]: I1002 19:05:51.705381 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-qvm2m" nodeCondition=["DiskPressure"] Oct 2 19:05:51.838033 kubelet[2007]: I1002 19:05:51.837928 2007 eviction_manager.go:423] "Eviction manager: pods successfully cleaned up" pods=["tigera-operator/tigera-operator-8547bd6cc6-vqvhs"] Oct 2 19:05:51.856744 kubelet[2007]: I1002 19:05:51.856709 2007 eviction_manager.go:342] "Eviction manager: attempting to reclaim" resourceName="ephemeral-storage" Oct 2 19:05:51.857201 kubelet[2007]: I1002 19:05:51.857181 2007 container_gc.go:86] "Attempting to delete unused containers" Oct 2 19:05:51.857644 kubelet[2007]: I1002 19:05:51.857602 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-f2k7n" nodeCondition=["DiskPressure"] Oct 2 19:05:51.859848 env[1139]: time="2023-10-02T19:05:51.859799399Z" level=info msg="StopPodSandbox for \"1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8\"" Oct 2 19:05:51.951197 env[1139]: 2023-10-02 19:05:51.913 [WARNING][3466] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--74b9887bb6--g94f7-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"63f22f2d-0c3c-4e0c-8566-62ff386c04aa", ResourceVersion:"777", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 5, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1a69edd2fc5244c3e9a9c3e8bf8b8266b3eb1b74533daf9c3e3c32aa5a5e2741", Pod:"calico-kube-controllers-74b9887bb6-g94f7", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali31e75c5c6ef", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:05:51.951197 env[1139]: 2023-10-02 19:05:51.914 [INFO][3466] k8s.go 576: Cleaning up netns ContainerID="1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" Oct 2 19:05:51.951197 env[1139]: 2023-10-02 19:05:51.914 [INFO][3466] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" iface="eth0" netns="" Oct 2 19:05:51.951197 env[1139]: 2023-10-02 19:05:51.914 [INFO][3466] k8s.go 583: Releasing IP address(es) ContainerID="1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" Oct 2 19:05:51.951197 env[1139]: 2023-10-02 19:05:51.914 [INFO][3466] utils.go 196: Calico CNI releasing IP address ContainerID="1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" Oct 2 19:05:51.951197 env[1139]: 2023-10-02 19:05:51.934 [INFO][3473] ipam_plugin.go 416: Releasing address using handleID ContainerID="1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" HandleID="k8s-pod-network.1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" Workload="localhost-k8s-calico--kube--controllers--74b9887bb6--g94f7-eth0" Oct 2 19:05:51.951197 env[1139]: time="2023-10-02T19:05:51Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:05:51.951197 env[1139]: time="2023-10-02T19:05:51Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:05:51.951197 env[1139]: 2023-10-02 19:05:51.945 [WARNING][3473] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" HandleID="k8s-pod-network.1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" Workload="localhost-k8s-calico--kube--controllers--74b9887bb6--g94f7-eth0" Oct 2 19:05:51.951197 env[1139]: 2023-10-02 19:05:51.945 [INFO][3473] ipam_plugin.go 444: Releasing address using workloadID ContainerID="1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" HandleID="k8s-pod-network.1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" Workload="localhost-k8s-calico--kube--controllers--74b9887bb6--g94f7-eth0" Oct 2 19:05:51.951197 env[1139]: time="2023-10-02T19:05:51Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:05:51.951197 env[1139]: 2023-10-02 19:05:51.949 [INFO][3466] k8s.go 589: Teardown processing complete. ContainerID="1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" Oct 2 19:05:51.951837 env[1139]: time="2023-10-02T19:05:51.951798458Z" level=info msg="TearDown network for sandbox \"1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8\" successfully" Oct 2 19:05:51.951907 env[1139]: time="2023-10-02T19:05:51.951892660Z" level=info msg="StopPodSandbox for \"1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8\" returns successfully" Oct 2 19:05:51.952650 env[1139]: time="2023-10-02T19:05:51.952619877Z" level=info msg="RemovePodSandbox for \"1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8\"" Oct 2 19:05:51.952720 env[1139]: time="2023-10-02T19:05:51.952657878Z" level=info msg="Forcibly stopping sandbox \"1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8\"" Oct 2 19:05:52.006455 kubelet[2007]: I1002 19:05:52.005895 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-gj7sg" nodeCondition=["DiskPressure"] Oct 2 19:05:52.045194 env[1139]: 2023-10-02 19:05:52.001 [WARNING][3496] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--74b9887bb6--g94f7-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"63f22f2d-0c3c-4e0c-8566-62ff386c04aa", ResourceVersion:"777", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 5, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1a69edd2fc5244c3e9a9c3e8bf8b8266b3eb1b74533daf9c3e3c32aa5a5e2741", Pod:"calico-kube-controllers-74b9887bb6-g94f7", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali31e75c5c6ef", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:05:52.045194 env[1139]: 2023-10-02 19:05:52.001 [INFO][3496] k8s.go 576: Cleaning up netns ContainerID="1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" Oct 2 19:05:52.045194 env[1139]: 2023-10-02 19:05:52.001 [INFO][3496] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" iface="eth0" netns="" Oct 2 19:05:52.045194 env[1139]: 2023-10-02 19:05:52.001 [INFO][3496] k8s.go 583: Releasing IP address(es) ContainerID="1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" Oct 2 19:05:52.045194 env[1139]: 2023-10-02 19:05:52.001 [INFO][3496] utils.go 196: Calico CNI releasing IP address ContainerID="1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" Oct 2 19:05:52.045194 env[1139]: 2023-10-02 19:05:52.025 [INFO][3503] ipam_plugin.go 416: Releasing address using handleID ContainerID="1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" HandleID="k8s-pod-network.1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" Workload="localhost-k8s-calico--kube--controllers--74b9887bb6--g94f7-eth0" Oct 2 19:05:52.045194 env[1139]: time="2023-10-02T19:05:52Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:05:52.045194 env[1139]: time="2023-10-02T19:05:52Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:05:52.045194 env[1139]: 2023-10-02 19:05:52.039 [WARNING][3503] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" HandleID="k8s-pod-network.1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" Workload="localhost-k8s-calico--kube--controllers--74b9887bb6--g94f7-eth0" Oct 2 19:05:52.045194 env[1139]: 2023-10-02 19:05:52.039 [INFO][3503] ipam_plugin.go 444: Releasing address using workloadID ContainerID="1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" HandleID="k8s-pod-network.1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" Workload="localhost-k8s-calico--kube--controllers--74b9887bb6--g94f7-eth0" Oct 2 19:05:52.045194 env[1139]: time="2023-10-02T19:05:52Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:05:52.045194 env[1139]: 2023-10-02 19:05:52.044 [INFO][3496] k8s.go 589: Teardown processing complete. ContainerID="1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8" Oct 2 19:05:52.045964 env[1139]: time="2023-10-02T19:05:52.045921429Z" level=info msg="TearDown network for sandbox \"1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8\" successfully" Oct 2 19:05:52.050505 env[1139]: time="2023-10-02T19:05:52.050467013Z" level=info msg="RemovePodSandbox \"1f56446d37007e6dc995b85f75c8c53c216d243cf96681eb9e4878076081b4e8\" returns successfully" Oct 2 19:05:52.051556 env[1139]: time="2023-10-02T19:05:52.051524437Z" level=info msg="StopPodSandbox for \"5749ab6208339d87230d1e877a06c5542a1397eae57687aa51d384cf169a03d6\"" Oct 2 19:05:52.051753 env[1139]: time="2023-10-02T19:05:52.051705841Z" level=info msg="TearDown network for sandbox \"5749ab6208339d87230d1e877a06c5542a1397eae57687aa51d384cf169a03d6\" successfully" Oct 2 19:05:52.051829 env[1139]: time="2023-10-02T19:05:52.051804923Z" level=info msg="StopPodSandbox for \"5749ab6208339d87230d1e877a06c5542a1397eae57687aa51d384cf169a03d6\" returns successfully" Oct 2 19:05:52.053194 env[1139]: time="2023-10-02T19:05:52.052173532Z" level=info msg="RemovePodSandbox for \"5749ab6208339d87230d1e877a06c5542a1397eae57687aa51d384cf169a03d6\"" Oct 2 19:05:52.053194 env[1139]: time="2023-10-02T19:05:52.052207092Z" level=info msg="Forcibly stopping sandbox \"5749ab6208339d87230d1e877a06c5542a1397eae57687aa51d384cf169a03d6\"" Oct 2 19:05:52.053194 env[1139]: time="2023-10-02T19:05:52.052285614Z" level=info msg="TearDown network for sandbox \"5749ab6208339d87230d1e877a06c5542a1397eae57687aa51d384cf169a03d6\" successfully" Oct 2 19:05:52.058539 env[1139]: time="2023-10-02T19:05:52.058486396Z" level=info msg="RemovePodSandbox \"5749ab6208339d87230d1e877a06c5542a1397eae57687aa51d384cf169a03d6\" returns successfully" Oct 2 19:05:52.060305 kubelet[2007]: I1002 19:05:52.060257 2007 image_gc_manager.go:340] "Attempting to delete unused images" Oct 2 19:05:52.079454 kubelet[2007]: I1002 19:05:52.079246 2007 eviction_manager.go:353] "Eviction manager: must evict pod(s) to reclaim" resourceName="ephemeral-storage" Oct 2 19:05:52.079454 kubelet[2007]: I1002 19:05:52.079346 2007 eviction_manager.go:371] "Eviction manager: pods ranked for eviction" pods=["calico-system/calico-kube-controllers-74b9887bb6-g94f7","kube-system/coredns-5dd5756b68-hsmbh","kube-system/coredns-5dd5756b68-z2z9h","calico-system/csi-node-driver-vp4kr","calico-system/calico-typha-77b6cfc648-8w7zr","calico-system/calico-node-zdhnd","kube-system/kube-controller-manager-localhost","kube-system/kube-proxy-8qr5v","kube-system/kube-apiserver-localhost","kube-system/kube-scheduler-localhost"] Oct 2 19:05:52.079454 kubelet[2007]: E1002 19:05:52.079373 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="calico-system/calico-kube-controllers-74b9887bb6-g94f7" Oct 2 19:05:52.079454 kubelet[2007]: E1002 19:05:52.079381 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="kube-system/coredns-5dd5756b68-hsmbh" Oct 2 19:05:52.079454 kubelet[2007]: E1002 19:05:52.079390 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="kube-system/coredns-5dd5756b68-z2z9h" Oct 2 19:05:52.079454 kubelet[2007]: E1002 19:05:52.079397 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="calico-system/csi-node-driver-vp4kr" Oct 2 19:05:52.079731 kubelet[2007]: E1002 19:05:52.079489 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="calico-system/calico-typha-77b6cfc648-8w7zr" Oct 2 19:05:52.079731 kubelet[2007]: E1002 19:05:52.079506 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="calico-system/calico-node-zdhnd" Oct 2 19:05:52.079731 kubelet[2007]: E1002 19:05:52.079516 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="kube-system/kube-controller-manager-localhost" Oct 2 19:05:52.079731 kubelet[2007]: E1002 19:05:52.079525 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="kube-system/kube-proxy-8qr5v" Oct 2 19:05:52.079731 kubelet[2007]: E1002 19:05:52.079534 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="kube-system/kube-apiserver-localhost" Oct 2 19:05:52.079731 kubelet[2007]: E1002 19:05:52.079544 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="kube-system/kube-scheduler-localhost" Oct 2 19:05:52.079731 kubelet[2007]: I1002 19:05:52.079553 2007 eviction_manager.go:403] "Eviction manager: unable to evict any pods from the node" Oct 2 19:05:52.161033 kubelet[2007]: I1002 19:05:52.160915 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-jznxd" nodeCondition=["DiskPressure"] Oct 2 19:05:52.306993 kubelet[2007]: I1002 19:05:52.306956 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-fh69l" nodeCondition=["DiskPressure"] Oct 2 19:05:52.406392 env[1139]: time="2023-10-02T19:05:52.406346990Z" level=info msg="StopPodSandbox for \"32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a\"" Oct 2 19:05:52.406837 env[1139]: time="2023-10-02T19:05:52.406806161Z" level=info msg="StopPodSandbox for \"54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed\"" Oct 2 19:05:52.406979 env[1139]: time="2023-10-02T19:05:52.406950204Z" level=info msg="StopPodSandbox for \"0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c\"" Oct 2 19:05:52.472558 kubelet[2007]: I1002 19:05:52.472214 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-9j24q" nodeCondition=["DiskPressure"] Oct 2 19:05:52.547530 env[1139]: 2023-10-02 19:05:52.484 [INFO][3558] k8s.go 576: Cleaning up netns ContainerID="32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" Oct 2 19:05:52.547530 env[1139]: 2023-10-02 19:05:52.484 [INFO][3558] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" iface="eth0" netns="/var/run/netns/cni-93865805-6f05-4c05-1b0a-89d61dca395b" Oct 2 19:05:52.547530 env[1139]: 2023-10-02 19:05:52.484 [INFO][3558] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" iface="eth0" netns="/var/run/netns/cni-93865805-6f05-4c05-1b0a-89d61dca395b" Oct 2 19:05:52.547530 env[1139]: 2023-10-02 19:05:52.484 [INFO][3558] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" iface="eth0" netns="/var/run/netns/cni-93865805-6f05-4c05-1b0a-89d61dca395b" Oct 2 19:05:52.547530 env[1139]: 2023-10-02 19:05:52.484 [INFO][3558] k8s.go 583: Releasing IP address(es) ContainerID="32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" Oct 2 19:05:52.547530 env[1139]: 2023-10-02 19:05:52.485 [INFO][3558] utils.go 196: Calico CNI releasing IP address ContainerID="32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" Oct 2 19:05:52.547530 env[1139]: 2023-10-02 19:05:52.509 [INFO][3583] ipam_plugin.go 416: Releasing address using handleID ContainerID="32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" HandleID="k8s-pod-network.32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" Workload="localhost-k8s-coredns--5dd5756b68--z2z9h-eth0" Oct 2 19:05:52.547530 env[1139]: time="2023-10-02T19:05:52Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:05:52.547530 env[1139]: time="2023-10-02T19:05:52Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:05:52.547530 env[1139]: 2023-10-02 19:05:52.524 [WARNING][3583] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" HandleID="k8s-pod-network.32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" Workload="localhost-k8s-coredns--5dd5756b68--z2z9h-eth0" Oct 2 19:05:52.547530 env[1139]: 2023-10-02 19:05:52.524 [INFO][3583] ipam_plugin.go 444: Releasing address using workloadID ContainerID="32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" HandleID="k8s-pod-network.32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" Workload="localhost-k8s-coredns--5dd5756b68--z2z9h-eth0" Oct 2 19:05:52.547530 env[1139]: time="2023-10-02T19:05:52Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:05:52.547530 env[1139]: 2023-10-02 19:05:52.531 [INFO][3558] k8s.go 589: Teardown processing complete. ContainerID="32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" Oct 2 19:05:52.549821 systemd[1]: run-netns-cni\x2d93865805\x2d6f05\x2d4c05\x2d1b0a\x2d89d61dca395b.mount: Deactivated successfully. Oct 2 19:05:52.550402 env[1139]: time="2023-10-02T19:05:52.550355043Z" level=info msg="TearDown network for sandbox \"32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a\" successfully" Oct 2 19:05:52.550573 env[1139]: time="2023-10-02T19:05:52.550549127Z" level=info msg="StopPodSandbox for \"32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a\" returns successfully" Oct 2 19:05:52.550995 kubelet[2007]: E1002 19:05:52.550964 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:52.551651 env[1139]: time="2023-10-02T19:05:52.551624952Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-z2z9h,Uid:ef92d702-be63-4add-b3cb-5802a224a11e,Namespace:kube-system,Attempt:1,}" Oct 2 19:05:52.582586 env[1139]: 2023-10-02 19:05:52.509 [INFO][3568] k8s.go 576: Cleaning up netns ContainerID="54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" Oct 2 19:05:52.582586 env[1139]: 2023-10-02 19:05:52.509 [INFO][3568] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" iface="eth0" netns="/var/run/netns/cni-145ace3b-b8ea-51e1-d58f-e004a6d9c935" Oct 2 19:05:52.582586 env[1139]: 2023-10-02 19:05:52.511 [INFO][3568] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" iface="eth0" netns="/var/run/netns/cni-145ace3b-b8ea-51e1-d58f-e004a6d9c935" Oct 2 19:05:52.582586 env[1139]: 2023-10-02 19:05:52.511 [INFO][3568] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" iface="eth0" netns="/var/run/netns/cni-145ace3b-b8ea-51e1-d58f-e004a6d9c935" Oct 2 19:05:52.582586 env[1139]: 2023-10-02 19:05:52.511 [INFO][3568] k8s.go 583: Releasing IP address(es) ContainerID="54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" Oct 2 19:05:52.582586 env[1139]: 2023-10-02 19:05:52.511 [INFO][3568] utils.go 196: Calico CNI releasing IP address ContainerID="54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" Oct 2 19:05:52.582586 env[1139]: 2023-10-02 19:05:52.564 [INFO][3591] ipam_plugin.go 416: Releasing address using handleID ContainerID="54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" HandleID="k8s-pod-network.54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" Workload="localhost-k8s-csi--node--driver--vp4kr-eth0" Oct 2 19:05:52.582586 env[1139]: time="2023-10-02T19:05:52Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:05:52.582586 env[1139]: time="2023-10-02T19:05:52Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:05:52.582586 env[1139]: 2023-10-02 19:05:52.577 [WARNING][3591] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" HandleID="k8s-pod-network.54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" Workload="localhost-k8s-csi--node--driver--vp4kr-eth0" Oct 2 19:05:52.582586 env[1139]: 2023-10-02 19:05:52.577 [INFO][3591] ipam_plugin.go 444: Releasing address using workloadID ContainerID="54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" HandleID="k8s-pod-network.54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" Workload="localhost-k8s-csi--node--driver--vp4kr-eth0" Oct 2 19:05:52.582586 env[1139]: time="2023-10-02T19:05:52Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:05:52.582586 env[1139]: 2023-10-02 19:05:52.580 [INFO][3568] k8s.go 589: Teardown processing complete. ContainerID="54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" Oct 2 19:05:52.583403 env[1139]: time="2023-10-02T19:05:52.583351077Z" level=info msg="TearDown network for sandbox \"54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed\" successfully" Oct 2 19:05:52.583403 env[1139]: time="2023-10-02T19:05:52.583390718Z" level=info msg="StopPodSandbox for \"54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed\" returns successfully" Oct 2 19:05:52.584757 env[1139]: time="2023-10-02T19:05:52.584723949Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vp4kr,Uid:6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8,Namespace:calico-system,Attempt:1,}" Oct 2 19:05:52.618145 kubelet[2007]: I1002 19:05:52.618103 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-vtbhz" nodeCondition=["DiskPressure"] Oct 2 19:05:52.636048 env[1139]: 2023-10-02 19:05:52.553 [INFO][3574] k8s.go 576: Cleaning up netns ContainerID="0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" Oct 2 19:05:52.636048 env[1139]: 2023-10-02 19:05:52.553 [INFO][3574] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" iface="eth0" netns="/var/run/netns/cni-59b54774-c58e-4385-022d-59f9c8585fd7" Oct 2 19:05:52.636048 env[1139]: 2023-10-02 19:05:52.553 [INFO][3574] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" iface="eth0" netns="/var/run/netns/cni-59b54774-c58e-4385-022d-59f9c8585fd7" Oct 2 19:05:52.636048 env[1139]: 2023-10-02 19:05:52.553 [INFO][3574] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" iface="eth0" netns="/var/run/netns/cni-59b54774-c58e-4385-022d-59f9c8585fd7" Oct 2 19:05:52.636048 env[1139]: 2023-10-02 19:05:52.553 [INFO][3574] k8s.go 583: Releasing IP address(es) ContainerID="0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" Oct 2 19:05:52.636048 env[1139]: 2023-10-02 19:05:52.553 [INFO][3574] utils.go 196: Calico CNI releasing IP address ContainerID="0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" Oct 2 19:05:52.636048 env[1139]: 2023-10-02 19:05:52.599 [INFO][3598] ipam_plugin.go 416: Releasing address using handleID ContainerID="0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" HandleID="k8s-pod-network.0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" Workload="localhost-k8s-coredns--5dd5756b68--hsmbh-eth0" Oct 2 19:05:52.636048 env[1139]: time="2023-10-02T19:05:52Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:05:52.636048 env[1139]: time="2023-10-02T19:05:52Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:05:52.636048 env[1139]: 2023-10-02 19:05:52.614 [WARNING][3598] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" HandleID="k8s-pod-network.0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" Workload="localhost-k8s-coredns--5dd5756b68--hsmbh-eth0" Oct 2 19:05:52.636048 env[1139]: 2023-10-02 19:05:52.614 [INFO][3598] ipam_plugin.go 444: Releasing address using workloadID ContainerID="0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" HandleID="k8s-pod-network.0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" Workload="localhost-k8s-coredns--5dd5756b68--hsmbh-eth0" Oct 2 19:05:52.636048 env[1139]: time="2023-10-02T19:05:52Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:05:52.636048 env[1139]: 2023-10-02 19:05:52.619 [INFO][3574] k8s.go 589: Teardown processing complete. ContainerID="0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" Oct 2 19:05:52.636514 env[1139]: time="2023-10-02T19:05:52.636202566Z" level=info msg="TearDown network for sandbox \"0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c\" successfully" Oct 2 19:05:52.636514 env[1139]: time="2023-10-02T19:05:52.636242527Z" level=info msg="StopPodSandbox for \"0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c\" returns successfully" Oct 2 19:05:52.636568 kubelet[2007]: E1002 19:05:52.636527 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:52.638095 env[1139]: time="2023-10-02T19:05:52.636887261Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-hsmbh,Uid:1c72268b-aac6-447a-851c-e4e6f761535e,Namespace:kube-system,Attempt:1,}" Oct 2 19:05:52.709095 kubelet[2007]: I1002 19:05:52.709057 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-vr6bq" nodeCondition=["DiskPressure"] Oct 2 19:05:52.778300 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:05:52.778506 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid4b0e91b91f: link becomes ready Oct 2 19:05:52.786470 systemd-networkd[1043]: calid4b0e91b91f: Link UP Oct 2 19:05:52.786476 systemd-networkd[1043]: calid4b0e91b91f: Gained carrier Oct 2 19:05:52.804405 env[1139]: 2023-10-02 19:05:52.646 [INFO][3600] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5dd5756b68--z2z9h-eth0 coredns-5dd5756b68- kube-system ef92d702-be63-4add-b3cb-5802a224a11e 848 0 2023-10-02 19:05:24 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5dd5756b68-z2z9h eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calid4b0e91b91f [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="3dd5ba5f4c7d24a032122d4cdf8dcb0289acd062ee3e9352748e9c991d453707" Namespace="kube-system" Pod="coredns-5dd5756b68-z2z9h" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--z2z9h-" Oct 2 19:05:52.804405 env[1139]: 2023-10-02 19:05:52.647 [INFO][3600] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="3dd5ba5f4c7d24a032122d4cdf8dcb0289acd062ee3e9352748e9c991d453707" Namespace="kube-system" Pod="coredns-5dd5756b68-z2z9h" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--z2z9h-eth0" Oct 2 19:05:52.804405 env[1139]: 2023-10-02 19:05:52.691 [INFO][3632] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3dd5ba5f4c7d24a032122d4cdf8dcb0289acd062ee3e9352748e9c991d453707" HandleID="k8s-pod-network.3dd5ba5f4c7d24a032122d4cdf8dcb0289acd062ee3e9352748e9c991d453707" Workload="localhost-k8s-coredns--5dd5756b68--z2z9h-eth0" Oct 2 19:05:52.804405 env[1139]: 2023-10-02 19:05:52.725 [INFO][3632] ipam_plugin.go 269: Auto assigning IP ContainerID="3dd5ba5f4c7d24a032122d4cdf8dcb0289acd062ee3e9352748e9c991d453707" HandleID="k8s-pod-network.3dd5ba5f4c7d24a032122d4cdf8dcb0289acd062ee3e9352748e9c991d453707" Workload="localhost-k8s-coredns--5dd5756b68--z2z9h-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004d230), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5dd5756b68-z2z9h", "timestamp":"2023-10-02 19:05:52.691550311 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:05:52.804405 env[1139]: time="2023-10-02T19:05:52Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:05:52.804405 env[1139]: time="2023-10-02T19:05:52Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:05:52.804405 env[1139]: 2023-10-02 19:05:52.727 [INFO][3632] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Oct 2 19:05:52.804405 env[1139]: 2023-10-02 19:05:52.730 [INFO][3632] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3dd5ba5f4c7d24a032122d4cdf8dcb0289acd062ee3e9352748e9c991d453707" host="localhost" Oct 2 19:05:52.804405 env[1139]: 2023-10-02 19:05:52.741 [INFO][3632] ipam.go 372: Looking up existing affinities for host host="localhost" Oct 2 19:05:52.804405 env[1139]: 2023-10-02 19:05:52.746 [INFO][3632] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Oct 2 19:05:52.804405 env[1139]: 2023-10-02 19:05:52.754 [INFO][3632] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Oct 2 19:05:52.804405 env[1139]: 2023-10-02 19:05:52.761 [INFO][3632] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Oct 2 19:05:52.804405 env[1139]: 2023-10-02 19:05:52.761 [INFO][3632] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.3dd5ba5f4c7d24a032122d4cdf8dcb0289acd062ee3e9352748e9c991d453707" host="localhost" Oct 2 19:05:52.804405 env[1139]: 2023-10-02 19:05:52.763 [INFO][3632] ipam.go 1682: Creating new handle: k8s-pod-network.3dd5ba5f4c7d24a032122d4cdf8dcb0289acd062ee3e9352748e9c991d453707 Oct 2 19:05:52.804405 env[1139]: 2023-10-02 19:05:52.768 [INFO][3632] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.3dd5ba5f4c7d24a032122d4cdf8dcb0289acd062ee3e9352748e9c991d453707" host="localhost" Oct 2 19:05:52.804405 env[1139]: 2023-10-02 19:05:52.773 [INFO][3632] ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.3dd5ba5f4c7d24a032122d4cdf8dcb0289acd062ee3e9352748e9c991d453707" host="localhost" Oct 2 19:05:52.804405 env[1139]: 2023-10-02 19:05:52.773 [INFO][3632] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.3dd5ba5f4c7d24a032122d4cdf8dcb0289acd062ee3e9352748e9c991d453707" host="localhost" Oct 2 19:05:52.804405 env[1139]: time="2023-10-02T19:05:52Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:05:52.804405 env[1139]: 2023-10-02 19:05:52.773 [INFO][3632] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="3dd5ba5f4c7d24a032122d4cdf8dcb0289acd062ee3e9352748e9c991d453707" HandleID="k8s-pod-network.3dd5ba5f4c7d24a032122d4cdf8dcb0289acd062ee3e9352748e9c991d453707" Workload="localhost-k8s-coredns--5dd5756b68--z2z9h-eth0" Oct 2 19:05:52.804989 env[1139]: 2023-10-02 19:05:52.775 [INFO][3600] k8s.go 383: Populated endpoint ContainerID="3dd5ba5f4c7d24a032122d4cdf8dcb0289acd062ee3e9352748e9c991d453707" Namespace="kube-system" Pod="coredns-5dd5756b68-z2z9h" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--z2z9h-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--z2z9h-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"ef92d702-be63-4add-b3cb-5802a224a11e", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 5, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5dd5756b68-z2z9h", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid4b0e91b91f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:05:52.804989 env[1139]: 2023-10-02 19:05:52.775 [INFO][3600] k8s.go 384: Calico CNI using IPs: [192.168.88.130/32] ContainerID="3dd5ba5f4c7d24a032122d4cdf8dcb0289acd062ee3e9352748e9c991d453707" Namespace="kube-system" Pod="coredns-5dd5756b68-z2z9h" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--z2z9h-eth0" Oct 2 19:05:52.804989 env[1139]: 2023-10-02 19:05:52.775 [INFO][3600] dataplane_linux.go 68: Setting the host side veth name to calid4b0e91b91f ContainerID="3dd5ba5f4c7d24a032122d4cdf8dcb0289acd062ee3e9352748e9c991d453707" Namespace="kube-system" Pod="coredns-5dd5756b68-z2z9h" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--z2z9h-eth0" Oct 2 19:05:52.804989 env[1139]: 2023-10-02 19:05:52.778 [INFO][3600] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="3dd5ba5f4c7d24a032122d4cdf8dcb0289acd062ee3e9352748e9c991d453707" Namespace="kube-system" Pod="coredns-5dd5756b68-z2z9h" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--z2z9h-eth0" Oct 2 19:05:52.804989 env[1139]: 2023-10-02 19:05:52.786 [INFO][3600] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="3dd5ba5f4c7d24a032122d4cdf8dcb0289acd062ee3e9352748e9c991d453707" Namespace="kube-system" Pod="coredns-5dd5756b68-z2z9h" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--z2z9h-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--z2z9h-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"ef92d702-be63-4add-b3cb-5802a224a11e", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 5, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3dd5ba5f4c7d24a032122d4cdf8dcb0289acd062ee3e9352748e9c991d453707", Pod:"coredns-5dd5756b68-z2z9h", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid4b0e91b91f", MAC:"c2:ea:da:9f:93:9d", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:05:52.804989 env[1139]: 2023-10-02 19:05:52.801 [INFO][3600] k8s.go 489: Wrote updated endpoint to datastore ContainerID="3dd5ba5f4c7d24a032122d4cdf8dcb0289acd062ee3e9352748e9c991d453707" Namespace="kube-system" Pod="coredns-5dd5756b68-z2z9h" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--z2z9h-eth0" Oct 2 19:05:52.835448 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6e1aed466ec: link becomes ready Oct 2 19:05:52.842519 systemd-networkd[1043]: cali6e1aed466ec: Link UP Oct 2 19:05:52.842527 systemd-networkd[1043]: cali6e1aed466ec: Gained carrier Oct 2 19:05:52.850000 audit[3693]: NETFILTER_CFG table=filter:102 family=2 entries=40 op=nft_register_chain pid=3693 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:05:52.852144 env[1139]: time="2023-10-02T19:05:52.852086102Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:05:52.852352 env[1139]: time="2023-10-02T19:05:52.852322948Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:05:52.852475 env[1139]: time="2023-10-02T19:05:52.852449510Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:05:52.850000 audit[3693]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21096 a0=3 a1=fffffe5a1fe0 a2=0 a3=ffffbb187fa0 items=0 ppid=3019 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:52.850000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:05:52.853632 env[1139]: time="2023-10-02T19:05:52.853594937Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3dd5ba5f4c7d24a032122d4cdf8dcb0289acd062ee3e9352748e9c991d453707 pid=3694 runtime=io.containerd.runc.v2 Oct 2 19:05:52.854335 env[1139]: 2023-10-02 19:05:52.656 [INFO][3617] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--vp4kr-eth0 csi-node-driver- calico-system 6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8 850 0 2023-10-02 19:05:38 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6b49688c47 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s localhost csi-node-driver-vp4kr eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali6e1aed466ec [] []}} ContainerID="7ba9914687d8bc213d4a0ef5aec845bcf4a32e55bc130d0c313133895e36a239" Namespace="calico-system" Pod="csi-node-driver-vp4kr" WorkloadEndpoint="localhost-k8s-csi--node--driver--vp4kr-" Oct 2 19:05:52.854335 env[1139]: 2023-10-02 19:05:52.656 [INFO][3617] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="7ba9914687d8bc213d4a0ef5aec845bcf4a32e55bc130d0c313133895e36a239" Namespace="calico-system" Pod="csi-node-driver-vp4kr" WorkloadEndpoint="localhost-k8s-csi--node--driver--vp4kr-eth0" Oct 2 19:05:52.854335 env[1139]: 2023-10-02 19:05:52.693 [INFO][3641] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7ba9914687d8bc213d4a0ef5aec845bcf4a32e55bc130d0c313133895e36a239" HandleID="k8s-pod-network.7ba9914687d8bc213d4a0ef5aec845bcf4a32e55bc130d0c313133895e36a239" Workload="localhost-k8s-csi--node--driver--vp4kr-eth0" Oct 2 19:05:52.854335 env[1139]: 2023-10-02 19:05:52.729 [INFO][3641] ipam_plugin.go 269: Auto assigning IP ContainerID="7ba9914687d8bc213d4a0ef5aec845bcf4a32e55bc130d0c313133895e36a239" HandleID="k8s-pod-network.7ba9914687d8bc213d4a0ef5aec845bcf4a32e55bc130d0c313133895e36a239" Workload="localhost-k8s-csi--node--driver--vp4kr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400018a550), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-vp4kr", "timestamp":"2023-10-02 19:05:52.693879965 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:05:52.854335 env[1139]: time="2023-10-02T19:05:52Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:05:52.854335 env[1139]: time="2023-10-02T19:05:52Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:05:52.854335 env[1139]: 2023-10-02 19:05:52.774 [INFO][3641] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Oct 2 19:05:52.854335 env[1139]: 2023-10-02 19:05:52.776 [INFO][3641] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7ba9914687d8bc213d4a0ef5aec845bcf4a32e55bc130d0c313133895e36a239" host="localhost" Oct 2 19:05:52.854335 env[1139]: 2023-10-02 19:05:52.780 [INFO][3641] ipam.go 372: Looking up existing affinities for host host="localhost" Oct 2 19:05:52.854335 env[1139]: 2023-10-02 19:05:52.784 [INFO][3641] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Oct 2 19:05:52.854335 env[1139]: 2023-10-02 19:05:52.786 [INFO][3641] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Oct 2 19:05:52.854335 env[1139]: 2023-10-02 19:05:52.792 [INFO][3641] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Oct 2 19:05:52.854335 env[1139]: 2023-10-02 19:05:52.792 [INFO][3641] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.7ba9914687d8bc213d4a0ef5aec845bcf4a32e55bc130d0c313133895e36a239" host="localhost" Oct 2 19:05:52.854335 env[1139]: 2023-10-02 19:05:52.794 [INFO][3641] ipam.go 1682: Creating new handle: k8s-pod-network.7ba9914687d8bc213d4a0ef5aec845bcf4a32e55bc130d0c313133895e36a239 Oct 2 19:05:52.854335 env[1139]: 2023-10-02 19:05:52.812 [INFO][3641] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.7ba9914687d8bc213d4a0ef5aec845bcf4a32e55bc130d0c313133895e36a239" host="localhost" Oct 2 19:05:52.854335 env[1139]: 2023-10-02 19:05:52.823 [INFO][3641] ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.7ba9914687d8bc213d4a0ef5aec845bcf4a32e55bc130d0c313133895e36a239" host="localhost" Oct 2 19:05:52.854335 env[1139]: 2023-10-02 19:05:52.823 [INFO][3641] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.7ba9914687d8bc213d4a0ef5aec845bcf4a32e55bc130d0c313133895e36a239" host="localhost" Oct 2 19:05:52.854335 env[1139]: time="2023-10-02T19:05:52Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:05:52.854335 env[1139]: 2023-10-02 19:05:52.823 [INFO][3641] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="7ba9914687d8bc213d4a0ef5aec845bcf4a32e55bc130d0c313133895e36a239" HandleID="k8s-pod-network.7ba9914687d8bc213d4a0ef5aec845bcf4a32e55bc130d0c313133895e36a239" Workload="localhost-k8s-csi--node--driver--vp4kr-eth0" Oct 2 19:05:52.854863 env[1139]: 2023-10-02 19:05:52.831 [INFO][3617] k8s.go 383: Populated endpoint ContainerID="7ba9914687d8bc213d4a0ef5aec845bcf4a32e55bc130d0c313133895e36a239" Namespace="calico-system" Pod="csi-node-driver-vp4kr" WorkloadEndpoint="localhost-k8s-csi--node--driver--vp4kr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--vp4kr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8", ResourceVersion:"850", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 5, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-vp4kr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali6e1aed466ec", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:05:52.854863 env[1139]: 2023-10-02 19:05:52.831 [INFO][3617] k8s.go 384: Calico CNI using IPs: [192.168.88.131/32] ContainerID="7ba9914687d8bc213d4a0ef5aec845bcf4a32e55bc130d0c313133895e36a239" Namespace="calico-system" Pod="csi-node-driver-vp4kr" WorkloadEndpoint="localhost-k8s-csi--node--driver--vp4kr-eth0" Oct 2 19:05:52.854863 env[1139]: 2023-10-02 19:05:52.832 [INFO][3617] dataplane_linux.go 68: Setting the host side veth name to cali6e1aed466ec ContainerID="7ba9914687d8bc213d4a0ef5aec845bcf4a32e55bc130d0c313133895e36a239" Namespace="calico-system" Pod="csi-node-driver-vp4kr" WorkloadEndpoint="localhost-k8s-csi--node--driver--vp4kr-eth0" Oct 2 19:05:52.854863 env[1139]: 2023-10-02 19:05:52.835 [INFO][3617] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="7ba9914687d8bc213d4a0ef5aec845bcf4a32e55bc130d0c313133895e36a239" Namespace="calico-system" Pod="csi-node-driver-vp4kr" WorkloadEndpoint="localhost-k8s-csi--node--driver--vp4kr-eth0" Oct 2 19:05:52.854863 env[1139]: 2023-10-02 19:05:52.842 [INFO][3617] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="7ba9914687d8bc213d4a0ef5aec845bcf4a32e55bc130d0c313133895e36a239" Namespace="calico-system" Pod="csi-node-driver-vp4kr" WorkloadEndpoint="localhost-k8s-csi--node--driver--vp4kr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--vp4kr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8", ResourceVersion:"850", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 5, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7ba9914687d8bc213d4a0ef5aec845bcf4a32e55bc130d0c313133895e36a239", Pod:"csi-node-driver-vp4kr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali6e1aed466ec", MAC:"92:fc:a0:78:01:a2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:05:52.854863 env[1139]: 2023-10-02 19:05:52.848 [INFO][3617] k8s.go 489: Wrote updated endpoint to datastore ContainerID="7ba9914687d8bc213d4a0ef5aec845bcf4a32e55bc130d0c313133895e36a239" Namespace="calico-system" Pod="csi-node-driver-vp4kr" WorkloadEndpoint="localhost-k8s-csi--node--driver--vp4kr-eth0" Oct 2 19:05:52.864338 kubelet[2007]: I1002 19:05:52.864307 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-67kf6" nodeCondition=["DiskPressure"] Oct 2 19:05:52.877438 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali977a76c1029: link becomes ready Oct 2 19:05:52.889322 systemd[1]: Started cri-containerd-3dd5ba5f4c7d24a032122d4cdf8dcb0289acd062ee3e9352748e9c991d453707.scope. Oct 2 19:05:52.901303 env[1139]: time="2023-10-02T19:05:52.893225203Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:05:52.901303 env[1139]: time="2023-10-02T19:05:52.893266324Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:05:52.901303 env[1139]: time="2023-10-02T19:05:52.893276724Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:05:52.901303 env[1139]: time="2023-10-02T19:05:52.893490689Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7ba9914687d8bc213d4a0ef5aec845bcf4a32e55bc130d0c313133895e36a239 pid=3731 runtime=io.containerd.runc.v2 Oct 2 19:05:52.901792 systemd-networkd[1043]: cali977a76c1029: Link UP Oct 2 19:05:52.901801 systemd-networkd[1043]: cali977a76c1029: Gained carrier Oct 2 19:05:52.908000 audit[3746]: NETFILTER_CFG table=filter:103 family=2 entries=38 op=nft_register_chain pid=3746 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:05:52.908000 audit[3746]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19508 a0=3 a1=ffffda451110 a2=0 a3=ffff97705fa0 items=0 ppid=3019 pid=3746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:52.908000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:05:52.913127 env[1139]: 2023-10-02 19:05:52.731 [INFO][3640] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5dd5756b68--hsmbh-eth0 coredns-5dd5756b68- kube-system 1c72268b-aac6-447a-851c-e4e6f761535e 852 0 2023-10-02 19:05:24 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5dd5756b68-hsmbh eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali977a76c1029 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="e4703c4bf0ed9d41bdd67e1d51d792ec419d380e6e48a0be33d24628d3ae6558" Namespace="kube-system" Pod="coredns-5dd5756b68-hsmbh" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--hsmbh-" Oct 2 19:05:52.913127 env[1139]: 2023-10-02 19:05:52.731 [INFO][3640] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e4703c4bf0ed9d41bdd67e1d51d792ec419d380e6e48a0be33d24628d3ae6558" Namespace="kube-system" Pod="coredns-5dd5756b68-hsmbh" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--hsmbh-eth0" Oct 2 19:05:52.913127 env[1139]: 2023-10-02 19:05:52.794 [INFO][3662] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e4703c4bf0ed9d41bdd67e1d51d792ec419d380e6e48a0be33d24628d3ae6558" HandleID="k8s-pod-network.e4703c4bf0ed9d41bdd67e1d51d792ec419d380e6e48a0be33d24628d3ae6558" Workload="localhost-k8s-coredns--5dd5756b68--hsmbh-eth0" Oct 2 19:05:52.913127 env[1139]: 2023-10-02 19:05:52.823 [INFO][3662] ipam_plugin.go 269: Auto assigning IP ContainerID="e4703c4bf0ed9d41bdd67e1d51d792ec419d380e6e48a0be33d24628d3ae6558" HandleID="k8s-pod-network.e4703c4bf0ed9d41bdd67e1d51d792ec419d380e6e48a0be33d24628d3ae6558" Workload="localhost-k8s-coredns--5dd5756b68--hsmbh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40000cca20), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5dd5756b68-hsmbh", "timestamp":"2023-10-02 19:05:52.794800552 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:05:52.913127 env[1139]: time="2023-10-02T19:05:52Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:05:52.913127 env[1139]: time="2023-10-02T19:05:52Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:05:52.913127 env[1139]: 2023-10-02 19:05:52.823 [INFO][3662] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Oct 2 19:05:52.913127 env[1139]: 2023-10-02 19:05:52.825 [INFO][3662] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e4703c4bf0ed9d41bdd67e1d51d792ec419d380e6e48a0be33d24628d3ae6558" host="localhost" Oct 2 19:05:52.913127 env[1139]: 2023-10-02 19:05:52.830 [INFO][3662] ipam.go 372: Looking up existing affinities for host host="localhost" Oct 2 19:05:52.913127 env[1139]: 2023-10-02 19:05:52.834 [INFO][3662] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Oct 2 19:05:52.913127 env[1139]: 2023-10-02 19:05:52.836 [INFO][3662] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Oct 2 19:05:52.913127 env[1139]: 2023-10-02 19:05:52.839 [INFO][3662] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Oct 2 19:05:52.913127 env[1139]: 2023-10-02 19:05:52.839 [INFO][3662] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.e4703c4bf0ed9d41bdd67e1d51d792ec419d380e6e48a0be33d24628d3ae6558" host="localhost" Oct 2 19:05:52.913127 env[1139]: 2023-10-02 19:05:52.842 [INFO][3662] ipam.go 1682: Creating new handle: k8s-pod-network.e4703c4bf0ed9d41bdd67e1d51d792ec419d380e6e48a0be33d24628d3ae6558 Oct 2 19:05:52.913127 env[1139]: 2023-10-02 19:05:52.860 [INFO][3662] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.e4703c4bf0ed9d41bdd67e1d51d792ec419d380e6e48a0be33d24628d3ae6558" host="localhost" Oct 2 19:05:52.913127 env[1139]: 2023-10-02 19:05:52.869 [INFO][3662] ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.e4703c4bf0ed9d41bdd67e1d51d792ec419d380e6e48a0be33d24628d3ae6558" host="localhost" Oct 2 19:05:52.913127 env[1139]: 2023-10-02 19:05:52.869 [INFO][3662] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.e4703c4bf0ed9d41bdd67e1d51d792ec419d380e6e48a0be33d24628d3ae6558" host="localhost" Oct 2 19:05:52.913127 env[1139]: time="2023-10-02T19:05:52Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:05:52.913127 env[1139]: 2023-10-02 19:05:52.869 [INFO][3662] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="e4703c4bf0ed9d41bdd67e1d51d792ec419d380e6e48a0be33d24628d3ae6558" HandleID="k8s-pod-network.e4703c4bf0ed9d41bdd67e1d51d792ec419d380e6e48a0be33d24628d3ae6558" Workload="localhost-k8s-coredns--5dd5756b68--hsmbh-eth0" Oct 2 19:05:52.913680 env[1139]: 2023-10-02 19:05:52.875 [INFO][3640] k8s.go 383: Populated endpoint ContainerID="e4703c4bf0ed9d41bdd67e1d51d792ec419d380e6e48a0be33d24628d3ae6558" Namespace="kube-system" Pod="coredns-5dd5756b68-hsmbh" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--hsmbh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--hsmbh-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"1c72268b-aac6-447a-851c-e4e6f761535e", ResourceVersion:"852", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 5, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5dd5756b68-hsmbh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali977a76c1029", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:05:52.913680 env[1139]: 2023-10-02 19:05:52.875 [INFO][3640] k8s.go 384: Calico CNI using IPs: [192.168.88.132/32] ContainerID="e4703c4bf0ed9d41bdd67e1d51d792ec419d380e6e48a0be33d24628d3ae6558" Namespace="kube-system" Pod="coredns-5dd5756b68-hsmbh" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--hsmbh-eth0" Oct 2 19:05:52.913680 env[1139]: 2023-10-02 19:05:52.875 [INFO][3640] dataplane_linux.go 68: Setting the host side veth name to cali977a76c1029 ContainerID="e4703c4bf0ed9d41bdd67e1d51d792ec419d380e6e48a0be33d24628d3ae6558" Namespace="kube-system" Pod="coredns-5dd5756b68-hsmbh" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--hsmbh-eth0" Oct 2 19:05:52.913680 env[1139]: 2023-10-02 19:05:52.877 [INFO][3640] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="e4703c4bf0ed9d41bdd67e1d51d792ec419d380e6e48a0be33d24628d3ae6558" Namespace="kube-system" Pod="coredns-5dd5756b68-hsmbh" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--hsmbh-eth0" Oct 2 19:05:52.913680 env[1139]: 2023-10-02 19:05:52.891 [INFO][3640] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="e4703c4bf0ed9d41bdd67e1d51d792ec419d380e6e48a0be33d24628d3ae6558" Namespace="kube-system" Pod="coredns-5dd5756b68-hsmbh" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--hsmbh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--hsmbh-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"1c72268b-aac6-447a-851c-e4e6f761535e", ResourceVersion:"852", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 5, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e4703c4bf0ed9d41bdd67e1d51d792ec419d380e6e48a0be33d24628d3ae6558", Pod:"coredns-5dd5756b68-hsmbh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali977a76c1029", MAC:"f2:99:29:98:72:eb", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:05:52.913680 env[1139]: 2023-10-02 19:05:52.905 [INFO][3640] k8s.go 489: Wrote updated endpoint to datastore ContainerID="e4703c4bf0ed9d41bdd67e1d51d792ec419d380e6e48a0be33d24628d3ae6558" Namespace="kube-system" Pod="coredns-5dd5756b68-hsmbh" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--hsmbh-eth0" Oct 2 19:05:52.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.928000 audit: BPF prog-id=149 op=LOAD Oct 2 19:05:52.928000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.928000 audit[3707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=3694 pid=3707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:52.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364643562613566346337643234613033323132326434636466386463 Oct 2 19:05:52.929000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.929000 audit[3707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=3694 pid=3707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:52.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364643562613566346337643234613033323132326434636466386463 Oct 2 19:05:52.929000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.929000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.929000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.929000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.929000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.929000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.929000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.929000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.929000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.929000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.929000 audit: BPF prog-id=150 op=LOAD Oct 2 19:05:52.929000 audit[3707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=3694 pid=3707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:52.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364643562613566346337643234613033323132326434636466386463 Oct 2 19:05:52.929000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.929000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.929000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.929000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.929000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.929000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.929000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.929000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.929000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.929000 audit: BPF prog-id=151 op=LOAD Oct 2 19:05:52.929000 audit[3707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=3694 pid=3707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:52.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364643562613566346337643234613033323132326434636466386463 Oct 2 19:05:52.929000 audit: BPF prog-id=151 op=UNLOAD Oct 2 19:05:52.929000 audit: BPF prog-id=150 op=UNLOAD Oct 2 19:05:52.929000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.929000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.929000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.929000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.929000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.929000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.929000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.929000 audit[3707]: AVC avc: denied { perfmon } for pid=3707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.929000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.929000 audit[3707]: AVC avc: denied { bpf } for pid=3707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.929000 audit: BPF prog-id=152 op=LOAD Oct 2 19:05:52.929000 audit[3707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=3694 pid=3707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:52.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364643562613566346337643234613033323132326434636466386463 Oct 2 19:05:52.931464 systemd-resolved[1085]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 2 19:05:52.933741 systemd[1]: Started cri-containerd-7ba9914687d8bc213d4a0ef5aec845bcf4a32e55bc130d0c313133895e36a239.scope. Oct 2 19:05:52.948000 audit[3779]: NETFILTER_CFG table=filter:104 family=2 entries=38 op=nft_register_chain pid=3779 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:05:52.948000 audit[3779]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19088 a0=3 a1=fffff3148ec0 a2=0 a3=ffffa2efdfa0 items=0 ppid=3019 pid=3779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:52.948000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:05:52.957178 env[1139]: time="2023-10-02T19:05:52.957004461Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:05:52.957178 env[1139]: time="2023-10-02T19:05:52.957040742Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:05:52.957178 env[1139]: time="2023-10-02T19:05:52.957051062Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:05:52.957516 env[1139]: time="2023-10-02T19:05:52.957396150Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e4703c4bf0ed9d41bdd67e1d51d792ec419d380e6e48a0be33d24628d3ae6558 pid=3797 runtime=io.containerd.runc.v2 Oct 2 19:05:52.968166 env[1139]: time="2023-10-02T19:05:52.968111395Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-z2z9h,Uid:ef92d702-be63-4add-b3cb-5802a224a11e,Namespace:kube-system,Attempt:1,} returns sandbox id \"3dd5ba5f4c7d24a032122d4cdf8dcb0289acd062ee3e9352748e9c991d453707\"" Oct 2 19:05:52.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.968000 audit: BPF prog-id=153 op=LOAD Oct 2 19:05:52.969806 kubelet[2007]: E1002 19:05:52.969782 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:52.969000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.969000 audit[3754]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3731 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:52.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762613939313436383764386263323133643461306566356165633834 Oct 2 19:05:52.969000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.969000 audit[3754]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3731 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:52.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762613939313436383764386263323133643461306566356165633834 Oct 2 19:05:52.970000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.970000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.970000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.970000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.970000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.970000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.970000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.970000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.970000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.970000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.970000 audit: BPF prog-id=154 op=LOAD Oct 2 19:05:52.970000 audit[3754]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3731 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:52.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762613939313436383764386263323133643461306566356165633834 Oct 2 19:05:52.970000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.970000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.970000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.970000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.970000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.970000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.970000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.970000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.970000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.970000 audit: BPF prog-id=155 op=LOAD Oct 2 19:05:52.970000 audit[3754]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3731 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:52.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762613939313436383764386263323133643461306566356165633834 Oct 2 19:05:52.971000 audit: BPF prog-id=155 op=UNLOAD Oct 2 19:05:52.971000 audit: BPF prog-id=154 op=UNLOAD Oct 2 19:05:52.971000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.971000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.971000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.971000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.971000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.971000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.971000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.971000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.971000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.971000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:52.971000 audit: BPF prog-id=156 op=LOAD Oct 2 19:05:52.971000 audit[3754]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3731 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:52.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762613939313436383764386263323133643461306566356165633834 Oct 2 19:05:52.973728 systemd-resolved[1085]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 2 19:05:52.984765 systemd[1]: Started cri-containerd-e4703c4bf0ed9d41bdd67e1d51d792ec419d380e6e48a0be33d24628d3ae6558.scope. Oct 2 19:05:52.992797 env[1139]: time="2023-10-02T19:05:52.992757079Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vp4kr,Uid:6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8,Namespace:calico-system,Attempt:1,} returns sandbox id \"7ba9914687d8bc213d4a0ef5aec845bcf4a32e55bc130d0c313133895e36a239\"" Oct 2 19:05:53.007838 kubelet[2007]: I1002 19:05:53.007567 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-mlklj" nodeCondition=["DiskPressure"] Oct 2 19:05:53.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.010000 audit: BPF prog-id=157 op=LOAD Oct 2 19:05:53.011000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.011000 audit[3809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=3797 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:53.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534373033633462663065643964343162646436376531643531643739 Oct 2 19:05:53.011000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.011000 audit[3809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=3797 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:53.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534373033633462663065643964343162646436376531643531643739 Oct 2 19:05:53.011000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.011000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.011000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.011000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.011000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.011000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.011000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.011000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.011000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.011000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.011000 audit: BPF prog-id=158 op=LOAD Oct 2 19:05:53.011000 audit[3809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=3797 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:53.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534373033633462663065643964343162646436376531643531643739 Oct 2 19:05:53.011000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.011000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.011000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.011000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.011000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.011000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.011000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.011000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.011000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.011000 audit: BPF prog-id=159 op=LOAD Oct 2 19:05:53.011000 audit[3809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=3797 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:53.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534373033633462663065643964343162646436376531643531643739 Oct 2 19:05:53.011000 audit: BPF prog-id=159 op=UNLOAD Oct 2 19:05:53.011000 audit: BPF prog-id=158 op=UNLOAD Oct 2 19:05:53.011000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.011000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.011000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.011000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.011000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.011000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.011000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.011000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.011000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.011000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.011000 audit: BPF prog-id=160 op=LOAD Oct 2 19:05:53.011000 audit[3809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=3797 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:53.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534373033633462663065643964343162646436376531643531643739 Oct 2 19:05:53.013329 systemd-resolved[1085]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 2 19:05:53.034617 env[1139]: time="2023-10-02T19:05:53.034513781Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-hsmbh,Uid:1c72268b-aac6-447a-851c-e4e6f761535e,Namespace:kube-system,Attempt:1,} returns sandbox id \"e4703c4bf0ed9d41bdd67e1d51d792ec419d380e6e48a0be33d24628d3ae6558\"" Oct 2 19:05:53.039844 kubelet[2007]: E1002 19:05:53.039801 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:53.108720 kubelet[2007]: I1002 19:05:53.108676 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-qvjrv" nodeCondition=["DiskPressure"] Oct 2 19:05:53.137763 systemd-networkd[1043]: cali31e75c5c6ef: Gained IPv6LL Oct 2 19:05:53.263079 kubelet[2007]: I1002 19:05:53.262721 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-rwtcq" nodeCondition=["DiskPressure"] Oct 2 19:05:53.397711 env[1139]: time="2023-10-02T19:05:53.397577872Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:53.399284 env[1139]: time="2023-10-02T19:05:53.399251909Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2a83e28de36778d89892266990cc390b1519b82e6d9724ca705c0d1e700b5804,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:53.400888 env[1139]: time="2023-10-02T19:05:53.400831265Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:53.403341 env[1139]: time="2023-10-02T19:05:53.403315521Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:b764feb1777655aabce5988324b69b412d23e087436ee2414dff893a158fcdef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:53.404857 env[1139]: time="2023-10-02T19:05:53.404826275Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\" returns image reference \"sha256:2a83e28de36778d89892266990cc390b1519b82e6d9724ca705c0d1e700b5804\"" Oct 2 19:05:53.407239 env[1139]: time="2023-10-02T19:05:53.407202768Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Oct 2 19:05:53.408409 env[1139]: time="2023-10-02T19:05:53.408374515Z" level=info msg="CreateContainer within sandbox \"1a69edd2fc5244c3e9a9c3e8bf8b8266b3eb1b74533daf9c3e3c32aa5a5e2741\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Oct 2 19:05:53.425880 env[1139]: time="2023-10-02T19:05:53.425740306Z" level=info msg="CreateContainer within sandbox \"1a69edd2fc5244c3e9a9c3e8bf8b8266b3eb1b74533daf9c3e3c32aa5a5e2741\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"1b595b44fa7f7f5a087d4ad1c39369199ac5438debdad7b1086cd61135edc02a\"" Oct 2 19:05:53.427927 env[1139]: time="2023-10-02T19:05:53.426432681Z" level=info msg="StartContainer for \"1b595b44fa7f7f5a087d4ad1c39369199ac5438debdad7b1086cd61135edc02a\"" Oct 2 19:05:53.452448 systemd[1]: Started cri-containerd-1b595b44fa7f7f5a087d4ad1c39369199ac5438debdad7b1086cd61135edc02a.scope. Oct 2 19:05:53.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.502000 audit: BPF prog-id=161 op=LOAD Oct 2 19:05:53.502000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.502000 audit[3848]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3419 pid=3848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:53.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162353935623434666137663766356130383764346164316333393336 Oct 2 19:05:53.502000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.502000 audit[3848]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3419 pid=3848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:53.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162353935623434666137663766356130383764346164316333393336 Oct 2 19:05:53.502000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.502000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.502000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.502000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.502000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.502000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.502000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.502000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.502000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.502000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.502000 audit: BPF prog-id=162 op=LOAD Oct 2 19:05:53.502000 audit[3848]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3419 pid=3848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:53.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162353935623434666137663766356130383764346164316333393336 Oct 2 19:05:53.504000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.504000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.504000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.504000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.504000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.504000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.504000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.504000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.504000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.504000 audit: BPF prog-id=163 op=LOAD Oct 2 19:05:53.504000 audit[3848]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3419 pid=3848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:53.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162353935623434666137663766356130383764346164316333393336 Oct 2 19:05:53.504000 audit: BPF prog-id=163 op=UNLOAD Oct 2 19:05:53.504000 audit: BPF prog-id=162 op=UNLOAD Oct 2 19:05:53.504000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.504000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.504000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.504000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.504000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.504000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.504000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.504000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.504000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.504000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:53.504000 audit: BPF prog-id=164 op=LOAD Oct 2 19:05:53.504000 audit[3848]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3419 pid=3848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:53.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162353935623434666137663766356130383764346164316333393336 Oct 2 19:05:53.523387 env[1139]: time="2023-10-02T19:05:53.523340342Z" level=info msg="StartContainer for \"1b595b44fa7f7f5a087d4ad1c39369199ac5438debdad7b1086cd61135edc02a\" returns successfully" Oct 2 19:05:53.529458 kubelet[2007]: I1002 19:05:53.526129 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-n9g57" nodeCondition=["DiskPressure"] Oct 2 19:05:53.532024 systemd[1]: run-netns-cni\x2d145ace3b\x2db8ea\x2d51e1\x2dd58f\x2de004a6d9c935.mount: Deactivated successfully. Oct 2 19:05:53.532110 systemd[1]: run-netns-cni\x2d59b54774\x2dc58e\x2d4385\x2d022d\x2d59f9c8585fd7.mount: Deactivated successfully. Oct 2 19:05:53.559373 kubelet[2007]: I1002 19:05:53.559334 2007 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-74b9887bb6-g94f7" podStartSLOduration=21.522803969 podCreationTimestamp="2023-10-02 19:05:30 +0000 UTC" firstStartedPulling="2023-10-02 19:05:51.368817543 +0000 UTC m=+41.101278465" lastFinishedPulling="2023-10-02 19:05:53.405298325 +0000 UTC m=+43.137759247" observedRunningTime="2023-10-02 19:05:53.559061386 +0000 UTC m=+43.291522388" watchObservedRunningTime="2023-10-02 19:05:53.559284751 +0000 UTC m=+43.291745633" Oct 2 19:05:53.659011 kubelet[2007]: I1002 19:05:53.658890 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-crjk2" nodeCondition=["DiskPressure"] Oct 2 19:05:53.705526 kubelet[2007]: I1002 19:05:53.705469 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-vfgrp" nodeCondition=["DiskPressure"] Oct 2 19:05:53.806966 kubelet[2007]: I1002 19:05:53.806915 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-p6zqh" nodeCondition=["DiskPressure"] Oct 2 19:05:53.905747 kubelet[2007]: I1002 19:05:53.905390 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-4gcmj" nodeCondition=["DiskPressure"] Oct 2 19:05:53.969582 systemd-networkd[1043]: calid4b0e91b91f: Gained IPv6LL Oct 2 19:05:54.011256 kubelet[2007]: I1002 19:05:54.011211 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-d6x5b" nodeCondition=["DiskPressure"] Oct 2 19:05:54.204435 kubelet[2007]: I1002 19:05:54.204385 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-5p5g4" nodeCondition=["DiskPressure"] Oct 2 19:05:54.225646 systemd-networkd[1043]: cali6e1aed466ec: Gained IPv6LL Oct 2 19:05:54.225966 systemd-networkd[1043]: cali977a76c1029: Gained IPv6LL Oct 2 19:05:54.304947 kubelet[2007]: I1002 19:05:54.304901 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-mfnr6" nodeCondition=["DiskPressure"] Oct 2 19:05:54.404430 kubelet[2007]: I1002 19:05:54.404372 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-9flbk" nodeCondition=["DiskPressure"] Oct 2 19:05:54.506704 kubelet[2007]: I1002 19:05:54.506677 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-8cq2t" nodeCondition=["DiskPressure"] Oct 2 19:05:54.560014 kubelet[2007]: I1002 19:05:54.559977 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-zwmmq" nodeCondition=["DiskPressure"] Oct 2 19:05:54.718919 kubelet[2007]: I1002 19:05:54.718488 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-g7flt" nodeCondition=["DiskPressure"] Oct 2 19:05:54.808317 kubelet[2007]: I1002 19:05:54.808049 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-cdjv4" nodeCondition=["DiskPressure"] Oct 2 19:05:54.910444 kubelet[2007]: I1002 19:05:54.907617 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-xz5lv" nodeCondition=["DiskPressure"] Oct 2 19:05:55.006752 kubelet[2007]: I1002 19:05:55.006708 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-z5426" nodeCondition=["DiskPressure"] Oct 2 19:05:55.105716 kubelet[2007]: I1002 19:05:55.105614 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-ptmbr" nodeCondition=["DiskPressure"] Oct 2 19:05:55.159820 env[1139]: time="2023-10-02T19:05:55.159497799Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:55.163375 env[1139]: time="2023-10-02T19:05:55.163220441Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:55.165613 env[1139]: time="2023-10-02T19:05:55.165545051Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:55.169636 env[1139]: time="2023-10-02T19:05:55.169589140Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:55.170438 env[1139]: time="2023-10-02T19:05:55.170189033Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108\"" Oct 2 19:05:55.172519 env[1139]: time="2023-10-02T19:05:55.172479283Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:05:55.174162 env[1139]: time="2023-10-02T19:05:55.174092278Z" level=info msg="CreateContainer within sandbox \"3dd5ba5f4c7d24a032122d4cdf8dcb0289acd062ee3e9352748e9c991d453707\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:05:55.189184 env[1139]: time="2023-10-02T19:05:55.189125647Z" level=info msg="CreateContainer within sandbox \"3dd5ba5f4c7d24a032122d4cdf8dcb0289acd062ee3e9352748e9c991d453707\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"2bc9935e282375fb5531ca090a4ee8cb1054e0db2fcda46e509968efe16be583\"" Oct 2 19:05:55.189953 env[1139]: time="2023-10-02T19:05:55.189914304Z" level=info msg="StartContainer for \"2bc9935e282375fb5531ca090a4ee8cb1054e0db2fcda46e509968efe16be583\"" Oct 2 19:05:55.209124 kubelet[2007]: I1002 19:05:55.209091 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-7gljt" nodeCondition=["DiskPressure"] Oct 2 19:05:55.225890 systemd[1]: Started cri-containerd-2bc9935e282375fb5531ca090a4ee8cb1054e0db2fcda46e509968efe16be583.scope. Oct 2 19:05:55.261290 kubelet[2007]: I1002 19:05:55.261233 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-2thlv" nodeCondition=["DiskPressure"] Oct 2 19:05:55.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.269000 audit: BPF prog-id=165 op=LOAD Oct 2 19:05:55.269000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.269000 audit[3937]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400018db38 a2=10 a3=0 items=0 ppid=3694 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:55.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262633939333565323832333735666235353331636130393061346565 Oct 2 19:05:55.269000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.269000 audit[3937]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400018d5a0 a2=3c a3=0 items=0 ppid=3694 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:55.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262633939333565323832333735666235353331636130393061346565 Oct 2 19:05:55.269000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.269000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.269000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.269000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.269000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.269000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.269000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.269000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.269000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.269000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.269000 audit: BPF prog-id=166 op=LOAD Oct 2 19:05:55.269000 audit[3937]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400018d8e0 a2=78 a3=0 items=0 ppid=3694 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:55.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262633939333565323832333735666235353331636130393061346565 Oct 2 19:05:55.269000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.269000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.269000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.269000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.269000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.269000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.269000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.269000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.269000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.269000 audit: BPF prog-id=167 op=LOAD Oct 2 19:05:55.269000 audit[3937]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400018d670 a2=78 a3=0 items=0 ppid=3694 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:55.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262633939333565323832333735666235353331636130393061346565 Oct 2 19:05:55.269000 audit: BPF prog-id=167 op=UNLOAD Oct 2 19:05:55.270000 audit: BPF prog-id=166 op=UNLOAD Oct 2 19:05:55.270000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.270000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.270000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.270000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.270000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.270000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.270000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.270000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.270000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.270000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.270000 audit: BPF prog-id=168 op=LOAD Oct 2 19:05:55.270000 audit[3937]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400018db40 a2=78 a3=0 items=0 ppid=3694 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:55.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262633939333565323832333735666235353331636130393061346565 Oct 2 19:05:55.289024 env[1139]: time="2023-10-02T19:05:55.288973068Z" level=info msg="StartContainer for \"2bc9935e282375fb5531ca090a4ee8cb1054e0db2fcda46e509968efe16be583\" returns successfully" Oct 2 19:05:55.323928 env[1139]: time="2023-10-02T19:05:55.323866790Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:05:55.324695 env[1139]: time="2023-10-02T19:05:55.324650407Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:05:55.325113 kubelet[2007]: E1002 19:05:55.324910 2007 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:05:55.325113 kubelet[2007]: E1002 19:05:55.324962 2007 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:05:55.325730 env[1139]: time="2023-10-02T19:05:55.325698990Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Oct 2 19:05:55.326127 kubelet[2007]: E1002 19:05:55.326082 2007 kuberuntime_manager.go:1209] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-dgn5d,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-vp4kr_calico-system(6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:05:55.360510 kubelet[2007]: I1002 19:05:55.360173 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-mh524" nodeCondition=["DiskPressure"] Oct 2 19:05:55.403533 env[1139]: time="2023-10-02T19:05:55.403483210Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:55.405611 env[1139]: time="2023-10-02T19:05:55.405548135Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:55.407774 env[1139]: time="2023-10-02T19:05:55.407740023Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:55.410046 env[1139]: time="2023-10-02T19:05:55.410011592Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:05:55.410446 env[1139]: time="2023-10-02T19:05:55.410383040Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108\"" Oct 2 19:05:55.411722 env[1139]: time="2023-10-02T19:05:55.411690109Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:05:55.413431 env[1139]: time="2023-10-02T19:05:55.413382386Z" level=info msg="CreateContainer within sandbox \"e4703c4bf0ed9d41bdd67e1d51d792ec419d380e6e48a0be33d24628d3ae6558\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:05:55.425711 env[1139]: time="2023-10-02T19:05:55.425637014Z" level=info msg="CreateContainer within sandbox \"e4703c4bf0ed9d41bdd67e1d51d792ec419d380e6e48a0be33d24628d3ae6558\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"759bfeb539f7abb0c4b82db6ccf350edd44b620feb03347c3cc4c5558b9a25b0\"" Oct 2 19:05:55.426130 env[1139]: time="2023-10-02T19:05:55.426103144Z" level=info msg="StartContainer for \"759bfeb539f7abb0c4b82db6ccf350edd44b620feb03347c3cc4c5558b9a25b0\"" Oct 2 19:05:55.443237 systemd[1]: Started cri-containerd-759bfeb539f7abb0c4b82db6ccf350edd44b620feb03347c3cc4c5558b9a25b0.scope. Oct 2 19:05:55.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.465000 audit: BPF prog-id=169 op=LOAD Oct 2 19:05:55.466000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.466000 audit[3979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3797 pid=3979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:55.466000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735396266656235333966376162623063346238326462366363663335 Oct 2 19:05:55.466000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.466000 audit[3979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3797 pid=3979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:55.466000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735396266656235333966376162623063346238326462366363663335 Oct 2 19:05:55.466000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.466000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.466000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.466000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.466000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.466000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.466000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.466000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.466000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.466000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.466000 audit: BPF prog-id=170 op=LOAD Oct 2 19:05:55.466000 audit[3979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3797 pid=3979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:55.466000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735396266656235333966376162623063346238326462366363663335 Oct 2 19:05:55.466000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.466000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.466000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.466000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.466000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.466000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.466000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.466000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.466000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.466000 audit: BPF prog-id=171 op=LOAD Oct 2 19:05:55.466000 audit[3979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3797 pid=3979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:55.466000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735396266656235333966376162623063346238326462366363663335 Oct 2 19:05:55.467000 audit: BPF prog-id=171 op=UNLOAD Oct 2 19:05:55.467000 audit: BPF prog-id=170 op=UNLOAD Oct 2 19:05:55.467000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.467000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.467000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.467000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.467000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.467000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.467000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.467000 audit[3979]: AVC avc: denied { perfmon } for pid=3979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.467000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.467000 audit[3979]: AVC avc: denied { bpf } for pid=3979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:05:55.467000 audit: BPF prog-id=172 op=LOAD Oct 2 19:05:55.467000 audit[3979]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3797 pid=3979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:55.467000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735396266656235333966376162623063346238326462366363663335 Oct 2 19:05:55.492135 env[1139]: time="2023-10-02T19:05:55.492087666Z" level=info msg="StartContainer for \"759bfeb539f7abb0c4b82db6ccf350edd44b620feb03347c3cc4c5558b9a25b0\" returns successfully" Oct 2 19:05:55.556289 kubelet[2007]: I1002 19:05:55.556255 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-t77f9" nodeCondition=["DiskPressure"] Oct 2 19:05:55.565337 kubelet[2007]: E1002 19:05:55.565300 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:55.569935 kubelet[2007]: E1002 19:05:55.569909 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:55.580418 kubelet[2007]: I1002 19:05:55.578897 2007 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-hsmbh" podStartSLOduration=29.207871893 podCreationTimestamp="2023-10-02 19:05:24 +0000 UTC" firstStartedPulling="2023-10-02 19:05:53.040349153 +0000 UTC m=+42.772810075" lastFinishedPulling="2023-10-02 19:05:55.411339901 +0000 UTC m=+45.143800823" observedRunningTime="2023-10-02 19:05:55.577150884 +0000 UTC m=+45.309611886" watchObservedRunningTime="2023-10-02 19:05:55.578862641 +0000 UTC m=+45.311323563" Oct 2 19:05:55.583596 systemd[1]: run-containerd-runc-k8s.io-2bc9935e282375fb5531ca090a4ee8cb1054e0db2fcda46e509968efe16be583-runc.ZnLdhg.mount: Deactivated successfully. Oct 2 19:05:55.584811 env[1139]: time="2023-10-02T19:05:55.584754690Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:05:55.590808 env[1139]: time="2023-10-02T19:05:55.590735781Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:05:55.594605 kubelet[2007]: E1002 19:05:55.594578 2007 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:05:55.594704 kubelet[2007]: E1002 19:05:55.594617 2007 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:05:55.594704 kubelet[2007]: E1002 19:05:55.594689 2007 kuberuntime_manager.go:1209] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-dgn5d,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-vp4kr_calico-system(6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:05:55.594830 kubelet[2007]: E1002 19:05:55.594738 2007 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-vp4kr" podUID="6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8" Oct 2 19:05:55.605000 audit[4009]: NETFILTER_CFG table=filter:105 family=2 entries=14 op=nft_register_rule pid=4009 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:05:55.605000 audit[4009]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffe6fa2e50 a2=0 a3=ffffac9906c0 items=0 ppid=2173 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:55.605000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:05:55.606000 audit[4009]: NETFILTER_CFG table=nat:106 family=2 entries=14 op=nft_register_rule pid=4009 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:05:55.606000 audit[4009]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3300 a0=3 a1=ffffe6fa2e50 a2=0 a3=ffffac9906c0 items=0 ppid=2173 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:55.606000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:05:55.621000 audit[4011]: NETFILTER_CFG table=filter:107 family=2 entries=11 op=nft_register_rule pid=4011 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:05:55.625786 kernel: kauditd_printk_skb: 411 callbacks suppressed Oct 2 19:05:55.625864 kernel: audit: type=1325 audit(1696273555.621:1285): table=filter:107 family=2 entries=11 op=nft_register_rule pid=4011 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:05:55.625886 kernel: audit: type=1300 audit(1696273555.621:1285): arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=fffff4e88130 a2=0 a3=ffff9fda96c0 items=0 ppid=2173 pid=4011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:55.621000 audit[4011]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=fffff4e88130 a2=0 a3=ffff9fda96c0 items=0 ppid=2173 pid=4011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:55.621000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:05:55.630729 kernel: audit: type=1327 audit(1696273555.621:1285): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:05:55.624000 audit[4011]: NETFILTER_CFG table=nat:108 family=2 entries=35 op=nft_register_chain pid=4011 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:05:55.624000 audit[4011]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13788 a0=3 a1=fffff4e88130 a2=0 a3=ffff9fda96c0 items=0 ppid=2173 pid=4011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:55.638836 kernel: audit: type=1325 audit(1696273555.624:1286): table=nat:108 family=2 entries=35 op=nft_register_chain pid=4011 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:05:55.638898 kernel: audit: type=1300 audit(1696273555.624:1286): arch=c00000b7 syscall=211 success=yes exit=13788 a0=3 a1=fffff4e88130 a2=0 a3=ffff9fda96c0 items=0 ppid=2173 pid=4011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:55.638936 kernel: audit: type=1327 audit(1696273555.624:1286): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:05:55.624000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:05:55.711101 kubelet[2007]: I1002 19:05:55.711046 2007 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-z2z9h" podStartSLOduration=29.509577547 podCreationTimestamp="2023-10-02 19:05:24 +0000 UTC" firstStartedPulling="2023-10-02 19:05:52.970186123 +0000 UTC m=+42.702647045" lastFinishedPulling="2023-10-02 19:05:55.171617184 +0000 UTC m=+44.904078106" observedRunningTime="2023-10-02 19:05:55.594451302 +0000 UTC m=+45.326912224" watchObservedRunningTime="2023-10-02 19:05:55.711008608 +0000 UTC m=+45.443469530" Oct 2 19:05:55.712263 kubelet[2007]: I1002 19:05:55.712234 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-mncr8" nodeCondition=["DiskPressure"] Oct 2 19:05:55.756511 kubelet[2007]: I1002 19:05:55.756461 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-jftg4" nodeCondition=["DiskPressure"] Oct 2 19:05:55.856698 kubelet[2007]: I1002 19:05:55.856652 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-6mp57" nodeCondition=["DiskPressure"] Oct 2 19:05:55.957121 kubelet[2007]: I1002 19:05:55.957009 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-xxlq4" nodeCondition=["DiskPressure"] Oct 2 19:05:56.060612 kubelet[2007]: I1002 19:05:56.058745 2007 eviction_manager.go:170] "Failed to admit pod to node" pod="tigera-operator/tigera-operator-8547bd6cc6-jl9tc" nodeCondition=["DiskPressure"] Oct 2 19:05:56.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.94:22-10.0.0.1:57000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:56.330993 systemd[1]: Started sshd@7-10.0.0.94:22-10.0.0.1:57000.service. Oct 2 19:05:56.335465 kernel: audit: type=1130 audit(1696273556.330:1287): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.94:22-10.0.0.1:57000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:56.374000 audit[4018]: USER_ACCT pid=4018 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:05:56.375673 sshd[4018]: Accepted publickey for core from 10.0.0.1 port 57000 ssh2: RSA SHA256:327EISj6dhgnnLT6sEqi2+uwythtGn0QzwGU+yMaXG4 Oct 2 19:05:56.377000 audit[4018]: CRED_ACQ pid=4018 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:05:56.378798 sshd[4018]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:05:56.380147 kernel: audit: type=1101 audit(1696273556.374:1288): pid=4018 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:05:56.380213 kernel: audit: type=1103 audit(1696273556.377:1289): pid=4018 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:05:56.382266 kernel: audit: type=1006 audit(1696273556.377:1290): pid=4018 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Oct 2 19:05:56.377000 audit[4018]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc0d3c1d0 a2=3 a3=1 items=0 ppid=1 pid=4018 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:56.377000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:05:56.386154 systemd-logind[1123]: New session 8 of user core. Oct 2 19:05:56.387081 systemd[1]: Started session-8.scope. Oct 2 19:05:56.390000 audit[4018]: USER_START pid=4018 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:05:56.391000 audit[4020]: CRED_ACQ pid=4020 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:05:56.566919 sshd[4018]: pam_unix(sshd:session): session closed for user core Oct 2 19:05:56.568000 audit[4018]: USER_END pid=4018 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:05:56.569000 audit[4018]: CRED_DISP pid=4018 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:05:56.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.94:22-10.0.0.1:57000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:56.571792 systemd[1]: sshd@7-10.0.0.94:22-10.0.0.1:57000.service: Deactivated successfully. Oct 2 19:05:56.572868 kubelet[2007]: E1002 19:05:56.572681 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:56.572583 systemd[1]: session-8.scope: Deactivated successfully. Oct 2 19:05:56.573662 kubelet[2007]: E1002 19:05:56.573613 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:56.575685 kubelet[2007]: E1002 19:05:56.575663 2007 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-vp4kr" podUID="6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8" Oct 2 19:05:56.575772 systemd-logind[1123]: Session 8 logged out. Waiting for processes to exit. Oct 2 19:05:56.578698 systemd-logind[1123]: Removed session 8. Oct 2 19:05:56.645000 audit[4034]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=4034 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:05:56.645000 audit[4034]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=fffff15b4d20 a2=0 a3=ffff915e46c0 items=0 ppid=2173 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:56.645000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:05:56.658000 audit[4034]: NETFILTER_CFG table=nat:110 family=2 entries=56 op=nft_register_chain pid=4034 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:05:56.658000 audit[4034]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19452 a0=3 a1=fffff15b4d20 a2=0 a3=ffff915e46c0 items=0 ppid=2173 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:56.658000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:05:57.574201 kubelet[2007]: E1002 19:05:57.574173 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:57.574640 kubelet[2007]: E1002 19:05:57.574529 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:58.576613 kubelet[2007]: E1002 19:05:58.576573 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:05:58.789097 systemd[1]: run-containerd-runc-k8s.io-1b595b44fa7f7f5a087d4ad1c39369199ac5438debdad7b1086cd61135edc02a-runc.KfQfOl.mount: Deactivated successfully. Oct 2 19:06:02.099074 kubelet[2007]: I1002 19:06:02.099016 2007 eviction_manager.go:342] "Eviction manager: attempting to reclaim" resourceName="ephemeral-storage" Oct 2 19:06:02.099470 kubelet[2007]: I1002 19:06:02.099454 2007 container_gc.go:86] "Attempting to delete unused containers" Oct 2 19:06:02.101303 env[1139]: time="2023-10-02T19:06:02.100910597Z" level=info msg="StopPodSandbox for \"54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed\"" Oct 2 19:06:02.174342 env[1139]: 2023-10-02 19:06:02.141 [WARNING][4106] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--vp4kr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8", ResourceVersion:"1149", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 5, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7ba9914687d8bc213d4a0ef5aec845bcf4a32e55bc130d0c313133895e36a239", Pod:"csi-node-driver-vp4kr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali6e1aed466ec", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:06:02.174342 env[1139]: 2023-10-02 19:06:02.141 [INFO][4106] k8s.go 576: Cleaning up netns ContainerID="54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" Oct 2 19:06:02.174342 env[1139]: 2023-10-02 19:06:02.142 [INFO][4106] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" iface="eth0" netns="" Oct 2 19:06:02.174342 env[1139]: 2023-10-02 19:06:02.142 [INFO][4106] k8s.go 583: Releasing IP address(es) ContainerID="54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" Oct 2 19:06:02.174342 env[1139]: 2023-10-02 19:06:02.142 [INFO][4106] utils.go 196: Calico CNI releasing IP address ContainerID="54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" Oct 2 19:06:02.174342 env[1139]: 2023-10-02 19:06:02.161 [INFO][4113] ipam_plugin.go 416: Releasing address using handleID ContainerID="54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" HandleID="k8s-pod-network.54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" Workload="localhost-k8s-csi--node--driver--vp4kr-eth0" Oct 2 19:06:02.174342 env[1139]: time="2023-10-02T19:06:02Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:06:02.174342 env[1139]: time="2023-10-02T19:06:02Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:06:02.174342 env[1139]: 2023-10-02 19:06:02.170 [WARNING][4113] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" HandleID="k8s-pod-network.54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" Workload="localhost-k8s-csi--node--driver--vp4kr-eth0" Oct 2 19:06:02.174342 env[1139]: 2023-10-02 19:06:02.170 [INFO][4113] ipam_plugin.go 444: Releasing address using workloadID ContainerID="54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" HandleID="k8s-pod-network.54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" Workload="localhost-k8s-csi--node--driver--vp4kr-eth0" Oct 2 19:06:02.174342 env[1139]: time="2023-10-02T19:06:02Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:06:02.174342 env[1139]: 2023-10-02 19:06:02.172 [INFO][4106] k8s.go 589: Teardown processing complete. ContainerID="54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" Oct 2 19:06:02.174945 env[1139]: time="2023-10-02T19:06:02.174896205Z" level=info msg="TearDown network for sandbox \"54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed\" successfully" Oct 2 19:06:02.175036 env[1139]: time="2023-10-02T19:06:02.175019328Z" level=info msg="StopPodSandbox for \"54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed\" returns successfully" Oct 2 19:06:02.175662 env[1139]: time="2023-10-02T19:06:02.175634540Z" level=info msg="RemovePodSandbox for \"54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed\"" Oct 2 19:06:02.175860 env[1139]: time="2023-10-02T19:06:02.175814384Z" level=info msg="Forcibly stopping sandbox \"54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed\"" Oct 2 19:06:02.243036 env[1139]: 2023-10-02 19:06:02.211 [WARNING][4135] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--vp4kr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8", ResourceVersion:"1149", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 5, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7ba9914687d8bc213d4a0ef5aec845bcf4a32e55bc130d0c313133895e36a239", Pod:"csi-node-driver-vp4kr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali6e1aed466ec", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:06:02.243036 env[1139]: 2023-10-02 19:06:02.211 [INFO][4135] k8s.go 576: Cleaning up netns ContainerID="54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" Oct 2 19:06:02.243036 env[1139]: 2023-10-02 19:06:02.211 [INFO][4135] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" iface="eth0" netns="" Oct 2 19:06:02.243036 env[1139]: 2023-10-02 19:06:02.211 [INFO][4135] k8s.go 583: Releasing IP address(es) ContainerID="54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" Oct 2 19:06:02.243036 env[1139]: 2023-10-02 19:06:02.211 [INFO][4135] utils.go 196: Calico CNI releasing IP address ContainerID="54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" Oct 2 19:06:02.243036 env[1139]: 2023-10-02 19:06:02.230 [INFO][4142] ipam_plugin.go 416: Releasing address using handleID ContainerID="54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" HandleID="k8s-pod-network.54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" Workload="localhost-k8s-csi--node--driver--vp4kr-eth0" Oct 2 19:06:02.243036 env[1139]: time="2023-10-02T19:06:02Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:06:02.243036 env[1139]: time="2023-10-02T19:06:02Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:06:02.243036 env[1139]: 2023-10-02 19:06:02.239 [WARNING][4142] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" HandleID="k8s-pod-network.54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" Workload="localhost-k8s-csi--node--driver--vp4kr-eth0" Oct 2 19:06:02.243036 env[1139]: 2023-10-02 19:06:02.239 [INFO][4142] ipam_plugin.go 444: Releasing address using workloadID ContainerID="54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" HandleID="k8s-pod-network.54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" Workload="localhost-k8s-csi--node--driver--vp4kr-eth0" Oct 2 19:06:02.243036 env[1139]: time="2023-10-02T19:06:02Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:06:02.243036 env[1139]: 2023-10-02 19:06:02.241 [INFO][4135] k8s.go 589: Teardown processing complete. ContainerID="54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed" Oct 2 19:06:02.243582 env[1139]: time="2023-10-02T19:06:02.243544426Z" level=info msg="TearDown network for sandbox \"54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed\" successfully" Oct 2 19:06:02.280108 env[1139]: time="2023-10-02T19:06:02.276577011Z" level=info msg="RemovePodSandbox \"54c88d6c6403e429660eae29015eb5ad20e68e7ea60a33841dce1467189b98ed\" returns successfully" Oct 2 19:06:02.280108 env[1139]: time="2023-10-02T19:06:02.277029100Z" level=info msg="StopPodSandbox for \"0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c\"" Oct 2 19:06:02.361774 env[1139]: 2023-10-02 19:06:02.317 [WARNING][4164] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--hsmbh-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"1c72268b-aac6-447a-851c-e4e6f761535e", ResourceVersion:"1141", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 5, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e4703c4bf0ed9d41bdd67e1d51d792ec419d380e6e48a0be33d24628d3ae6558", Pod:"coredns-5dd5756b68-hsmbh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali977a76c1029", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:06:02.361774 env[1139]: 2023-10-02 19:06:02.317 [INFO][4164] k8s.go 576: Cleaning up netns ContainerID="0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" Oct 2 19:06:02.361774 env[1139]: 2023-10-02 19:06:02.317 [INFO][4164] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" iface="eth0" netns="" Oct 2 19:06:02.361774 env[1139]: 2023-10-02 19:06:02.317 [INFO][4164] k8s.go 583: Releasing IP address(es) ContainerID="0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" Oct 2 19:06:02.361774 env[1139]: 2023-10-02 19:06:02.317 [INFO][4164] utils.go 196: Calico CNI releasing IP address ContainerID="0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" Oct 2 19:06:02.361774 env[1139]: 2023-10-02 19:06:02.340 [INFO][4171] ipam_plugin.go 416: Releasing address using handleID ContainerID="0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" HandleID="k8s-pod-network.0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" Workload="localhost-k8s-coredns--5dd5756b68--hsmbh-eth0" Oct 2 19:06:02.361774 env[1139]: time="2023-10-02T19:06:02Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:06:02.361774 env[1139]: time="2023-10-02T19:06:02Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:06:02.361774 env[1139]: 2023-10-02 19:06:02.355 [WARNING][4171] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" HandleID="k8s-pod-network.0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" Workload="localhost-k8s-coredns--5dd5756b68--hsmbh-eth0" Oct 2 19:06:02.361774 env[1139]: 2023-10-02 19:06:02.355 [INFO][4171] ipam_plugin.go 444: Releasing address using workloadID ContainerID="0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" HandleID="k8s-pod-network.0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" Workload="localhost-k8s-coredns--5dd5756b68--hsmbh-eth0" Oct 2 19:06:02.361774 env[1139]: time="2023-10-02T19:06:02Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:06:02.361774 env[1139]: 2023-10-02 19:06:02.360 [INFO][4164] k8s.go 589: Teardown processing complete. ContainerID="0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" Oct 2 19:06:02.361774 env[1139]: time="2023-10-02T19:06:02.361740324Z" level=info msg="TearDown network for sandbox \"0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c\" successfully" Oct 2 19:06:02.361774 env[1139]: time="2023-10-02T19:06:02.361775684Z" level=info msg="StopPodSandbox for \"0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c\" returns successfully" Oct 2 19:06:02.366089 env[1139]: time="2023-10-02T19:06:02.366062411Z" level=info msg="RemovePodSandbox for \"0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c\"" Oct 2 19:06:02.366221 env[1139]: time="2023-10-02T19:06:02.366182493Z" level=info msg="Forcibly stopping sandbox \"0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c\"" Oct 2 19:06:02.434481 env[1139]: 2023-10-02 19:06:02.402 [WARNING][4194] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--hsmbh-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"1c72268b-aac6-447a-851c-e4e6f761535e", ResourceVersion:"1141", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 5, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e4703c4bf0ed9d41bdd67e1d51d792ec419d380e6e48a0be33d24628d3ae6558", Pod:"coredns-5dd5756b68-hsmbh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali977a76c1029", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:06:02.434481 env[1139]: 2023-10-02 19:06:02.402 [INFO][4194] k8s.go 576: Cleaning up netns ContainerID="0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" Oct 2 19:06:02.434481 env[1139]: 2023-10-02 19:06:02.402 [INFO][4194] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" iface="eth0" netns="" Oct 2 19:06:02.434481 env[1139]: 2023-10-02 19:06:02.402 [INFO][4194] k8s.go 583: Releasing IP address(es) ContainerID="0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" Oct 2 19:06:02.434481 env[1139]: 2023-10-02 19:06:02.402 [INFO][4194] utils.go 196: Calico CNI releasing IP address ContainerID="0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" Oct 2 19:06:02.434481 env[1139]: 2023-10-02 19:06:02.421 [INFO][4201] ipam_plugin.go 416: Releasing address using handleID ContainerID="0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" HandleID="k8s-pod-network.0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" Workload="localhost-k8s-coredns--5dd5756b68--hsmbh-eth0" Oct 2 19:06:02.434481 env[1139]: time="2023-10-02T19:06:02Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:06:02.434481 env[1139]: time="2023-10-02T19:06:02Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:06:02.434481 env[1139]: 2023-10-02 19:06:02.430 [WARNING][4201] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" HandleID="k8s-pod-network.0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" Workload="localhost-k8s-coredns--5dd5756b68--hsmbh-eth0" Oct 2 19:06:02.434481 env[1139]: 2023-10-02 19:06:02.430 [INFO][4201] ipam_plugin.go 444: Releasing address using workloadID ContainerID="0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" HandleID="k8s-pod-network.0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" Workload="localhost-k8s-coredns--5dd5756b68--hsmbh-eth0" Oct 2 19:06:02.434481 env[1139]: time="2023-10-02T19:06:02Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:06:02.434481 env[1139]: 2023-10-02 19:06:02.433 [INFO][4194] k8s.go 589: Teardown processing complete. ContainerID="0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c" Oct 2 19:06:02.434965 env[1139]: time="2023-10-02T19:06:02.434503547Z" level=info msg="TearDown network for sandbox \"0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c\" successfully" Oct 2 19:06:02.440274 env[1139]: time="2023-10-02T19:06:02.440229263Z" level=info msg="RemovePodSandbox \"0735883f363afde9993c60714ffb461eaef2d7da9be8e8021e2be1ee5e98764c\" returns successfully" Oct 2 19:06:02.440965 env[1139]: time="2023-10-02T19:06:02.440928477Z" level=info msg="StopPodSandbox for \"32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a\"" Oct 2 19:06:02.529939 env[1139]: 2023-10-02 19:06:02.493 [WARNING][4224] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--z2z9h-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"ef92d702-be63-4add-b3cb-5802a224a11e", ResourceVersion:"1071", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 5, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3dd5ba5f4c7d24a032122d4cdf8dcb0289acd062ee3e9352748e9c991d453707", Pod:"coredns-5dd5756b68-z2z9h", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid4b0e91b91f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:06:02.529939 env[1139]: 2023-10-02 19:06:02.493 [INFO][4224] k8s.go 576: Cleaning up netns ContainerID="32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" Oct 2 19:06:02.529939 env[1139]: 2023-10-02 19:06:02.493 [INFO][4224] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" iface="eth0" netns="" Oct 2 19:06:02.529939 env[1139]: 2023-10-02 19:06:02.493 [INFO][4224] k8s.go 583: Releasing IP address(es) ContainerID="32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" Oct 2 19:06:02.529939 env[1139]: 2023-10-02 19:06:02.493 [INFO][4224] utils.go 196: Calico CNI releasing IP address ContainerID="32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" Oct 2 19:06:02.529939 env[1139]: 2023-10-02 19:06:02.517 [INFO][4231] ipam_plugin.go 416: Releasing address using handleID ContainerID="32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" HandleID="k8s-pod-network.32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" Workload="localhost-k8s-coredns--5dd5756b68--z2z9h-eth0" Oct 2 19:06:02.529939 env[1139]: time="2023-10-02T19:06:02Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:06:02.529939 env[1139]: time="2023-10-02T19:06:02Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:06:02.529939 env[1139]: 2023-10-02 19:06:02.525 [WARNING][4231] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" HandleID="k8s-pod-network.32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" Workload="localhost-k8s-coredns--5dd5756b68--z2z9h-eth0" Oct 2 19:06:02.529939 env[1139]: 2023-10-02 19:06:02.525 [INFO][4231] ipam_plugin.go 444: Releasing address using workloadID ContainerID="32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" HandleID="k8s-pod-network.32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" Workload="localhost-k8s-coredns--5dd5756b68--z2z9h-eth0" Oct 2 19:06:02.529939 env[1139]: time="2023-10-02T19:06:02Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:06:02.529939 env[1139]: 2023-10-02 19:06:02.528 [INFO][4224] k8s.go 589: Teardown processing complete. ContainerID="32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" Oct 2 19:06:02.530375 env[1139]: time="2023-10-02T19:06:02.529968508Z" level=info msg="TearDown network for sandbox \"32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a\" successfully" Oct 2 19:06:02.530375 env[1139]: time="2023-10-02T19:06:02.530002548Z" level=info msg="StopPodSandbox for \"32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a\" returns successfully" Oct 2 19:06:02.530709 env[1139]: time="2023-10-02T19:06:02.530671602Z" level=info msg="RemovePodSandbox for \"32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a\"" Oct 2 19:06:02.530759 env[1139]: time="2023-10-02T19:06:02.530711363Z" level=info msg="Forcibly stopping sandbox \"32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a\"" Oct 2 19:06:02.628718 env[1139]: 2023-10-02 19:06:02.578 [WARNING][4255] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--z2z9h-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"ef92d702-be63-4add-b3cb-5802a224a11e", ResourceVersion:"1071", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 5, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3dd5ba5f4c7d24a032122d4cdf8dcb0289acd062ee3e9352748e9c991d453707", Pod:"coredns-5dd5756b68-z2z9h", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid4b0e91b91f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:06:02.628718 env[1139]: 2023-10-02 19:06:02.578 [INFO][4255] k8s.go 576: Cleaning up netns ContainerID="32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" Oct 2 19:06:02.628718 env[1139]: 2023-10-02 19:06:02.578 [INFO][4255] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" iface="eth0" netns="" Oct 2 19:06:02.628718 env[1139]: 2023-10-02 19:06:02.578 [INFO][4255] k8s.go 583: Releasing IP address(es) ContainerID="32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" Oct 2 19:06:02.628718 env[1139]: 2023-10-02 19:06:02.578 [INFO][4255] utils.go 196: Calico CNI releasing IP address ContainerID="32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" Oct 2 19:06:02.628718 env[1139]: 2023-10-02 19:06:02.610 [INFO][4262] ipam_plugin.go 416: Releasing address using handleID ContainerID="32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" HandleID="k8s-pod-network.32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" Workload="localhost-k8s-coredns--5dd5756b68--z2z9h-eth0" Oct 2 19:06:02.628718 env[1139]: time="2023-10-02T19:06:02Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:06:02.628718 env[1139]: time="2023-10-02T19:06:02Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:06:02.628718 env[1139]: 2023-10-02 19:06:02.620 [WARNING][4262] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" HandleID="k8s-pod-network.32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" Workload="localhost-k8s-coredns--5dd5756b68--z2z9h-eth0" Oct 2 19:06:02.628718 env[1139]: 2023-10-02 19:06:02.620 [INFO][4262] ipam_plugin.go 444: Releasing address using workloadID ContainerID="32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" HandleID="k8s-pod-network.32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" Workload="localhost-k8s-coredns--5dd5756b68--z2z9h-eth0" Oct 2 19:06:02.628718 env[1139]: time="2023-10-02T19:06:02Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:06:02.628718 env[1139]: 2023-10-02 19:06:02.624 [INFO][4255] k8s.go 589: Teardown processing complete. ContainerID="32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a" Oct 2 19:06:02.628718 env[1139]: time="2023-10-02T19:06:02.626937858Z" level=info msg="TearDown network for sandbox \"32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a\" successfully" Oct 2 19:06:02.630757 env[1139]: time="2023-10-02T19:06:02.630718814Z" level=info msg="RemovePodSandbox \"32e57d24048dd4e57781ae207ca44e4f5eaa6033b74bcf22bf02b65172d0ad2a\" returns successfully" Oct 2 19:06:02.631778 kubelet[2007]: I1002 19:06:02.631740 2007 image_gc_manager.go:340] "Attempting to delete unused images" Oct 2 19:06:02.647396 kubelet[2007]: I1002 19:06:02.647365 2007 eviction_manager.go:353] "Eviction manager: must evict pod(s) to reclaim" resourceName="ephemeral-storage" Oct 2 19:06:02.647893 kubelet[2007]: I1002 19:06:02.647850 2007 eviction_manager.go:371] "Eviction manager: pods ranked for eviction" pods=["calico-system/csi-node-driver-vp4kr","calico-system/calico-typha-77b6cfc648-8w7zr","calico-system/calico-kube-controllers-74b9887bb6-g94f7","kube-system/coredns-5dd5756b68-hsmbh","kube-system/coredns-5dd5756b68-z2z9h","calico-system/calico-node-zdhnd","kube-system/kube-controller-manager-localhost","kube-system/kube-proxy-8qr5v","kube-system/kube-apiserver-localhost","kube-system/kube-scheduler-localhost"] Oct 2 19:06:02.647893 kubelet[2007]: E1002 19:06:02.647894 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="calico-system/csi-node-driver-vp4kr" Oct 2 19:06:02.648004 kubelet[2007]: E1002 19:06:02.647909 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="calico-system/calico-typha-77b6cfc648-8w7zr" Oct 2 19:06:02.648004 kubelet[2007]: E1002 19:06:02.647919 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="calico-system/calico-kube-controllers-74b9887bb6-g94f7" Oct 2 19:06:02.648004 kubelet[2007]: E1002 19:06:02.647930 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="kube-system/coredns-5dd5756b68-hsmbh" Oct 2 19:06:02.648004 kubelet[2007]: E1002 19:06:02.647939 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="kube-system/coredns-5dd5756b68-z2z9h" Oct 2 19:06:02.648004 kubelet[2007]: E1002 19:06:02.647948 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="calico-system/calico-node-zdhnd" Oct 2 19:06:02.648004 kubelet[2007]: E1002 19:06:02.647958 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="kube-system/kube-controller-manager-localhost" Oct 2 19:06:02.648004 kubelet[2007]: E1002 19:06:02.647966 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="kube-system/kube-proxy-8qr5v" Oct 2 19:06:02.648004 kubelet[2007]: E1002 19:06:02.647974 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="kube-system/kube-apiserver-localhost" Oct 2 19:06:02.648004 kubelet[2007]: E1002 19:06:02.647984 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="kube-system/kube-scheduler-localhost" Oct 2 19:06:02.648004 kubelet[2007]: I1002 19:06:02.647993 2007 eviction_manager.go:403] "Eviction manager: unable to evict any pods from the node" Oct 2 19:06:06.572330 systemd[1]: Started sshd@8-10.0.0.94:22-10.0.0.1:43156.service. Oct 2 19:06:06.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.94:22-10.0.0.1:43156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:06.575893 kernel: kauditd_printk_skb: 13 callbacks suppressed Oct 2 19:06:06.575983 kernel: audit: type=1130 audit(1696273566.572:1298): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.94:22-10.0.0.1:43156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:06.613000 audit[4270]: USER_ACCT pid=4270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:06.614014 sshd[4270]: Accepted publickey for core from 10.0.0.1 port 43156 ssh2: RSA SHA256:327EISj6dhgnnLT6sEqi2+uwythtGn0QzwGU+yMaXG4 Oct 2 19:06:06.615854 sshd[4270]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:06:06.614000 audit[4270]: CRED_ACQ pid=4270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:06.618192 kernel: audit: type=1101 audit(1696273566.613:1299): pid=4270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:06.618256 kernel: audit: type=1103 audit(1696273566.614:1300): pid=4270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:06.618276 kernel: audit: type=1006 audit(1696273566.614:1301): pid=4270 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Oct 2 19:06:06.614000 audit[4270]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffea9081f0 a2=3 a3=1 items=0 ppid=1 pid=4270 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:06.621630 kernel: audit: type=1300 audit(1696273566.614:1301): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffea9081f0 a2=3 a3=1 items=0 ppid=1 pid=4270 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:06.621679 kernel: audit: type=1327 audit(1696273566.614:1301): proctitle=737368643A20636F7265205B707269765D Oct 2 19:06:06.614000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:06:06.624593 systemd-logind[1123]: New session 9 of user core. Oct 2 19:06:06.625598 systemd[1]: Started session-9.scope. Oct 2 19:06:06.628000 audit[4270]: USER_START pid=4270 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:06.630000 audit[4272]: CRED_ACQ pid=4272 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:06.633680 kernel: audit: type=1105 audit(1696273566.628:1302): pid=4270 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:06.633907 kernel: audit: type=1103 audit(1696273566.630:1303): pid=4272 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:06.634000 audit[1900]: AVC avc: denied { watch } for pid=1900 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=4767 scontext=system_u:system_r:svirt_lxc_net_t:s0:c764,c983 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:06:06.634000 audit[1900]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000b1a480 a2=fc6 a3=0 items=0 ppid=1733 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c764,c983 key=(null) Oct 2 19:06:06.639571 kernel: audit: type=1400 audit(1696273566.634:1304): avc: denied { watch } for pid=1900 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=4767 scontext=system_u:system_r:svirt_lxc_net_t:s0:c764,c983 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:06:06.639618 kernel: audit: type=1300 audit(1696273566.634:1304): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000b1a480 a2=fc6 a3=0 items=0 ppid=1733 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c764,c983 key=(null) Oct 2 19:06:06.634000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:06:06.634000 audit[1900]: AVC avc: denied { watch } for pid=1900 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=4779 scontext=system_u:system_r:svirt_lxc_net_t:s0:c764,c983 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:06:06.634000 audit[1900]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40020b68d0 a2=fc6 a3=0 items=0 ppid=1733 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c764,c983 key=(null) Oct 2 19:06:06.634000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:06:06.790116 sshd[4270]: pam_unix(sshd:session): session closed for user core Oct 2 19:06:06.790000 audit[4270]: USER_END pid=4270 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:06.791000 audit[4270]: CRED_DISP pid=4270 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:06.794215 systemd[1]: Started sshd@9-10.0.0.94:22-10.0.0.1:43162.service. Oct 2 19:06:06.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.94:22-10.0.0.1:43162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:06.794743 systemd[1]: sshd@8-10.0.0.94:22-10.0.0.1:43156.service: Deactivated successfully. Oct 2 19:06:06.796313 systemd[1]: session-9.scope: Deactivated successfully. Oct 2 19:06:06.795000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.94:22-10.0.0.1:43156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:06.799517 systemd-logind[1123]: Session 9 logged out. Waiting for processes to exit. Oct 2 19:06:06.800399 systemd-logind[1123]: Removed session 9. Oct 2 19:06:06.834000 audit[4283]: USER_ACCT pid=4283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:06.836295 sshd[4283]: Accepted publickey for core from 10.0.0.1 port 43162 ssh2: RSA SHA256:327EISj6dhgnnLT6sEqi2+uwythtGn0QzwGU+yMaXG4 Oct 2 19:06:06.836000 audit[4283]: CRED_ACQ pid=4283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:06.836000 audit[4283]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffefc85610 a2=3 a3=1 items=0 ppid=1 pid=4283 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:06.836000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:06:06.836842 sshd[4283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:06:06.840336 systemd-logind[1123]: New session 10 of user core. Oct 2 19:06:06.841529 systemd[1]: Started session-10.scope. Oct 2 19:06:06.844000 audit[4283]: USER_START pid=4283 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:06.846000 audit[4286]: CRED_ACQ pid=4286 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:07.092603 sshd[4283]: pam_unix(sshd:session): session closed for user core Oct 2 19:06:07.096480 systemd[1]: Started sshd@10-10.0.0.94:22-10.0.0.1:43178.service. Oct 2 19:06:07.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.94:22-10.0.0.1:43178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:07.100000 audit[4283]: USER_END pid=4283 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:07.100000 audit[4283]: CRED_DISP pid=4283 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:07.102832 systemd[1]: sshd@9-10.0.0.94:22-10.0.0.1:43162.service: Deactivated successfully. Oct 2 19:06:07.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.94:22-10.0.0.1:43162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:07.102994 systemd-logind[1123]: Session 10 logged out. Waiting for processes to exit. Oct 2 19:06:07.103640 systemd[1]: session-10.scope: Deactivated successfully. Oct 2 19:06:07.104263 systemd-logind[1123]: Removed session 10. Oct 2 19:06:07.136000 audit[4295]: USER_ACCT pid=4295 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:07.137291 sshd[4295]: Accepted publickey for core from 10.0.0.1 port 43178 ssh2: RSA SHA256:327EISj6dhgnnLT6sEqi2+uwythtGn0QzwGU+yMaXG4 Oct 2 19:06:07.137000 audit[4295]: CRED_ACQ pid=4295 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:07.137000 audit[4295]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe8888300 a2=3 a3=1 items=0 ppid=1 pid=4295 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:07.137000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:06:07.138442 sshd[4295]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:06:07.141589 systemd-logind[1123]: New session 11 of user core. Oct 2 19:06:07.142508 systemd[1]: Started session-11.scope. Oct 2 19:06:07.145000 audit[4295]: USER_START pid=4295 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:07.147000 audit[4298]: CRED_ACQ pid=4298 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:07.212000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=4779 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:06:07.212000 audit[1875]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=40118d4cc0 a2=fc6 a3=0 items=0 ppid=1731 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c953 key=(null) Oct 2 19:06:07.212000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3934002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Oct 2 19:06:07.212000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=4774 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:06:07.212000 audit[1875]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=4007a24300 a2=fc6 a3=0 items=0 ppid=1731 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c953 key=(null) Oct 2 19:06:07.212000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3934002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Oct 2 19:06:07.213000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=4767 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:06:07.213000 audit[1875]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=400a9c5b80 a2=fc6 a3=0 items=0 ppid=1731 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c953 key=(null) Oct 2 19:06:07.213000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3934002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Oct 2 19:06:07.220000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=4781 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:06:07.220000 audit[1875]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=40118d4d20 a2=fc6 a3=0 items=0 ppid=1731 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c953 key=(null) Oct 2 19:06:07.220000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3934002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Oct 2 19:06:07.226000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=4779 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:06:07.226000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=4767 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:06:07.226000 audit[1875]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4007a24330 a2=fc6 a3=0 items=0 ppid=1731 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c953 key=(null) Oct 2 19:06:07.226000 audit[1875]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=400a9cebe0 a2=fc6 a3=0 items=0 ppid=1731 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c953 key=(null) Oct 2 19:06:07.226000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3934002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Oct 2 19:06:07.226000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3934002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Oct 2 19:06:07.259286 sshd[4295]: pam_unix(sshd:session): session closed for user core Oct 2 19:06:07.259000 audit[4295]: USER_END pid=4295 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:07.259000 audit[4295]: CRED_DISP pid=4295 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:07.261705 systemd[1]: sshd@10-10.0.0.94:22-10.0.0.1:43178.service: Deactivated successfully. Oct 2 19:06:07.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.94:22-10.0.0.1:43178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:07.262520 systemd[1]: session-11.scope: Deactivated successfully. Oct 2 19:06:07.263179 systemd-logind[1123]: Session 11 logged out. Waiting for processes to exit. Oct 2 19:06:07.264140 systemd-logind[1123]: Removed session 11. Oct 2 19:06:08.416694 env[1139]: time="2023-10-02T19:06:08.416038628Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:06:08.574331 env[1139]: time="2023-10-02T19:06:08.574244792Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:06:08.575134 env[1139]: time="2023-10-02T19:06:08.575095338Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:06:08.575377 kubelet[2007]: E1002 19:06:08.575349 2007 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:06:08.575693 kubelet[2007]: E1002 19:06:08.575391 2007 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:06:08.575693 kubelet[2007]: E1002 19:06:08.575513 2007 kuberuntime_manager.go:1209] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-dgn5d,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-vp4kr_calico-system(6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:06:08.576903 env[1139]: time="2023-10-02T19:06:08.576581194Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:06:08.724142 env[1139]: time="2023-10-02T19:06:08.723529137Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:06:08.725398 env[1139]: time="2023-10-02T19:06:08.725206191Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:06:08.725648 kubelet[2007]: E1002 19:06:08.725603 2007 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:06:08.725731 kubelet[2007]: E1002 19:06:08.725655 2007 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:06:08.725803 kubelet[2007]: E1002 19:06:08.725779 2007 kuberuntime_manager.go:1209] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-dgn5d,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-vp4kr_calico-system(6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:06:08.725899 kubelet[2007]: E1002 19:06:08.725833 2007 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-vp4kr" podUID="6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8" Oct 2 19:06:08.796302 systemd[1]: run-containerd-runc-k8s.io-1b595b44fa7f7f5a087d4ad1c39369199ac5438debdad7b1086cd61135edc02a-runc.7RSM6L.mount: Deactivated successfully. Oct 2 19:06:10.443781 systemd[1]: run-containerd-runc-k8s.io-3b20b7157f61fed0ccafbadbf58815084ecf4d7696dc5a445b425fb7df4e2883-runc.Q6AoGN.mount: Deactivated successfully. Oct 2 19:06:10.888000 audit[1900]: AVC avc: denied { watch } for pid=1900 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=4767 scontext=system_u:system_r:svirt_lxc_net_t:s0:c764,c983 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:06:10.888000 audit[1900]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400272a860 a2=fc6 a3=0 items=0 ppid=1733 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c764,c983 key=(null) Oct 2 19:06:10.888000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:06:10.888000 audit[1900]: AVC avc: denied { watch } for pid=1900 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=4767 scontext=system_u:system_r:svirt_lxc_net_t:s0:c764,c983 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:06:10.888000 audit[1900]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002b96ee0 a2=fc6 a3=0 items=0 ppid=1733 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c764,c983 key=(null) Oct 2 19:06:10.888000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:06:10.889000 audit[1900]: AVC avc: denied { watch } for pid=1900 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=4767 scontext=system_u:system_r:svirt_lxc_net_t:s0:c764,c983 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:06:10.889000 audit[1900]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400272a980 a2=fc6 a3=0 items=0 ppid=1733 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c764,c983 key=(null) Oct 2 19:06:10.889000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:06:10.889000 audit[1900]: AVC avc: denied { watch } for pid=1900 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=4767 scontext=system_u:system_r:svirt_lxc_net_t:s0:c764,c983 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:06:10.889000 audit[1900]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002ada540 a2=fc6 a3=0 items=0 ppid=1733 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c764,c983 key=(null) Oct 2 19:06:10.889000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:06:12.670614 kubelet[2007]: I1002 19:06:12.670566 2007 eviction_manager.go:342] "Eviction manager: attempting to reclaim" resourceName="ephemeral-storage" Oct 2 19:06:12.670614 kubelet[2007]: I1002 19:06:12.670614 2007 container_gc.go:86] "Attempting to delete unused containers" Oct 2 19:06:12.672444 kubelet[2007]: I1002 19:06:12.672407 2007 image_gc_manager.go:340] "Attempting to delete unused images" Oct 2 19:06:12.688418 kubelet[2007]: I1002 19:06:12.688370 2007 eviction_manager.go:353] "Eviction manager: must evict pod(s) to reclaim" resourceName="ephemeral-storage" Oct 2 19:06:12.688560 kubelet[2007]: I1002 19:06:12.688522 2007 eviction_manager.go:371] "Eviction manager: pods ranked for eviction" pods=["calico-system/csi-node-driver-vp4kr","calico-system/calico-typha-77b6cfc648-8w7zr","kube-system/coredns-5dd5756b68-hsmbh","kube-system/coredns-5dd5756b68-z2z9h","calico-system/calico-kube-controllers-74b9887bb6-g94f7","calico-system/calico-node-zdhnd","kube-system/kube-controller-manager-localhost","kube-system/kube-proxy-8qr5v","kube-system/kube-apiserver-localhost","kube-system/kube-scheduler-localhost"] Oct 2 19:06:12.688560 kubelet[2007]: E1002 19:06:12.688553 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="calico-system/csi-node-driver-vp4kr" Oct 2 19:06:12.688657 kubelet[2007]: E1002 19:06:12.688567 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="calico-system/calico-typha-77b6cfc648-8w7zr" Oct 2 19:06:12.688657 kubelet[2007]: E1002 19:06:12.688585 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="kube-system/coredns-5dd5756b68-hsmbh" Oct 2 19:06:12.688657 kubelet[2007]: E1002 19:06:12.688596 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="kube-system/coredns-5dd5756b68-z2z9h" Oct 2 19:06:12.688657 kubelet[2007]: E1002 19:06:12.688605 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="calico-system/calico-kube-controllers-74b9887bb6-g94f7" Oct 2 19:06:12.688657 kubelet[2007]: E1002 19:06:12.688614 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="calico-system/calico-node-zdhnd" Oct 2 19:06:12.688657 kubelet[2007]: E1002 19:06:12.688622 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="kube-system/kube-controller-manager-localhost" Oct 2 19:06:12.688657 kubelet[2007]: E1002 19:06:12.688631 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="kube-system/kube-proxy-8qr5v" Oct 2 19:06:12.688657 kubelet[2007]: E1002 19:06:12.688642 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="kube-system/kube-apiserver-localhost" Oct 2 19:06:12.688657 kubelet[2007]: E1002 19:06:12.688650 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="kube-system/kube-scheduler-localhost" Oct 2 19:06:12.688657 kubelet[2007]: I1002 19:06:12.688660 2007 eviction_manager.go:403] "Eviction manager: unable to evict any pods from the node" Oct 2 19:06:17.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.94:22-10.0.0.1:50006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:17.267867 systemd[1]: Started sshd@11-10.0.0.94:22-10.0.0.1:50006.service. Oct 2 19:06:17.268945 kernel: kauditd_printk_skb: 59 callbacks suppressed Oct 2 19:06:17.270957 kernel: audit: type=1130 audit(1696273577.267:1337): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.94:22-10.0.0.1:50006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:17.302000 audit[4382]: USER_ACCT pid=4382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:17.303429 sshd[4382]: Accepted publickey for core from 10.0.0.1 port 50006 ssh2: RSA SHA256:327EISj6dhgnnLT6sEqi2+uwythtGn0QzwGU+yMaXG4 Oct 2 19:06:17.306511 kernel: audit: type=1101 audit(1696273577.302:1338): pid=4382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:17.306000 audit[4382]: CRED_ACQ pid=4382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:17.306900 sshd[4382]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:06:17.310088 kernel: audit: type=1103 audit(1696273577.306:1339): pid=4382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:17.310166 kernel: audit: type=1006 audit(1696273577.306:1340): pid=4382 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Oct 2 19:06:17.310187 kernel: audit: type=1300 audit(1696273577.306:1340): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc6f83260 a2=3 a3=1 items=0 ppid=1 pid=4382 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:17.306000 audit[4382]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc6f83260 a2=3 a3=1 items=0 ppid=1 pid=4382 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:17.312471 kernel: audit: type=1327 audit(1696273577.306:1340): proctitle=737368643A20636F7265205B707269765D Oct 2 19:06:17.306000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:06:17.317389 systemd[1]: Started session-12.scope. Oct 2 19:06:17.317746 systemd-logind[1123]: New session 12 of user core. Oct 2 19:06:17.322000 audit[4382]: USER_START pid=4382 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:17.326449 kernel: audit: type=1105 audit(1696273577.322:1341): pid=4382 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:17.326000 audit[4384]: CRED_ACQ pid=4384 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:17.330476 kernel: audit: type=1103 audit(1696273577.326:1342): pid=4384 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:17.455968 sshd[4382]: pam_unix(sshd:session): session closed for user core Oct 2 19:06:17.458000 audit[4382]: USER_END pid=4382 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:17.458000 audit[4382]: CRED_DISP pid=4382 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:17.460802 systemd[1]: sshd@11-10.0.0.94:22-10.0.0.1:50006.service: Deactivated successfully. Oct 2 19:06:17.461608 systemd[1]: session-12.scope: Deactivated successfully. Oct 2 19:06:17.462753 systemd-logind[1123]: Session 12 logged out. Waiting for processes to exit. Oct 2 19:06:17.463990 kernel: audit: type=1106 audit(1696273577.458:1343): pid=4382 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:17.464055 kernel: audit: type=1104 audit(1696273577.458:1344): pid=4382 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:17.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.94:22-10.0.0.1:50006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:17.466774 systemd-logind[1123]: Removed session 12. Oct 2 19:06:18.792532 systemd[1]: run-containerd-runc-k8s.io-1b595b44fa7f7f5a087d4ad1c39369199ac5438debdad7b1086cd61135edc02a-runc.I8Dhih.mount: Deactivated successfully. Oct 2 19:06:21.406877 kubelet[2007]: E1002 19:06:21.406850 2007 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-vp4kr" podUID="6a50e944-da43-4b8c-8b59-6ac7fb8dc4f8" Oct 2 19:06:22.707848 kubelet[2007]: I1002 19:06:22.707799 2007 eviction_manager.go:342] "Eviction manager: attempting to reclaim" resourceName="ephemeral-storage" Oct 2 19:06:22.707848 kubelet[2007]: I1002 19:06:22.707852 2007 container_gc.go:86] "Attempting to delete unused containers" Oct 2 19:06:22.713735 kubelet[2007]: I1002 19:06:22.709798 2007 image_gc_manager.go:340] "Attempting to delete unused images" Oct 2 19:06:22.729110 kubelet[2007]: I1002 19:06:22.728649 2007 eviction_manager.go:353] "Eviction manager: must evict pod(s) to reclaim" resourceName="ephemeral-storage" Oct 2 19:06:22.729110 kubelet[2007]: I1002 19:06:22.728817 2007 eviction_manager.go:371] "Eviction manager: pods ranked for eviction" pods=["calico-system/csi-node-driver-vp4kr","calico-system/calico-typha-77b6cfc648-8w7zr","kube-system/coredns-5dd5756b68-hsmbh","kube-system/coredns-5dd5756b68-z2z9h","calico-system/calico-kube-controllers-74b9887bb6-g94f7","calico-system/calico-node-zdhnd","kube-system/kube-controller-manager-localhost","kube-system/kube-proxy-8qr5v","kube-system/kube-apiserver-localhost","kube-system/kube-scheduler-localhost"] Oct 2 19:06:22.729110 kubelet[2007]: E1002 19:06:22.728843 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="calico-system/csi-node-driver-vp4kr" Oct 2 19:06:22.729110 kubelet[2007]: E1002 19:06:22.728855 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="calico-system/calico-typha-77b6cfc648-8w7zr" Oct 2 19:06:22.729110 kubelet[2007]: E1002 19:06:22.728866 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="kube-system/coredns-5dd5756b68-hsmbh" Oct 2 19:06:22.729110 kubelet[2007]: E1002 19:06:22.728875 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="kube-system/coredns-5dd5756b68-z2z9h" Oct 2 19:06:22.729110 kubelet[2007]: E1002 19:06:22.728884 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="calico-system/calico-kube-controllers-74b9887bb6-g94f7" Oct 2 19:06:22.729110 kubelet[2007]: E1002 19:06:22.728893 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="calico-system/calico-node-zdhnd" Oct 2 19:06:22.729110 kubelet[2007]: E1002 19:06:22.728901 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="kube-system/kube-controller-manager-localhost" Oct 2 19:06:22.729110 kubelet[2007]: E1002 19:06:22.728911 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="kube-system/kube-proxy-8qr5v" Oct 2 19:06:22.729110 kubelet[2007]: E1002 19:06:22.728920 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="kube-system/kube-apiserver-localhost" Oct 2 19:06:22.729110 kubelet[2007]: E1002 19:06:22.728929 2007 eviction_manager.go:574] "Eviction manager: cannot evict a critical pod" pod="kube-system/kube-scheduler-localhost" Oct 2 19:06:22.729110 kubelet[2007]: I1002 19:06:22.728938 2007 eviction_manager.go:403] "Eviction manager: unable to evict any pods from the node" Oct 2 19:06:23.406607 kubelet[2007]: E1002 19:06:23.406573 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:06:24.450000 audit[4466]: NETFILTER_CFG table=filter:111 family=2 entries=9 op=nft_register_rule pid=4466 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:06:24.453629 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:06:24.453711 kernel: audit: type=1325 audit(1696273584.450:1346): table=filter:111 family=2 entries=9 op=nft_register_rule pid=4466 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:06:24.453748 kernel: audit: type=1300 audit(1696273584.450:1346): arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffc28bde00 a2=0 a3=ffffb54596c0 items=0 ppid=2173 pid=4466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:24.450000 audit[4466]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffc28bde00 a2=0 a3=ffffb54596c0 items=0 ppid=2173 pid=4466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:24.450000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:06:24.460355 kernel: audit: type=1327 audit(1696273584.450:1346): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:06:24.451000 audit[4466]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=4466 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:06:24.451000 audit[4466]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffc28bde00 a2=0 a3=ffffb54596c0 items=0 ppid=2173 pid=4466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:24.477563 kernel: audit: type=1325 audit(1696273584.451:1347): table=nat:112 family=2 entries=20 op=nft_register_rule pid=4466 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:06:24.477643 kernel: audit: type=1300 audit(1696273584.451:1347): arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffc28bde00 a2=0 a3=ffffb54596c0 items=0 ppid=2173 pid=4466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:24.451000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:06:24.480497 kernel: audit: type=1327 audit(1696273584.451:1347): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:06:24.489000 audit[4468]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4468 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:06:24.489000 audit[4468]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffee8c5cc0 a2=0 a3=ffff80bb76c0 items=0 ppid=2173 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:24.495285 kernel: audit: type=1325 audit(1696273584.489:1348): table=filter:113 family=2 entries=10 op=nft_register_rule pid=4468 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:06:24.495383 kernel: audit: type=1300 audit(1696273584.489:1348): arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffee8c5cc0 a2=0 a3=ffff80bb76c0 items=0 ppid=2173 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:24.495429 kernel: audit: type=1327 audit(1696273584.489:1348): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:06:24.489000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:06:24.493000 audit[4468]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4468 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:06:24.493000 audit[4468]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffee8c5cc0 a2=0 a3=ffff80bb76c0 items=0 ppid=2173 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:24.493000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:06:24.502442 kernel: audit: type=1325 audit(1696273584.493:1349): table=nat:114 family=2 entries=20 op=nft_register_rule pid=4468 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:06:25.806000 audit[4474]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4474 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:06:25.806000 audit[4474]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffe444a440 a2=0 a3=ffff975b06c0 items=0 ppid=2173 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:25.806000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:06:25.807000 audit[4474]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4474 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:06:25.807000 audit[4474]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffe444a440 a2=0 a3=ffff975b06c0 items=0 ppid=2173 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:25.807000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:06:26.827000 audit[4476]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=4476 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:06:26.827000 audit[4476]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffc23df8c0 a2=0 a3=ffff986586c0 items=0 ppid=2173 pid=4476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:26.827000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:06:26.828000 audit[4476]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4476 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:06:26.828000 audit[4476]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffc23df8c0 a2=0 a3=ffff986586c0 items=0 ppid=2173 pid=4476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:26.828000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:06:27.405817 kubelet[2007]: E1002 19:06:27.405781 2007 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:06:27.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.94:22-10.0.0.1:46804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:27.460365 systemd[1]: Started sshd@12-10.0.0.94:22-10.0.0.1:46804.service. Oct 2 19:06:27.493000 audit[4478]: USER_ACCT pid=4478 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:27.493656 sshd[4478]: Accepted publickey for core from 10.0.0.1 port 46804 ssh2: RSA SHA256:327EISj6dhgnnLT6sEqi2+uwythtGn0QzwGU+yMaXG4 Oct 2 19:06:27.494000 audit[4478]: CRED_ACQ pid=4478 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:27.494000 audit[4478]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd74c63c0 a2=3 a3=1 items=0 ppid=1 pid=4478 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:27.494000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:06:27.494879 sshd[4478]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:06:27.498481 systemd-logind[1123]: New session 13 of user core. Oct 2 19:06:27.499128 systemd[1]: Started session-13.scope. Oct 2 19:06:27.502000 audit[4478]: USER_START pid=4478 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:27.504000 audit[4480]: CRED_ACQ pid=4480 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:27.617116 sshd[4478]: pam_unix(sshd:session): session closed for user core Oct 2 19:06:27.617000 audit[4478]: USER_END pid=4478 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:27.617000 audit[4478]: CRED_DISP pid=4478 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:06:27.619589 systemd[1]: sshd@12-10.0.0.94:22-10.0.0.1:46804.service: Deactivated successfully. Oct 2 19:06:27.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.94:22-10.0.0.1:46804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:27.620335 systemd[1]: session-13.scope: Deactivated successfully. Oct 2 19:06:27.620873 systemd-logind[1123]: Session 13 logged out. Waiting for processes to exit. Oct 2 19:06:27.621475 systemd-logind[1123]: Removed session 13.