Feb 12 19:46:28.037695 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Feb 9 17:23:38 -00 2024 Feb 12 19:46:28.037740 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 12 19:46:28.037761 kernel: BIOS-provided physical RAM map: Feb 12 19:46:28.037773 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Feb 12 19:46:28.037784 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Feb 12 19:46:28.037794 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Feb 12 19:46:28.037808 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffd7fff] usable Feb 12 19:46:28.037818 kernel: BIOS-e820: [mem 0x000000007ffd8000-0x000000007fffffff] reserved Feb 12 19:46:28.037828 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Feb 12 19:46:28.037835 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Feb 12 19:46:28.037843 kernel: NX (Execute Disable) protection: active Feb 12 19:46:28.037850 kernel: SMBIOS 2.8 present. Feb 12 19:46:28.037857 kernel: DMI: DigitalOcean Droplet/Droplet, BIOS 20171212 12/12/2017 Feb 12 19:46:28.037867 kernel: Hypervisor detected: KVM Feb 12 19:46:28.037880 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 12 19:46:28.037896 kernel: kvm-clock: cpu 0, msr 62faa001, primary cpu clock Feb 12 19:46:28.037908 kernel: kvm-clock: using sched offset of 4460587520 cycles Feb 12 19:46:28.037920 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 12 19:46:28.037933 kernel: tsc: Detected 2494.138 MHz processor Feb 12 19:46:28.037945 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 12 19:46:28.037957 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 12 19:46:28.037967 kernel: last_pfn = 0x7ffd8 max_arch_pfn = 0x400000000 Feb 12 19:46:28.037978 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 12 19:46:28.037995 kernel: ACPI: Early table checksum verification disabled Feb 12 19:46:28.038007 kernel: ACPI: RSDP 0x00000000000F5A50 000014 (v00 BOCHS ) Feb 12 19:46:28.038021 kernel: ACPI: RSDT 0x000000007FFE1986 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:46:28.038034 kernel: ACPI: FACP 0x000000007FFE176A 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:46:28.038046 kernel: ACPI: DSDT 0x000000007FFE0040 00172A (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:46:28.038058 kernel: ACPI: FACS 0x000000007FFE0000 000040 Feb 12 19:46:28.038071 kernel: ACPI: APIC 0x000000007FFE17DE 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:46:28.038084 kernel: ACPI: HPET 0x000000007FFE185E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:46:28.038096 kernel: ACPI: SRAT 0x000000007FFE1896 0000C8 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:46:28.038113 kernel: ACPI: WAET 0x000000007FFE195E 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:46:28.038127 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe176a-0x7ffe17dd] Feb 12 19:46:28.038139 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe1769] Feb 12 19:46:28.038152 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Feb 12 19:46:28.038164 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17de-0x7ffe185d] Feb 12 19:46:28.038177 kernel: ACPI: Reserving HPET table memory at [mem 0x7ffe185e-0x7ffe1895] Feb 12 19:46:28.038190 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe1896-0x7ffe195d] Feb 12 19:46:28.038203 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe195e-0x7ffe1985] Feb 12 19:46:28.038249 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 12 19:46:28.038262 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 12 19:46:28.038274 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Feb 12 19:46:28.038287 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Feb 12 19:46:28.038300 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffd7fff] -> [mem 0x00000000-0x7ffd7fff] Feb 12 19:46:28.038311 kernel: NODE_DATA(0) allocated [mem 0x7ffd2000-0x7ffd7fff] Feb 12 19:46:28.038327 kernel: Zone ranges: Feb 12 19:46:28.038339 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 12 19:46:28.038351 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffd7fff] Feb 12 19:46:28.038364 kernel: Normal empty Feb 12 19:46:28.038378 kernel: Movable zone start for each node Feb 12 19:46:28.038391 kernel: Early memory node ranges Feb 12 19:46:28.038406 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Feb 12 19:46:28.038419 kernel: node 0: [mem 0x0000000000100000-0x000000007ffd7fff] Feb 12 19:46:28.038432 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffd7fff] Feb 12 19:46:28.038449 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 12 19:46:28.038461 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Feb 12 19:46:28.038470 kernel: On node 0, zone DMA32: 40 pages in unavailable ranges Feb 12 19:46:28.038479 kernel: ACPI: PM-Timer IO Port: 0x608 Feb 12 19:46:28.038488 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 12 19:46:28.038497 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 12 19:46:28.038505 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 12 19:46:28.038514 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 12 19:46:28.038524 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 12 19:46:28.038539 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 12 19:46:28.038548 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 12 19:46:28.038556 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 12 19:46:28.038565 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 12 19:46:28.038574 kernel: TSC deadline timer available Feb 12 19:46:28.038597 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 12 19:46:28.038627 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Feb 12 19:46:28.038636 kernel: Booting paravirtualized kernel on KVM Feb 12 19:46:28.038645 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 12 19:46:28.038658 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 12 19:46:28.038667 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 12 19:46:28.038678 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 12 19:46:28.038714 kernel: pcpu-alloc: [0] 0 1 Feb 12 19:46:28.038723 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 Feb 12 19:46:28.038734 kernel: kvm-guest: PV spinlocks disabled, no host support Feb 12 19:46:28.038746 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515800 Feb 12 19:46:28.038759 kernel: Policy zone: DMA32 Feb 12 19:46:28.038774 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 12 19:46:28.038791 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 19:46:28.038803 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 19:46:28.038817 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 12 19:46:28.038829 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 19:46:28.038841 kernel: Memory: 1975320K/2096600K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 121020K reserved, 0K cma-reserved) Feb 12 19:46:28.038850 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 12 19:46:28.038859 kernel: Kernel/User page tables isolation: enabled Feb 12 19:46:28.038868 kernel: ftrace: allocating 34475 entries in 135 pages Feb 12 19:46:28.038879 kernel: ftrace: allocated 135 pages with 4 groups Feb 12 19:46:28.038889 kernel: rcu: Hierarchical RCU implementation. Feb 12 19:46:28.038903 kernel: rcu: RCU event tracing is enabled. Feb 12 19:46:28.038916 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 12 19:46:28.038927 kernel: Rude variant of Tasks RCU enabled. Feb 12 19:46:28.038939 kernel: Tracing variant of Tasks RCU enabled. Feb 12 19:46:28.038950 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 19:46:28.038963 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 12 19:46:28.038974 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Feb 12 19:46:28.038990 kernel: random: crng init done Feb 12 19:46:28.039002 kernel: Console: colour VGA+ 80x25 Feb 12 19:46:28.039015 kernel: printk: console [tty0] enabled Feb 12 19:46:28.039028 kernel: printk: console [ttyS0] enabled Feb 12 19:46:28.039040 kernel: ACPI: Core revision 20210730 Feb 12 19:46:28.039052 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Feb 12 19:46:28.039061 kernel: APIC: Switch to symmetric I/O mode setup Feb 12 19:46:28.039070 kernel: x2apic enabled Feb 12 19:46:28.039081 kernel: Switched APIC routing to physical x2apic. Feb 12 19:46:28.039098 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 12 19:46:28.039113 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x23f39838d43, max_idle_ns: 440795267131 ns Feb 12 19:46:28.039125 kernel: Calibrating delay loop (skipped) preset value.. 4988.27 BogoMIPS (lpj=2494138) Feb 12 19:46:28.039134 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Feb 12 19:46:28.039142 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Feb 12 19:46:28.039151 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 12 19:46:28.039160 kernel: Spectre V2 : Mitigation: Retpolines Feb 12 19:46:28.039169 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 12 19:46:28.039178 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 12 19:46:28.039190 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Feb 12 19:46:28.039209 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 12 19:46:28.039218 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 12 19:46:28.039230 kernel: MDS: Mitigation: Clear CPU buffers Feb 12 19:46:28.039240 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 12 19:46:28.039249 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 12 19:46:28.039259 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 12 19:46:28.039268 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 12 19:46:28.039343 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 12 19:46:28.039358 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Feb 12 19:46:28.039375 kernel: Freeing SMP alternatives memory: 32K Feb 12 19:46:28.039389 kernel: pid_max: default: 32768 minimum: 301 Feb 12 19:46:28.039403 kernel: LSM: Security Framework initializing Feb 12 19:46:28.039416 kernel: SELinux: Initializing. Feb 12 19:46:28.039429 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 12 19:46:28.039441 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 12 19:46:28.039454 kernel: smpboot: CPU0: Intel DO-Regular (family: 0x6, model: 0x3f, stepping: 0x2) Feb 12 19:46:28.039464 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Feb 12 19:46:28.039473 kernel: signal: max sigframe size: 1776 Feb 12 19:46:28.039482 kernel: rcu: Hierarchical SRCU implementation. Feb 12 19:46:28.039492 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 12 19:46:28.039501 kernel: smp: Bringing up secondary CPUs ... Feb 12 19:46:28.039511 kernel: x86: Booting SMP configuration: Feb 12 19:46:28.039520 kernel: .... node #0, CPUs: #1 Feb 12 19:46:28.039529 kernel: kvm-clock: cpu 1, msr 62faa041, secondary cpu clock Feb 12 19:46:28.039538 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 Feb 12 19:46:28.039550 kernel: smp: Brought up 1 node, 2 CPUs Feb 12 19:46:28.039559 kernel: smpboot: Max logical packages: 1 Feb 12 19:46:28.039569 kernel: smpboot: Total of 2 processors activated (9976.55 BogoMIPS) Feb 12 19:46:28.039578 kernel: devtmpfs: initialized Feb 12 19:46:28.039619 kernel: x86/mm: Memory block size: 128MB Feb 12 19:46:28.039629 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 19:46:28.039638 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 12 19:46:28.039648 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 19:46:28.039664 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 19:46:28.039677 kernel: audit: initializing netlink subsys (disabled) Feb 12 19:46:28.039687 kernel: audit: type=2000 audit(1707767187.031:1): state=initialized audit_enabled=0 res=1 Feb 12 19:46:28.039696 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 19:46:28.039706 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 12 19:46:28.039715 kernel: cpuidle: using governor menu Feb 12 19:46:28.039724 kernel: ACPI: bus type PCI registered Feb 12 19:46:28.039734 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 19:46:28.039744 kernel: dca service started, version 1.12.1 Feb 12 19:46:28.039753 kernel: PCI: Using configuration type 1 for base access Feb 12 19:46:28.039765 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 12 19:46:28.039775 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 19:46:28.039785 kernel: ACPI: Added _OSI(Module Device) Feb 12 19:46:28.039794 kernel: ACPI: Added _OSI(Processor Device) Feb 12 19:46:28.039807 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 19:46:28.039817 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 19:46:28.039826 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 19:46:28.039835 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 19:46:28.039845 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 19:46:28.039857 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 12 19:46:28.039866 kernel: ACPI: Interpreter enabled Feb 12 19:46:28.039875 kernel: ACPI: PM: (supports S0 S5) Feb 12 19:46:28.039884 kernel: ACPI: Using IOAPIC for interrupt routing Feb 12 19:46:28.039894 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 12 19:46:28.039904 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Feb 12 19:46:28.039914 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 12 19:46:28.040153 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Feb 12 19:46:28.040280 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Feb 12 19:46:28.040294 kernel: acpiphp: Slot [3] registered Feb 12 19:46:28.040304 kernel: acpiphp: Slot [4] registered Feb 12 19:46:28.040316 kernel: acpiphp: Slot [5] registered Feb 12 19:46:28.040326 kernel: acpiphp: Slot [6] registered Feb 12 19:46:28.040335 kernel: acpiphp: Slot [7] registered Feb 12 19:46:28.040345 kernel: acpiphp: Slot [8] registered Feb 12 19:46:28.040355 kernel: acpiphp: Slot [9] registered Feb 12 19:46:28.040368 kernel: acpiphp: Slot [10] registered Feb 12 19:46:28.040377 kernel: acpiphp: Slot [11] registered Feb 12 19:46:28.040387 kernel: acpiphp: Slot [12] registered Feb 12 19:46:28.040396 kernel: acpiphp: Slot [13] registered Feb 12 19:46:28.040405 kernel: acpiphp: Slot [14] registered Feb 12 19:46:28.040415 kernel: acpiphp: Slot [15] registered Feb 12 19:46:28.040427 kernel: acpiphp: Slot [16] registered Feb 12 19:46:28.040440 kernel: acpiphp: Slot [17] registered Feb 12 19:46:28.040453 kernel: acpiphp: Slot [18] registered Feb 12 19:46:28.040466 kernel: acpiphp: Slot [19] registered Feb 12 19:46:28.040485 kernel: acpiphp: Slot [20] registered Feb 12 19:46:28.040494 kernel: acpiphp: Slot [21] registered Feb 12 19:46:28.040504 kernel: acpiphp: Slot [22] registered Feb 12 19:46:28.040514 kernel: acpiphp: Slot [23] registered Feb 12 19:46:28.040523 kernel: acpiphp: Slot [24] registered Feb 12 19:46:28.040535 kernel: acpiphp: Slot [25] registered Feb 12 19:46:28.040548 kernel: acpiphp: Slot [26] registered Feb 12 19:46:28.040557 kernel: acpiphp: Slot [27] registered Feb 12 19:46:28.040566 kernel: acpiphp: Slot [28] registered Feb 12 19:46:28.040579 kernel: acpiphp: Slot [29] registered Feb 12 19:46:28.040607 kernel: acpiphp: Slot [30] registered Feb 12 19:46:28.040621 kernel: acpiphp: Slot [31] registered Feb 12 19:46:28.040675 kernel: PCI host bridge to bus 0000:00 Feb 12 19:46:28.040872 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 12 19:46:28.041017 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 12 19:46:28.041138 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 12 19:46:28.041300 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Feb 12 19:46:28.041399 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Feb 12 19:46:28.041523 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 12 19:46:28.045879 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 12 19:46:28.046059 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 12 19:46:28.046184 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Feb 12 19:46:28.046312 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc1e0-0xc1ef] Feb 12 19:46:28.046424 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Feb 12 19:46:28.046563 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Feb 12 19:46:28.046754 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Feb 12 19:46:28.046887 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Feb 12 19:46:28.047042 kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 Feb 12 19:46:28.047150 kernel: pci 0000:00:01.2: reg 0x20: [io 0xc180-0xc19f] Feb 12 19:46:28.047527 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 12 19:46:28.047745 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Feb 12 19:46:28.047852 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Feb 12 19:46:28.047961 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Feb 12 19:46:28.048057 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Feb 12 19:46:28.048194 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Feb 12 19:46:28.048320 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfebf0000-0xfebf0fff] Feb 12 19:46:28.048477 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Feb 12 19:46:28.048635 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 12 19:46:28.048790 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Feb 12 19:46:28.048890 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc1a0-0xc1bf] Feb 12 19:46:28.049021 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebf1000-0xfebf1fff] Feb 12 19:46:28.049142 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Feb 12 19:46:28.049300 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Feb 12 19:46:28.049436 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc1c0-0xc1df] Feb 12 19:46:28.049579 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebf2000-0xfebf2fff] Feb 12 19:46:28.052918 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Feb 12 19:46:28.053097 kernel: pci 0000:00:05.0: [1af4:1004] type 00 class 0x010000 Feb 12 19:46:28.053325 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc100-0xc13f] Feb 12 19:46:28.053552 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebf3000-0xfebf3fff] Feb 12 19:46:28.053737 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Feb 12 19:46:28.053924 kernel: pci 0000:00:06.0: [1af4:1001] type 00 class 0x010000 Feb 12 19:46:28.054082 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc000-0xc07f] Feb 12 19:46:28.054236 kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfebf4000-0xfebf4fff] Feb 12 19:46:28.054389 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Feb 12 19:46:28.054532 kernel: pci 0000:00:07.0: [1af4:1001] type 00 class 0x010000 Feb 12 19:46:28.057831 kernel: pci 0000:00:07.0: reg 0x10: [io 0xc080-0xc0ff] Feb 12 19:46:28.058023 kernel: pci 0000:00:07.0: reg 0x14: [mem 0xfebf5000-0xfebf5fff] Feb 12 19:46:28.058232 kernel: pci 0000:00:07.0: reg 0x20: [mem 0xfe814000-0xfe817fff 64bit pref] Feb 12 19:46:28.058370 kernel: pci 0000:00:08.0: [1af4:1002] type 00 class 0x00ff00 Feb 12 19:46:28.058716 kernel: pci 0000:00:08.0: reg 0x10: [io 0xc140-0xc17f] Feb 12 19:46:28.058882 kernel: pci 0000:00:08.0: reg 0x20: [mem 0xfe818000-0xfe81bfff 64bit pref] Feb 12 19:46:28.058903 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 12 19:46:28.058918 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 12 19:46:28.058931 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 12 19:46:28.058955 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 12 19:46:28.058968 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 12 19:46:28.058981 kernel: iommu: Default domain type: Translated Feb 12 19:46:28.058995 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 12 19:46:28.059153 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Feb 12 19:46:28.059389 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 12 19:46:28.059549 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Feb 12 19:46:28.059569 kernel: vgaarb: loaded Feb 12 19:46:28.064676 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 19:46:28.064703 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 19:46:28.064717 kernel: PTP clock support registered Feb 12 19:46:28.064732 kernel: PCI: Using ACPI for IRQ routing Feb 12 19:46:28.064742 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 12 19:46:28.064751 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Feb 12 19:46:28.064761 kernel: e820: reserve RAM buffer [mem 0x7ffd8000-0x7fffffff] Feb 12 19:46:28.064775 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Feb 12 19:46:28.064788 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Feb 12 19:46:28.064810 kernel: clocksource: Switched to clocksource kvm-clock Feb 12 19:46:28.064823 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 19:46:28.064836 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 19:46:28.064848 kernel: pnp: PnP ACPI init Feb 12 19:46:28.064859 kernel: pnp: PnP ACPI: found 4 devices Feb 12 19:46:28.064871 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 12 19:46:28.064882 kernel: NET: Registered PF_INET protocol family Feb 12 19:46:28.064894 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 12 19:46:28.064907 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Feb 12 19:46:28.064925 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 19:46:28.064938 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 12 19:46:28.064951 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 12 19:46:28.064998 kernel: TCP: Hash tables configured (established 16384 bind 16384) Feb 12 19:46:28.065008 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 12 19:46:28.065017 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 12 19:46:28.065026 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 19:46:28.065036 kernel: NET: Registered PF_XDP protocol family Feb 12 19:46:28.065226 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 12 19:46:28.065328 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 12 19:46:28.065417 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 12 19:46:28.065503 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Feb 12 19:46:28.065614 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Feb 12 19:46:28.065764 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Feb 12 19:46:28.065914 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 12 19:46:28.066066 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 12 19:46:28.066103 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Feb 12 19:46:28.066269 kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x730 took 43686 usecs Feb 12 19:46:28.066290 kernel: PCI: CLS 0 bytes, default 64 Feb 12 19:46:28.066306 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 12 19:46:28.066321 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x23f39838d43, max_idle_ns: 440795267131 ns Feb 12 19:46:28.066336 kernel: Initialise system trusted keyrings Feb 12 19:46:28.066350 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Feb 12 19:46:28.066364 kernel: Key type asymmetric registered Feb 12 19:46:28.066380 kernel: Asymmetric key parser 'x509' registered Feb 12 19:46:28.066399 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 19:46:28.066414 kernel: io scheduler mq-deadline registered Feb 12 19:46:28.066428 kernel: io scheduler kyber registered Feb 12 19:46:28.066442 kernel: io scheduler bfq registered Feb 12 19:46:28.066457 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 12 19:46:28.066470 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Feb 12 19:46:28.066480 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 12 19:46:28.066526 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 12 19:46:28.066542 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 19:46:28.066556 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 12 19:46:28.066602 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 12 19:46:28.066613 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 12 19:46:28.066623 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 12 19:46:28.066796 kernel: rtc_cmos 00:03: RTC can wake from S4 Feb 12 19:46:28.066819 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 12 19:46:28.066928 kernel: rtc_cmos 00:03: registered as rtc0 Feb 12 19:46:28.067036 kernel: rtc_cmos 00:03: setting system clock to 2024-02-12T19:46:27 UTC (1707767187) Feb 12 19:46:28.067148 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Feb 12 19:46:28.067160 kernel: intel_pstate: CPU model not supported Feb 12 19:46:28.067169 kernel: NET: Registered PF_INET6 protocol family Feb 12 19:46:28.067179 kernel: Segment Routing with IPv6 Feb 12 19:46:28.067188 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 19:46:28.067199 kernel: NET: Registered PF_PACKET protocol family Feb 12 19:46:28.067213 kernel: Key type dns_resolver registered Feb 12 19:46:28.067226 kernel: IPI shorthand broadcast: enabled Feb 12 19:46:28.067240 kernel: sched_clock: Marking stable (791006474, 110115872)->(1022785772, -121663426) Feb 12 19:46:28.067260 kernel: registered taskstats version 1 Feb 12 19:46:28.067270 kernel: Loading compiled-in X.509 certificates Feb 12 19:46:28.067300 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 56154408a02b3bd349a9e9180c9bd837fd1d636a' Feb 12 19:46:28.067314 kernel: Key type .fscrypt registered Feb 12 19:46:28.067327 kernel: Key type fscrypt-provisioning registered Feb 12 19:46:28.067341 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 19:46:28.067354 kernel: ima: Allocated hash algorithm: sha1 Feb 12 19:46:28.067367 kernel: ima: No architecture policies found Feb 12 19:46:28.067381 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 12 19:46:28.067399 kernel: Write protecting the kernel read-only data: 28672k Feb 12 19:46:28.067412 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 12 19:46:28.067465 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 12 19:46:28.067478 kernel: Run /init as init process Feb 12 19:46:28.067488 kernel: with arguments: Feb 12 19:46:28.067499 kernel: /init Feb 12 19:46:28.067530 kernel: with environment: Feb 12 19:46:28.067543 kernel: HOME=/ Feb 12 19:46:28.067552 kernel: TERM=linux Feb 12 19:46:28.067565 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 19:46:28.067653 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:46:28.067680 systemd[1]: Detected virtualization kvm. Feb 12 19:46:28.067691 systemd[1]: Detected architecture x86-64. Feb 12 19:46:28.067701 systemd[1]: Running in initrd. Feb 12 19:46:28.067711 systemd[1]: No hostname configured, using default hostname. Feb 12 19:46:28.067721 systemd[1]: Hostname set to . Feb 12 19:46:28.067734 systemd[1]: Initializing machine ID from VM UUID. Feb 12 19:46:28.067744 systemd[1]: Queued start job for default target initrd.target. Feb 12 19:46:28.067755 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:46:28.067765 systemd[1]: Reached target cryptsetup.target. Feb 12 19:46:28.067775 systemd[1]: Reached target paths.target. Feb 12 19:46:28.067785 systemd[1]: Reached target slices.target. Feb 12 19:46:28.067796 systemd[1]: Reached target swap.target. Feb 12 19:46:28.067805 systemd[1]: Reached target timers.target. Feb 12 19:46:28.067819 systemd[1]: Listening on iscsid.socket. Feb 12 19:46:28.067832 systemd[1]: Listening on iscsiuio.socket. Feb 12 19:46:28.067846 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 19:46:28.067860 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 19:46:28.067874 systemd[1]: Listening on systemd-journald.socket. Feb 12 19:46:28.067889 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:46:28.067905 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:46:28.067920 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:46:28.067940 systemd[1]: Reached target sockets.target. Feb 12 19:46:28.067958 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:46:28.067977 systemd[1]: Finished network-cleanup.service. Feb 12 19:46:28.067997 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 19:46:28.068015 systemd[1]: Starting systemd-journald.service... Feb 12 19:46:28.068032 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:46:28.068052 systemd[1]: Starting systemd-resolved.service... Feb 12 19:46:28.068069 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 19:46:28.068087 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:46:28.068104 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 19:46:28.068129 systemd-journald[183]: Journal started Feb 12 19:46:28.068231 systemd-journald[183]: Runtime Journal (/run/log/journal/69cf38abb2d8487ba563167e8bd5f2ac) is 4.9M, max 39.5M, 34.5M free. Feb 12 19:46:28.041654 systemd-modules-load[184]: Inserted module 'overlay' Feb 12 19:46:28.110658 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 19:46:28.110696 kernel: Bridge firewalling registered Feb 12 19:46:28.110713 kernel: SCSI subsystem initialized Feb 12 19:46:28.087804 systemd-modules-load[184]: Inserted module 'br_netfilter' Feb 12 19:46:28.096369 systemd-resolved[185]: Positive Trust Anchors: Feb 12 19:46:28.120732 systemd[1]: Started systemd-journald.service. Feb 12 19:46:28.120768 kernel: audit: type=1130 audit(1707767188.110:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:28.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:28.096388 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:46:28.096442 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:46:28.130882 kernel: audit: type=1130 audit(1707767188.117:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:28.130934 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 19:46:28.130968 kernel: device-mapper: uevent: version 1.0.3 Feb 12 19:46:28.130986 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 19:46:28.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:28.107117 systemd-resolved[185]: Defaulting to hostname 'linux'. Feb 12 19:46:28.144353 kernel: audit: type=1130 audit(1707767188.117:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:28.144409 kernel: audit: type=1130 audit(1707767188.118:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:28.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:28.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:28.118104 systemd[1]: Started systemd-resolved.service. Feb 12 19:46:28.118889 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 19:46:28.119637 systemd[1]: Reached target nss-lookup.target. Feb 12 19:46:28.128641 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 19:46:28.139844 systemd-modules-load[184]: Inserted module 'dm_multipath' Feb 12 19:46:28.152645 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:46:28.161647 kernel: audit: type=1130 audit(1707767188.155:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:28.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:28.155858 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:46:28.163832 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:46:28.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:28.172489 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 19:46:28.179725 kernel: audit: type=1130 audit(1707767188.172:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:28.174690 systemd[1]: Starting dracut-cmdline.service... Feb 12 19:46:28.186879 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:46:28.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:28.201634 kernel: audit: type=1130 audit(1707767188.187:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:28.204115 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:46:28.209233 kernel: audit: type=1130 audit(1707767188.204:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:28.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:28.209340 dracut-cmdline[206]: dracut-dracut-053 Feb 12 19:46:28.213683 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 12 19:46:28.327677 kernel: Loading iSCSI transport class v2.0-870. Feb 12 19:46:28.345626 kernel: iscsi: registered transport (tcp) Feb 12 19:46:28.380215 kernel: iscsi: registered transport (qla4xxx) Feb 12 19:46:28.380309 kernel: QLogic iSCSI HBA Driver Feb 12 19:46:28.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:28.451444 systemd[1]: Finished dracut-cmdline.service. Feb 12 19:46:28.457686 kernel: audit: type=1130 audit(1707767188.451:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:28.453427 systemd[1]: Starting dracut-pre-udev.service... Feb 12 19:46:28.519786 kernel: raid6: avx2x4 gen() 12958 MB/s Feb 12 19:46:28.536761 kernel: raid6: avx2x4 xor() 6949 MB/s Feb 12 19:46:28.553666 kernel: raid6: avx2x2 gen() 12704 MB/s Feb 12 19:46:28.587373 kernel: raid6: avx2x2 xor() 12781 MB/s Feb 12 19:46:28.594652 kernel: raid6: avx2x1 gen() 9196 MB/s Feb 12 19:46:28.611658 kernel: raid6: avx2x1 xor() 11039 MB/s Feb 12 19:46:28.628822 kernel: raid6: sse2x4 gen() 9511 MB/s Feb 12 19:46:28.645652 kernel: raid6: sse2x4 xor() 5235 MB/s Feb 12 19:46:28.662678 kernel: raid6: sse2x2 gen() 9430 MB/s Feb 12 19:46:28.679649 kernel: raid6: sse2x2 xor() 6525 MB/s Feb 12 19:46:28.696669 kernel: raid6: sse2x1 gen() 8230 MB/s Feb 12 19:46:28.714370 kernel: raid6: sse2x1 xor() 4836 MB/s Feb 12 19:46:28.714451 kernel: raid6: using algorithm avx2x4 gen() 12958 MB/s Feb 12 19:46:28.714467 kernel: raid6: .... xor() 6949 MB/s, rmw enabled Feb 12 19:46:28.715252 kernel: raid6: using avx2x2 recovery algorithm Feb 12 19:46:28.733632 kernel: xor: automatically using best checksumming function avx Feb 12 19:46:28.868640 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 12 19:46:28.884811 systemd[1]: Finished dracut-pre-udev.service. Feb 12 19:46:28.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:28.885000 audit: BPF prog-id=7 op=LOAD Feb 12 19:46:28.885000 audit: BPF prog-id=8 op=LOAD Feb 12 19:46:28.886714 systemd[1]: Starting systemd-udevd.service... Feb 12 19:46:28.905493 systemd-udevd[384]: Using default interface naming scheme 'v252'. Feb 12 19:46:28.914324 systemd[1]: Started systemd-udevd.service. Feb 12 19:46:28.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:28.920093 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 19:46:28.941543 dracut-pre-trigger[394]: rd.md=0: removing MD RAID activation Feb 12 19:46:28.995186 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 19:46:28.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:28.997135 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:46:29.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:29.066016 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:46:29.143968 kernel: scsi host0: Virtio SCSI HBA Feb 12 19:46:29.159188 kernel: virtio_blk virtio4: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Feb 12 19:46:29.161621 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 19:46:29.193798 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 12 19:46:29.193873 kernel: GPT:9289727 != 125829119 Feb 12 19:46:29.193887 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 12 19:46:29.193900 kernel: GPT:9289727 != 125829119 Feb 12 19:46:29.193911 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 12 19:46:29.193923 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:46:29.223764 kernel: ACPI: bus type USB registered Feb 12 19:46:29.243080 kernel: usbcore: registered new interface driver usbfs Feb 12 19:46:29.243161 kernel: usbcore: registered new interface driver hub Feb 12 19:46:29.243183 kernel: usbcore: registered new device driver usb Feb 12 19:46:29.250819 kernel: virtio_blk virtio5: [vdb] 1000 512-byte logical blocks (512 kB/500 KiB) Feb 12 19:46:29.257630 kernel: AVX2 version of gcm_enc/dec engaged. Feb 12 19:46:29.257722 kernel: AES CTR mode by8 optimization enabled Feb 12 19:46:29.257745 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver Feb 12 19:46:29.259621 kernel: ehci-pci: EHCI PCI platform driver Feb 12 19:46:29.274649 kernel: uhci_hcd: USB Universal Host Controller Interface driver Feb 12 19:46:29.297628 kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Feb 12 19:46:29.298053 kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Feb 12 19:46:29.298259 kernel: uhci_hcd 0000:00:01.2: detected 2 ports Feb 12 19:46:29.298424 kernel: uhci_hcd 0000:00:01.2: irq 11, io base 0x0000c180 Feb 12 19:46:29.298619 kernel: hub 1-0:1.0: USB hub found Feb 12 19:46:29.298870 kernel: hub 1-0:1.0: 2 ports detected Feb 12 19:46:29.299605 kernel: libata version 3.00 loaded. Feb 12 19:46:29.311619 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (430) Feb 12 19:46:29.332983 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 19:46:29.402936 kernel: ata_piix 0000:00:01.1: version 2.13 Feb 12 19:46:29.403482 kernel: scsi host1: ata_piix Feb 12 19:46:29.403782 kernel: scsi host2: ata_piix Feb 12 19:46:29.403995 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc1e0 irq 14 Feb 12 19:46:29.404018 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc1e8 irq 15 Feb 12 19:46:29.411548 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 19:46:29.418387 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:46:29.422184 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 19:46:29.431164 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 19:46:29.434166 systemd[1]: Starting disk-uuid.service... Feb 12 19:46:29.445252 disk-uuid[504]: Primary Header is updated. Feb 12 19:46:29.445252 disk-uuid[504]: Secondary Entries is updated. Feb 12 19:46:29.445252 disk-uuid[504]: Secondary Header is updated. Feb 12 19:46:29.459569 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:46:29.472613 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:46:29.483624 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:46:30.495881 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:46:30.496390 disk-uuid[505]: The operation has completed successfully. Feb 12 19:46:30.556916 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 19:46:30.557905 systemd[1]: Finished disk-uuid.service. Feb 12 19:46:30.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:30.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:30.564762 systemd[1]: Starting verity-setup.service... Feb 12 19:46:30.601409 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 12 19:46:30.716890 systemd[1]: Found device dev-mapper-usr.device. Feb 12 19:46:30.720172 systemd[1]: Mounting sysusr-usr.mount... Feb 12 19:46:30.721015 systemd[1]: Finished verity-setup.service. Feb 12 19:46:30.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:30.841684 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 19:46:30.842732 systemd[1]: Mounted sysusr-usr.mount. Feb 12 19:46:30.843844 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 19:46:30.845103 systemd[1]: Starting ignition-setup.service... Feb 12 19:46:30.846968 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 19:46:30.864987 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 19:46:30.865075 kernel: BTRFS info (device vda6): using free space tree Feb 12 19:46:30.865097 kernel: BTRFS info (device vda6): has skinny extents Feb 12 19:46:30.886790 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 19:46:30.896680 systemd[1]: Finished ignition-setup.service. Feb 12 19:46:30.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:30.898841 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 19:46:31.084029 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 19:46:31.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:31.087000 audit: BPF prog-id=9 op=LOAD Feb 12 19:46:31.089122 systemd[1]: Starting systemd-networkd.service... Feb 12 19:46:31.116068 ignition[604]: Ignition 2.14.0 Feb 12 19:46:31.116086 ignition[604]: Stage: fetch-offline Feb 12 19:46:31.116180 ignition[604]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:46:31.116217 ignition[604]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 12 19:46:31.124072 ignition[604]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 12 19:46:31.124932 ignition[604]: parsed url from cmdline: "" Feb 12 19:46:31.124954 ignition[604]: no config URL provided Feb 12 19:46:31.124968 ignition[604]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:46:31.125005 ignition[604]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:46:31.125055 ignition[604]: failed to fetch config: resource requires networking Feb 12 19:46:31.125253 ignition[604]: Ignition finished successfully Feb 12 19:46:31.128740 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 19:46:31.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:31.141427 systemd-networkd[688]: lo: Link UP Feb 12 19:46:31.141455 systemd-networkd[688]: lo: Gained carrier Feb 12 19:46:31.143030 systemd-networkd[688]: Enumeration completed Feb 12 19:46:31.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:31.143231 systemd[1]: Started systemd-networkd.service. Feb 12 19:46:31.144186 systemd[1]: Reached target network.target. Feb 12 19:46:31.144207 systemd-networkd[688]: eth1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:46:31.146009 systemd-networkd[688]: eth0: Configuring with /usr/lib/systemd/network/yy-digitalocean.network. Feb 12 19:46:31.146691 systemd[1]: Starting ignition-fetch.service... Feb 12 19:46:31.155858 systemd[1]: Starting iscsiuio.service... Feb 12 19:46:31.169526 ignition[690]: Ignition 2.14.0 Feb 12 19:46:31.174790 systemd-networkd[688]: eth1: Link UP Feb 12 19:46:31.169538 ignition[690]: Stage: fetch Feb 12 19:46:31.174798 systemd-networkd[688]: eth1: Gained carrier Feb 12 19:46:31.169815 ignition[690]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:46:31.180783 systemd-networkd[688]: eth0: Link UP Feb 12 19:46:31.169853 ignition[690]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 12 19:46:31.180789 systemd-networkd[688]: eth0: Gained carrier Feb 12 19:46:31.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:31.176518 ignition[690]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 12 19:46:31.198211 systemd[1]: Started iscsiuio.service. Feb 12 19:46:31.176756 ignition[690]: parsed url from cmdline: "" Feb 12 19:46:31.211185 iscsid[698]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:46:31.211185 iscsid[698]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 12 19:46:31.211185 iscsid[698]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 19:46:31.211185 iscsid[698]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 19:46:31.211185 iscsid[698]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 19:46:31.211185 iscsid[698]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:46:31.211185 iscsid[698]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 19:46:31.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:31.200538 systemd[1]: Starting iscsid.service... Feb 12 19:46:31.176765 ignition[690]: no config URL provided Feb 12 19:46:31.201768 systemd-networkd[688]: eth1: DHCPv4 address 10.124.0.19/20 acquired from 169.254.169.253 Feb 12 19:46:31.176777 ignition[690]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:46:31.206913 systemd-networkd[688]: eth0: DHCPv4 address 146.190.157.125/20, gateway 146.190.144.1 acquired from 169.254.169.253 Feb 12 19:46:31.176872 ignition[690]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:46:31.211922 systemd[1]: Started iscsid.service. Feb 12 19:46:31.176929 ignition[690]: GET http://169.254.169.254/metadata/v1/user-data: attempt #1 Feb 12 19:46:31.214767 systemd[1]: Starting dracut-initqueue.service... Feb 12 19:46:31.187808 ignition[690]: GET error: Get "http://169.254.169.254/metadata/v1/user-data": dial tcp 169.254.169.254:80: connect: network is unreachable Feb 12 19:46:31.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:31.252342 systemd[1]: Finished dracut-initqueue.service. Feb 12 19:46:31.253142 systemd[1]: Reached target remote-fs-pre.target. Feb 12 19:46:31.253672 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:46:31.254154 systemd[1]: Reached target remote-fs.target. Feb 12 19:46:31.256022 systemd[1]: Starting dracut-pre-mount.service... Feb 12 19:46:31.272797 systemd[1]: Finished dracut-pre-mount.service. Feb 12 19:46:31.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:31.388045 ignition[690]: GET http://169.254.169.254/metadata/v1/user-data: attempt #2 Feb 12 19:46:31.423703 ignition[690]: GET result: OK Feb 12 19:46:31.424024 ignition[690]: parsing config with SHA512: 6e017d856d9fe98873bea008a24287606f354cad0dd21995655fefd4c86b6d300a3291bedf47c5cf8c2018ca3129aca9621e67b9204e65711409e0a50911aa44 Feb 12 19:46:31.485056 unknown[690]: fetched base config from "system" Feb 12 19:46:31.485775 unknown[690]: fetched base config from "system" Feb 12 19:46:31.486384 unknown[690]: fetched user config from "digitalocean" Feb 12 19:46:31.488068 ignition[690]: fetch: fetch complete Feb 12 19:46:31.488797 ignition[690]: fetch: fetch passed Feb 12 19:46:31.489472 ignition[690]: Ignition finished successfully Feb 12 19:46:31.492183 systemd[1]: Finished ignition-fetch.service. Feb 12 19:46:31.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:31.494032 systemd[1]: Starting ignition-kargs.service... Feb 12 19:46:31.508181 ignition[713]: Ignition 2.14.0 Feb 12 19:46:31.508197 ignition[713]: Stage: kargs Feb 12 19:46:31.508408 ignition[713]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:46:31.508437 ignition[713]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 12 19:46:31.511044 ignition[713]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 12 19:46:31.513386 ignition[713]: kargs: kargs passed Feb 12 19:46:31.513523 ignition[713]: Ignition finished successfully Feb 12 19:46:31.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:31.515104 systemd[1]: Finished ignition-kargs.service. Feb 12 19:46:31.541278 systemd[1]: Starting ignition-disks.service... Feb 12 19:46:31.554074 ignition[718]: Ignition 2.14.0 Feb 12 19:46:31.554087 ignition[718]: Stage: disks Feb 12 19:46:31.554266 ignition[718]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:46:31.554291 ignition[718]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 12 19:46:31.556827 ignition[718]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 12 19:46:31.566094 ignition[718]: disks: disks passed Feb 12 19:46:31.566201 ignition[718]: Ignition finished successfully Feb 12 19:46:31.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:31.567974 systemd[1]: Finished ignition-disks.service. Feb 12 19:46:31.569079 systemd[1]: Reached target initrd-root-device.target. Feb 12 19:46:31.569775 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:46:31.570760 systemd[1]: Reached target local-fs.target. Feb 12 19:46:31.572125 systemd[1]: Reached target sysinit.target. Feb 12 19:46:31.573069 systemd[1]: Reached target basic.target. Feb 12 19:46:31.574978 systemd[1]: Starting systemd-fsck-root.service... Feb 12 19:46:31.609805 systemd-fsck[726]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 12 19:46:31.615484 systemd[1]: Finished systemd-fsck-root.service. Feb 12 19:46:31.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:31.617956 systemd[1]: Mounting sysroot.mount... Feb 12 19:46:31.643622 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 19:46:31.644622 systemd[1]: Mounted sysroot.mount. Feb 12 19:46:31.645484 systemd[1]: Reached target initrd-root-fs.target. Feb 12 19:46:31.648719 systemd[1]: Mounting sysroot-usr.mount... Feb 12 19:46:31.650502 systemd[1]: Starting flatcar-digitalocean-network.service... Feb 12 19:46:31.653059 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 12 19:46:31.653764 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 19:46:31.653807 systemd[1]: Reached target ignition-diskful.target. Feb 12 19:46:31.660492 systemd[1]: Mounted sysroot-usr.mount. Feb 12 19:46:31.662865 systemd[1]: Starting initrd-setup-root.service... Feb 12 19:46:31.672183 initrd-setup-root[738]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 19:46:31.692083 initrd-setup-root[746]: cut: /sysroot/etc/group: No such file or directory Feb 12 19:46:31.702696 initrd-setup-root[754]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 19:46:31.715453 initrd-setup-root[764]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 19:46:31.750408 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 19:46:31.778654 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (774) Feb 12 19:46:31.786928 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 19:46:31.787017 kernel: BTRFS info (device vda6): using free space tree Feb 12 19:46:31.787039 kernel: BTRFS info (device vda6): has skinny extents Feb 12 19:46:31.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:31.833577 systemd[1]: Finished initrd-setup-root.service. Feb 12 19:46:31.835312 systemd[1]: Starting ignition-mount.service... Feb 12 19:46:31.838494 systemd[1]: Starting sysroot-boot.service... Feb 12 19:46:31.845812 coreos-metadata[732]: Feb 12 19:46:31.845 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Feb 12 19:46:31.855186 bash[796]: umount: /sysroot/usr/share/oem: not mounted. Feb 12 19:46:31.861095 coreos-metadata[732]: Feb 12 19:46:31.861 INFO Fetch successful Feb 12 19:46:31.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:31.878642 systemd[1]: flatcar-digitalocean-network.service: Deactivated successfully. Feb 12 19:46:31.887624 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 12 19:46:31.887777 kernel: audit: type=1130 audit(1707767191.879:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:31.887798 kernel: audit: type=1131 audit(1707767191.879:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:31.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:31.878791 systemd[1]: Finished flatcar-digitalocean-network.service. Feb 12 19:46:31.889533 coreos-metadata[733]: Feb 12 19:46:31.889 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Feb 12 19:46:31.892901 ignition[798]: INFO : Ignition 2.14.0 Feb 12 19:46:31.893861 ignition[798]: INFO : Stage: mount Feb 12 19:46:31.894644 ignition[798]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:46:31.895296 ignition[798]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 12 19:46:31.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:31.911680 kernel: audit: type=1130 audit(1707767191.898:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:31.911707 coreos-metadata[733]: Feb 12 19:46:31.905 INFO Fetch successful Feb 12 19:46:31.911707 coreos-metadata[733]: Feb 12 19:46:31.910 INFO wrote hostname ci-3510.3.2-d-344270592c to /sysroot/etc/hostname Feb 12 19:46:31.898413 systemd[1]: Finished sysroot-boot.service. Feb 12 19:46:31.913456 ignition[798]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 12 19:46:31.913456 ignition[798]: INFO : mount: mount passed Feb 12 19:46:31.913456 ignition[798]: INFO : Ignition finished successfully Feb 12 19:46:31.911429 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 12 19:46:31.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:31.918044 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 19:46:31.920197 kernel: audit: type=1130 audit(1707767191.914:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:31.921068 systemd[1]: Finished ignition-mount.service. Feb 12 19:46:31.925604 kernel: audit: type=1130 audit(1707767191.921:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:31.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:31.923749 systemd[1]: Starting ignition-files.service... Feb 12 19:46:31.957998 ignition[812]: INFO : Ignition 2.14.0 Feb 12 19:46:31.957998 ignition[812]: INFO : Stage: files Feb 12 19:46:31.959579 ignition[812]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:46:31.959579 ignition[812]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 12 19:46:31.961234 ignition[812]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 12 19:46:31.966554 ignition[812]: DEBUG : files: compiled without relabeling support, skipping Feb 12 19:46:31.967945 ignition[812]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 19:46:31.967945 ignition[812]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 19:46:31.973246 ignition[812]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 19:46:31.974210 ignition[812]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 19:46:31.974837 ignition[812]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 19:46:31.974268 unknown[812]: wrote ssh authorized keys file for user: core Feb 12 19:46:31.977082 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 12 19:46:31.977082 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Feb 12 19:46:32.478347 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 12 19:46:32.679628 ignition[812]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Feb 12 19:46:32.680864 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 12 19:46:32.681805 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 12 19:46:32.681805 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1 Feb 12 19:46:32.902842 systemd-networkd[688]: eth0: Gained IPv6LL Feb 12 19:46:32.966931 systemd-networkd[688]: eth1: Gained IPv6LL Feb 12 19:46:33.113457 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 12 19:46:33.254334 ignition[812]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449 Feb 12 19:46:33.254334 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 12 19:46:33.258512 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 19:46:33.258512 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 12 19:46:33.271066 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 12 19:46:33.369563 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 19:46:33.370832 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:46:33.370832 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1 Feb 12 19:46:33.434358 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 12 19:46:33.713485 ignition[812]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660 Feb 12 19:46:33.714783 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:46:33.714783 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:46:33.714783 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1 Feb 12 19:46:33.760098 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 12 19:46:34.498286 ignition[812]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b Feb 12 19:46:34.500113 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:46:34.500113 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Feb 12 19:46:34.500113 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubectl: attempt #1 Feb 12 19:46:34.548298 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 12 19:46:34.829957 ignition[812]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 97840854134909d75a1a2563628cc4ba632067369ce7fc8a8a1e90a387d32dd7bfd73f4f5b5a82ef842088e7470692951eb7fc869c5f297dd740f855672ee628 Feb 12 19:46:34.829957 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 12 19:46:34.829957 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:46:34.833138 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:46:34.833138 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 12 19:46:34.833138 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 19:46:34.833138 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 12 19:46:34.833138 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 12 19:46:34.833138 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 19:46:34.833138 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 19:46:34.833138 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 19:46:34.833138 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 19:46:34.833138 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:46:34.833138 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:46:34.833138 ignition[812]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 12 19:46:34.833138 ignition[812]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 12 19:46:34.833138 ignition[812]: INFO : files: op(10): [started] processing unit "prepare-cni-plugins.service" Feb 12 19:46:34.833138 ignition[812]: INFO : files: op(10): op(11): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:46:34.833138 ignition[812]: INFO : files: op(10): op(11): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:46:34.833138 ignition[812]: INFO : files: op(10): [finished] processing unit "prepare-cni-plugins.service" Feb 12 19:46:34.833138 ignition[812]: INFO : files: op(12): [started] processing unit "prepare-critools.service" Feb 12 19:46:34.845560 ignition[812]: INFO : files: op(12): op(13): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:46:34.845560 ignition[812]: INFO : files: op(12): op(13): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:46:34.845560 ignition[812]: INFO : files: op(12): [finished] processing unit "prepare-critools.service" Feb 12 19:46:34.845560 ignition[812]: INFO : files: op(14): [started] processing unit "prepare-helm.service" Feb 12 19:46:34.845560 ignition[812]: INFO : files: op(14): op(15): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 19:46:34.845560 ignition[812]: INFO : files: op(14): op(15): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 19:46:34.845560 ignition[812]: INFO : files: op(14): [finished] processing unit "prepare-helm.service" Feb 12 19:46:34.845560 ignition[812]: INFO : files: op(16): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:46:34.845560 ignition[812]: INFO : files: op(16): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:46:34.845560 ignition[812]: INFO : files: op(17): [started] setting preset to enabled for "prepare-critools.service" Feb 12 19:46:34.845560 ignition[812]: INFO : files: op(17): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 19:46:34.845560 ignition[812]: INFO : files: op(18): [started] setting preset to enabled for "prepare-helm.service" Feb 12 19:46:34.845560 ignition[812]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-helm.service" Feb 12 19:46:34.845560 ignition[812]: INFO : files: op(19): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 19:46:34.845560 ignition[812]: INFO : files: op(19): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 19:46:34.884212 kernel: audit: type=1130 audit(1707767194.858:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:34.884240 kernel: audit: type=1130 audit(1707767194.871:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:34.884252 kernel: audit: type=1131 audit(1707767194.871:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:34.884264 kernel: audit: type=1130 audit(1707767194.878:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:34.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:34.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:34.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:34.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:34.884451 ignition[812]: INFO : files: createResultFile: createFiles: op(1a): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:46:34.884451 ignition[812]: INFO : files: createResultFile: createFiles: op(1a): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:46:34.884451 ignition[812]: INFO : files: files passed Feb 12 19:46:34.884451 ignition[812]: INFO : Ignition finished successfully Feb 12 19:46:34.849937 systemd[1]: Finished ignition-files.service. Feb 12 19:46:34.861647 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 19:46:34.887832 initrd-setup-root-after-ignition[837]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 19:46:34.862497 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 19:46:34.863681 systemd[1]: Starting ignition-quench.service... Feb 12 19:46:34.871169 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 19:46:34.871420 systemd[1]: Finished ignition-quench.service. Feb 12 19:46:34.878287 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 19:46:34.879172 systemd[1]: Reached target ignition-complete.target. Feb 12 19:46:34.884195 systemd[1]: Starting initrd-parse-etc.service... Feb 12 19:46:34.905289 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 19:46:34.905403 systemd[1]: Finished initrd-parse-etc.service. Feb 12 19:46:34.909058 kernel: audit: type=1130 audit(1707767194.905:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:34.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:34.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:34.906323 systemd[1]: Reached target initrd-fs.target. Feb 12 19:46:34.909327 systemd[1]: Reached target initrd.target. Feb 12 19:46:34.910083 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 19:46:34.911104 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 19:46:34.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:34.926771 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 19:46:34.929204 systemd[1]: Starting initrd-cleanup.service... Feb 12 19:46:34.941302 systemd[1]: Stopped target nss-lookup.target. Feb 12 19:46:34.942336 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 19:46:34.943333 systemd[1]: Stopped target timers.target. Feb 12 19:46:34.944345 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 19:46:34.944977 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 19:46:34.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:34.946425 systemd[1]: Stopped target initrd.target. Feb 12 19:46:34.947547 systemd[1]: Stopped target basic.target. Feb 12 19:46:34.948485 systemd[1]: Stopped target ignition-complete.target. Feb 12 19:46:34.949450 systemd[1]: Stopped target ignition-diskful.target. Feb 12 19:46:34.950343 systemd[1]: Stopped target initrd-root-device.target. Feb 12 19:46:34.951305 systemd[1]: Stopped target remote-fs.target. Feb 12 19:46:34.952326 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 19:46:34.953283 systemd[1]: Stopped target sysinit.target. Feb 12 19:46:34.954149 systemd[1]: Stopped target local-fs.target. Feb 12 19:46:34.955051 systemd[1]: Stopped target local-fs-pre.target. Feb 12 19:46:34.956134 systemd[1]: Stopped target swap.target. Feb 12 19:46:34.957155 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 19:46:34.957786 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 19:46:34.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:34.959225 systemd[1]: Stopped target cryptsetup.target. Feb 12 19:46:34.960437 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 19:46:34.961265 systemd[1]: Stopped dracut-initqueue.service. Feb 12 19:46:34.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:34.962668 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 19:46:34.963728 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 19:46:34.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:34.965138 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 19:46:34.965840 systemd[1]: Stopped ignition-files.service. Feb 12 19:46:34.966000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:34.967120 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 12 19:46:34.967902 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 12 19:46:34.968000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:34.970230 systemd[1]: Stopping ignition-mount.service... Feb 12 19:46:34.975033 systemd[1]: Stopping iscsiuio.service... Feb 12 19:46:34.976130 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 19:46:34.976935 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 19:46:34.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:34.979542 systemd[1]: Stopping sysroot-boot.service... Feb 12 19:46:34.980508 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 19:46:34.981306 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 19:46:34.981908 ignition[850]: INFO : Ignition 2.14.0 Feb 12 19:46:34.981908 ignition[850]: INFO : Stage: umount Feb 12 19:46:34.983068 ignition[850]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:46:34.983068 ignition[850]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 12 19:46:34.984344 ignition[850]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 12 19:46:34.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:34.985305 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 19:46:34.985831 ignition[850]: INFO : umount: umount passed Feb 12 19:46:34.985831 ignition[850]: INFO : Ignition finished successfully Feb 12 19:46:34.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:34.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:34.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:34.986111 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 19:46:34.988989 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 19:46:34.989150 systemd[1]: Stopped iscsiuio.service. Feb 12 19:46:34.990498 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 19:46:34.990654 systemd[1]: Stopped ignition-mount.service. Feb 12 19:46:34.993781 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 19:46:34.993871 systemd[1]: Finished initrd-cleanup.service. Feb 12 19:46:34.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:34.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:34.999949 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 19:46:35.000602 systemd[1]: Stopped ignition-disks.service. Feb 12 19:46:35.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:35.001539 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 19:46:35.002076 systemd[1]: Stopped ignition-kargs.service. Feb 12 19:46:35.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:35.002996 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 12 19:46:35.003651 systemd[1]: Stopped ignition-fetch.service. Feb 12 19:46:35.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:35.004748 systemd[1]: Stopped target network.target. Feb 12 19:46:35.005697 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 19:46:35.006285 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 19:46:35.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:35.009341 systemd[1]: Stopped target paths.target. Feb 12 19:46:35.021299 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 19:46:35.022732 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 19:46:35.023458 systemd[1]: Stopped target slices.target. Feb 12 19:46:35.024238 systemd[1]: Stopped target sockets.target. Feb 12 19:46:35.025039 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 19:46:35.025088 systemd[1]: Closed iscsid.socket. Feb 12 19:46:35.025849 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 19:46:35.026000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:35.025911 systemd[1]: Closed iscsiuio.socket. Feb 12 19:46:35.026597 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 19:46:35.026684 systemd[1]: Stopped ignition-setup.service. Feb 12 19:46:35.027713 systemd[1]: Stopping systemd-networkd.service... Feb 12 19:46:35.028611 systemd[1]: Stopping systemd-resolved.service... Feb 12 19:46:35.030770 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 19:46:35.031457 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 19:46:35.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:35.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:35.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:35.031565 systemd[1]: Stopped sysroot-boot.service. Feb 12 19:46:35.031769 systemd-networkd[688]: eth1: DHCPv6 lease lost Feb 12 19:46:35.033443 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 19:46:35.036000 audit: BPF prog-id=6 op=UNLOAD Feb 12 19:46:35.037000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:35.033610 systemd[1]: Stopped systemd-resolved.service. Feb 12 19:46:35.034264 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 19:46:35.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:35.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:35.034324 systemd[1]: Stopped initrd-setup-root.service. Feb 12 19:46:35.043000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:35.036704 systemd-networkd[688]: eth0: DHCPv6 lease lost Feb 12 19:46:35.046000 audit: BPF prog-id=9 op=UNLOAD Feb 12 19:46:35.037805 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 19:46:35.037932 systemd[1]: Stopped systemd-networkd.service. Feb 12 19:46:35.038745 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 19:46:35.038798 systemd[1]: Closed systemd-networkd.socket. Feb 12 19:46:35.040355 systemd[1]: Stopping network-cleanup.service... Feb 12 19:46:35.041240 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 19:46:35.041343 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 19:46:35.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:35.041947 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 19:46:35.042004 systemd[1]: Stopped systemd-sysctl.service. Feb 12 19:46:35.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:35.042706 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 19:46:35.042765 systemd[1]: Stopped systemd-modules-load.service. Feb 12 19:46:35.044421 systemd[1]: Stopping systemd-udevd.service... Feb 12 19:46:35.050872 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 19:46:35.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:35.054482 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 19:46:35.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:35.054578 systemd[1]: Stopped network-cleanup.service. Feb 12 19:46:35.066000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:35.057746 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 19:46:35.057911 systemd[1]: Stopped systemd-udevd.service. Feb 12 19:46:35.058988 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 19:46:35.059031 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 19:46:35.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:35.062758 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 19:46:35.062832 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 19:46:35.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:35.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:35.063745 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 19:46:35.063820 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 19:46:35.064934 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 19:46:35.064999 systemd[1]: Stopped dracut-cmdline.service. Feb 12 19:46:35.065866 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 19:46:35.065937 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 19:46:35.067994 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 19:46:35.068938 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 19:46:35.069037 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 19:46:35.078520 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 19:46:35.078688 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 19:46:35.080370 systemd[1]: Reached target initrd-switch-root.target. Feb 12 19:46:35.082734 systemd[1]: Starting initrd-switch-root.service... Feb 12 19:46:35.101026 systemd[1]: Switching root. Feb 12 19:46:35.124326 iscsid[698]: iscsid shutting down. Feb 12 19:46:35.125227 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). Feb 12 19:46:35.125303 systemd-journald[183]: Journal stopped Feb 12 19:46:39.821733 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 19:46:39.821820 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 19:46:39.821843 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 19:46:39.821879 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 19:46:39.821897 kernel: SELinux: policy capability open_perms=1 Feb 12 19:46:39.821915 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 19:46:39.821941 kernel: SELinux: policy capability always_check_network=0 Feb 12 19:46:39.821965 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 19:46:39.821983 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 19:46:39.822002 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 19:46:39.822025 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 19:46:39.822047 systemd[1]: Successfully loaded SELinux policy in 47.443ms. Feb 12 19:46:39.822080 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.746ms. Feb 12 19:46:39.822094 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:46:39.822111 systemd[1]: Detected virtualization kvm. Feb 12 19:46:39.822130 systemd[1]: Detected architecture x86-64. Feb 12 19:46:39.822148 systemd[1]: Detected first boot. Feb 12 19:46:39.822167 systemd[1]: Hostname set to . Feb 12 19:46:39.822187 systemd[1]: Initializing machine ID from VM UUID. Feb 12 19:46:39.822202 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 19:46:39.822215 systemd[1]: Populated /etc with preset unit settings. Feb 12 19:46:39.822230 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:46:39.822248 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:46:39.822263 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:46:39.822290 kernel: kauditd_printk_skb: 53 callbacks suppressed Feb 12 19:46:39.822308 kernel: audit: type=1334 audit(1707767199.435:90): prog-id=12 op=LOAD Feb 12 19:46:39.822326 kernel: audit: type=1334 audit(1707767199.435:91): prog-id=3 op=UNLOAD Feb 12 19:46:39.822344 kernel: audit: type=1334 audit(1707767199.437:92): prog-id=13 op=LOAD Feb 12 19:46:39.822364 kernel: audit: type=1334 audit(1707767199.442:93): prog-id=14 op=LOAD Feb 12 19:46:39.822383 kernel: audit: type=1334 audit(1707767199.442:94): prog-id=4 op=UNLOAD Feb 12 19:46:39.822403 kernel: audit: type=1334 audit(1707767199.442:95): prog-id=5 op=UNLOAD Feb 12 19:46:39.822423 kernel: audit: type=1131 audit(1707767199.445:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:39.822444 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 19:46:39.822466 systemd[1]: Stopped iscsid.service. Feb 12 19:46:39.822491 kernel: audit: type=1131 audit(1707767199.454:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:39.822512 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 19:46:39.822537 systemd[1]: Stopped initrd-switch-root.service. Feb 12 19:46:39.822558 kernel: audit: type=1130 audit(1707767199.460:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:39.822578 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 19:46:39.822636 kernel: audit: type=1131 audit(1707767199.460:99): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:39.822662 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 19:46:39.822682 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 19:46:39.822702 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 12 19:46:39.822715 systemd[1]: Created slice system-getty.slice. Feb 12 19:46:39.822731 systemd[1]: Created slice system-modprobe.slice. Feb 12 19:46:39.822745 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 19:46:39.822759 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 19:46:39.822776 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 19:46:39.822789 systemd[1]: Created slice user.slice. Feb 12 19:46:39.822820 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:46:39.822838 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 19:46:39.822856 systemd[1]: Set up automount boot.automount. Feb 12 19:46:39.822869 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 19:46:39.822883 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 19:46:39.822901 systemd[1]: Stopped target initrd-fs.target. Feb 12 19:46:39.822920 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 19:46:39.823003 systemd[1]: Reached target integritysetup.target. Feb 12 19:46:39.823031 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:46:39.823052 systemd[1]: Reached target remote-fs.target. Feb 12 19:46:39.823071 systemd[1]: Reached target slices.target. Feb 12 19:46:39.823089 systemd[1]: Reached target swap.target. Feb 12 19:46:39.823108 systemd[1]: Reached target torcx.target. Feb 12 19:46:39.823127 systemd[1]: Reached target veritysetup.target. Feb 12 19:46:39.823147 systemd[1]: Listening on systemd-coredump.socket. Feb 12 19:46:39.823308 systemd[1]: Listening on systemd-initctl.socket. Feb 12 19:46:39.823339 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:46:39.823365 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:46:39.823386 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:46:39.823406 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 19:46:39.823425 systemd[1]: Mounting dev-hugepages.mount... Feb 12 19:46:39.823458 systemd[1]: Mounting dev-mqueue.mount... Feb 12 19:46:39.823479 systemd[1]: Mounting media.mount... Feb 12 19:46:39.823498 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 19:46:39.823517 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 19:46:39.823537 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 19:46:39.823561 systemd[1]: Mounting tmp.mount... Feb 12 19:46:39.823594 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 19:46:39.825724 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 19:46:39.825768 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:46:39.825790 systemd[1]: Starting modprobe@configfs.service... Feb 12 19:46:39.825811 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 19:46:39.825833 systemd[1]: Starting modprobe@drm.service... Feb 12 19:46:39.825854 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 19:46:39.825874 systemd[1]: Starting modprobe@fuse.service... Feb 12 19:46:39.825905 systemd[1]: Starting modprobe@loop.service... Feb 12 19:46:39.825925 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 19:46:39.825974 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 19:46:39.825993 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 19:46:39.826012 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 19:46:39.826041 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 19:46:39.826067 systemd[1]: Stopped systemd-journald.service. Feb 12 19:46:39.826085 systemd[1]: Starting systemd-journald.service... Feb 12 19:46:39.826104 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:46:39.826122 systemd[1]: Starting systemd-network-generator.service... Feb 12 19:46:39.826139 systemd[1]: Starting systemd-remount-fs.service... Feb 12 19:46:39.826156 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:46:39.826176 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 19:46:39.826195 systemd[1]: Stopped verity-setup.service. Feb 12 19:46:39.826211 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 19:46:39.826228 systemd[1]: Mounted dev-hugepages.mount. Feb 12 19:46:39.826241 systemd[1]: Mounted dev-mqueue.mount. Feb 12 19:46:39.826254 systemd[1]: Mounted media.mount. Feb 12 19:46:39.826268 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 19:46:39.826281 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 19:46:39.826295 systemd[1]: Mounted tmp.mount. Feb 12 19:46:39.826328 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:46:39.826342 kernel: loop: module loaded Feb 12 19:46:39.826356 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 19:46:39.826376 systemd[1]: Finished modprobe@configfs.service. Feb 12 19:46:39.826394 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 19:46:39.826414 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 19:46:39.826432 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 19:46:39.826453 systemd[1]: Finished modprobe@drm.service. Feb 12 19:46:39.826476 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 19:46:39.826494 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 19:46:39.826509 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 19:46:39.826523 kernel: fuse: init (API version 7.34) Feb 12 19:46:39.826536 systemd[1]: Finished modprobe@loop.service. Feb 12 19:46:39.826553 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:46:39.826567 systemd[1]: Finished systemd-remount-fs.service. Feb 12 19:46:39.826580 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 19:46:39.826630 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 19:46:39.826645 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 19:46:39.826663 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 19:46:39.826677 systemd[1]: Starting systemd-random-seed.service... Feb 12 19:46:39.826700 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 19:46:39.826714 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:46:39.826727 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 19:46:39.826741 systemd[1]: Finished modprobe@fuse.service. Feb 12 19:46:39.826755 systemd[1]: Finished systemd-network-generator.service. Feb 12 19:46:39.826768 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 19:46:39.826782 systemd[1]: Reached target network-pre.target. Feb 12 19:46:39.826799 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 19:46:39.826814 systemd[1]: Finished systemd-random-seed.service. Feb 12 19:46:39.826828 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 19:46:39.826842 systemd[1]: Reached target first-boot-complete.target. Feb 12 19:46:39.826865 systemd-journald[952]: Journal started Feb 12 19:46:39.826952 systemd-journald[952]: Runtime Journal (/run/log/journal/69cf38abb2d8487ba563167e8bd5f2ac) is 4.9M, max 39.5M, 34.5M free. Feb 12 19:46:35.278000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 19:46:35.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:46:35.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:46:35.345000 audit: BPF prog-id=10 op=LOAD Feb 12 19:46:35.345000 audit: BPF prog-id=10 op=UNLOAD Feb 12 19:46:35.345000 audit: BPF prog-id=11 op=LOAD Feb 12 19:46:35.345000 audit: BPF prog-id=11 op=UNLOAD Feb 12 19:46:35.450000 audit[882]: AVC avc: denied { associate } for pid=882 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 19:46:35.450000 audit[882]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cedf8 a2=c0000d70c0 a3=32 items=0 ppid=865 pid=882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:35.450000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:46:35.452000 audit[882]: AVC avc: denied { associate } for pid=882 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 19:46:35.452000 audit[882]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=865 pid=882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:35.452000 audit: CWD cwd="/" Feb 12 19:46:35.452000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:35.452000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:35.452000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:46:39.435000 audit: BPF prog-id=12 op=LOAD Feb 12 19:46:39.435000 audit: BPF prog-id=3 op=UNLOAD Feb 12 19:46:39.437000 audit: BPF prog-id=13 op=LOAD Feb 12 19:46:39.442000 audit: BPF prog-id=14 op=LOAD Feb 12 19:46:39.843435 systemd[1]: Started systemd-journald.service. Feb 12 19:46:39.442000 audit: BPF prog-id=4 op=UNLOAD Feb 12 19:46:39.442000 audit: BPF prog-id=5 op=UNLOAD Feb 12 19:46:39.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:39.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:39.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:39.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:39.468000 audit: BPF prog-id=12 op=UNLOAD Feb 12 19:46:39.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:39.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:39.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:39.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:39.622000 audit: BPF prog-id=15 op=LOAD Feb 12 19:46:39.622000 audit: BPF prog-id=16 op=LOAD Feb 12 19:46:39.622000 audit: BPF prog-id=17 op=LOAD Feb 12 19:46:39.622000 audit: BPF prog-id=13 op=UNLOAD Feb 12 19:46:39.622000 audit: BPF prog-id=14 op=UNLOAD Feb 12 19:46:39.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:39.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:39.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:39.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:39.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:39.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:39.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:39.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:39.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:39.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:39.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:39.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:39.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:39.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:39.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:39.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:39.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:39.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:39.818000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 19:46:39.818000 audit[952]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffcb22aa490 a2=4000 a3=7ffcb22aa52c items=0 ppid=1 pid=952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:39.818000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 19:46:39.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:35.448870 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-12T19:46:35Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:46:39.430974 systemd[1]: Queued start job for default target multi-user.target. Feb 12 19:46:35.449464 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-12T19:46:35Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:46:39.430998 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 12 19:46:35.449494 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-12T19:46:35Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:46:39.445955 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 19:46:35.449533 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-12T19:46:35Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 19:46:39.832347 systemd[1]: Starting systemd-journal-flush.service... Feb 12 19:46:35.449545 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-12T19:46:35Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 19:46:35.449633 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-12T19:46:35Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 19:46:35.449647 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-12T19:46:35Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 19:46:35.449891 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-12T19:46:35Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 19:46:35.449941 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-12T19:46:35Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:46:35.449958 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-12T19:46:35Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:46:35.450675 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-12T19:46:35Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 19:46:35.450713 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-12T19:46:35Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 19:46:35.450734 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-12T19:46:35Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 19:46:35.450750 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-12T19:46:35Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 19:46:35.450767 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-12T19:46:35Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 19:46:39.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:39.861050 systemd-journald[952]: Time spent on flushing to /var/log/journal/69cf38abb2d8487ba563167e8bd5f2ac is 87.593ms for 1182 entries. Feb 12 19:46:39.861050 systemd-journald[952]: System Journal (/var/log/journal/69cf38abb2d8487ba563167e8bd5f2ac) is 8.0M, max 195.6M, 187.6M free. Feb 12 19:46:39.960656 systemd-journald[952]: Received client request to flush runtime journal. Feb 12 19:46:39.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:39.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:35.450781 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-12T19:46:35Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 19:46:39.857047 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:46:38.674085 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-12T19:46:38Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:46:39.902928 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 19:46:38.674762 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-12T19:46:38Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:46:39.910910 systemd[1]: Starting systemd-sysusers.service... Feb 12 19:46:38.675051 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-12T19:46:38Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:46:39.962064 systemd[1]: Finished systemd-journal-flush.service. Feb 12 19:46:38.675420 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-12T19:46:38Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:46:38.675514 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-12T19:46:38Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 19:46:38.675759 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-12T19:46:38Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 19:46:39.981779 systemd[1]: Finished systemd-sysusers.service. Feb 12 19:46:39.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:40.042457 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:46:40.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:40.046438 systemd[1]: Starting systemd-udev-settle.service... Feb 12 19:46:40.069389 udevadm[992]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 12 19:46:40.901942 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 19:46:40.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:40.903000 audit: BPF prog-id=18 op=LOAD Feb 12 19:46:40.903000 audit: BPF prog-id=19 op=LOAD Feb 12 19:46:40.903000 audit: BPF prog-id=7 op=UNLOAD Feb 12 19:46:40.903000 audit: BPF prog-id=8 op=UNLOAD Feb 12 19:46:40.905143 systemd[1]: Starting systemd-udevd.service... Feb 12 19:46:40.938760 systemd-udevd[993]: Using default interface naming scheme 'v252'. Feb 12 19:46:40.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:40.996000 audit: BPF prog-id=20 op=LOAD Feb 12 19:46:40.994629 systemd[1]: Started systemd-udevd.service. Feb 12 19:46:41.001136 systemd[1]: Starting systemd-networkd.service... Feb 12 19:46:41.020000 audit: BPF prog-id=21 op=LOAD Feb 12 19:46:41.020000 audit: BPF prog-id=22 op=LOAD Feb 12 19:46:41.020000 audit: BPF prog-id=23 op=LOAD Feb 12 19:46:41.023178 systemd[1]: Starting systemd-userdbd.service... Feb 12 19:46:41.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:41.105698 systemd[1]: Started systemd-userdbd.service. Feb 12 19:46:41.115764 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 12 19:46:41.135047 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 19:46:41.135695 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 19:46:41.138842 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 19:46:41.144141 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 19:46:41.149305 systemd[1]: Starting modprobe@loop.service... Feb 12 19:46:41.150109 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 19:46:41.150271 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 19:46:41.150603 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 19:46:41.151421 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 19:46:41.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:41.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:41.153314 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 19:46:41.157201 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 19:46:41.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:41.159000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:41.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:41.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:41.158822 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 19:46:41.159062 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 19:46:41.162383 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 19:46:41.162764 systemd[1]: Finished modprobe@loop.service. Feb 12 19:46:41.163840 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 19:46:41.288973 systemd-networkd[998]: lo: Link UP Feb 12 19:46:41.289549 systemd-networkd[998]: lo: Gained carrier Feb 12 19:46:41.290844 systemd-networkd[998]: Enumeration completed Feb 12 19:46:41.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:41.291258 systemd[1]: Started systemd-networkd.service. Feb 12 19:46:41.292510 systemd-networkd[998]: eth1: Configuring with /run/systemd/network/10-ba:f8:e5:b7:0b:08.network. Feb 12 19:46:41.294938 systemd-networkd[998]: eth0: Configuring with /run/systemd/network/10-2e:b7:57:87:36:d4.network. Feb 12 19:46:41.296724 systemd-networkd[998]: eth1: Link UP Feb 12 19:46:41.296928 systemd-networkd[998]: eth1: Gained carrier Feb 12 19:46:41.306195 systemd-networkd[998]: eth0: Link UP Feb 12 19:46:41.306211 systemd-networkd[998]: eth0: Gained carrier Feb 12 19:46:41.343809 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:46:41.355726 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 12 19:46:41.362612 kernel: ACPI: button: Power Button [PWRF] Feb 12 19:46:41.402000 audit[999]: AVC avc: denied { confidentiality } for pid=999 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 19:46:41.402000 audit[999]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5585c6e8a430 a1=32194 a2=7f9eb12eebc5 a3=5 items=108 ppid=993 pid=999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:41.402000 audit: CWD cwd="/" Feb 12 19:46:41.402000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=1 name=(null) inode=13737 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=2 name=(null) inode=13737 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=3 name=(null) inode=13738 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=4 name=(null) inode=13737 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=5 name=(null) inode=13739 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=6 name=(null) inode=13737 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=7 name=(null) inode=13740 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=8 name=(null) inode=13740 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=9 name=(null) inode=13741 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=10 name=(null) inode=13740 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=11 name=(null) inode=13742 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=12 name=(null) inode=13740 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=13 name=(null) inode=13743 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=14 name=(null) inode=13740 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=15 name=(null) inode=13744 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=16 name=(null) inode=13740 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=17 name=(null) inode=13745 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=18 name=(null) inode=13737 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=19 name=(null) inode=13746 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=20 name=(null) inode=13746 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=21 name=(null) inode=13747 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=22 name=(null) inode=13746 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=23 name=(null) inode=13748 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=24 name=(null) inode=13746 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=25 name=(null) inode=13749 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=26 name=(null) inode=13746 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=27 name=(null) inode=13750 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=28 name=(null) inode=13746 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=29 name=(null) inode=13751 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=30 name=(null) inode=13737 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=31 name=(null) inode=13752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=32 name=(null) inode=13752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=33 name=(null) inode=13753 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=34 name=(null) inode=13752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=35 name=(null) inode=13754 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=36 name=(null) inode=13752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=37 name=(null) inode=13755 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=38 name=(null) inode=13752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=39 name=(null) inode=13756 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=40 name=(null) inode=13752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=41 name=(null) inode=13757 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=42 name=(null) inode=13737 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=43 name=(null) inode=13758 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=44 name=(null) inode=13758 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=45 name=(null) inode=13759 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=46 name=(null) inode=13758 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=47 name=(null) inode=13760 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=48 name=(null) inode=13758 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=49 name=(null) inode=13761 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=50 name=(null) inode=13758 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=51 name=(null) inode=13762 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=52 name=(null) inode=13758 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=53 name=(null) inode=13763 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=55 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=56 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=57 name=(null) inode=13765 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=58 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=59 name=(null) inode=13766 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=60 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=61 name=(null) inode=13767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=62 name=(null) inode=13767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=63 name=(null) inode=13768 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=64 name=(null) inode=13767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=65 name=(null) inode=13769 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=66 name=(null) inode=13767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=67 name=(null) inode=13770 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=68 name=(null) inode=13767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=69 name=(null) inode=13771 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=70 name=(null) inode=13767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=71 name=(null) inode=13772 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=72 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=73 name=(null) inode=13773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=74 name=(null) inode=13773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=75 name=(null) inode=13774 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=76 name=(null) inode=13773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=77 name=(null) inode=13775 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=78 name=(null) inode=13773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=79 name=(null) inode=13776 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=80 name=(null) inode=13773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=81 name=(null) inode=13777 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=82 name=(null) inode=13773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=83 name=(null) inode=13778 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=84 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=85 name=(null) inode=13779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=86 name=(null) inode=13779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=87 name=(null) inode=13780 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=88 name=(null) inode=13779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=89 name=(null) inode=13781 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=90 name=(null) inode=13779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=91 name=(null) inode=13782 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=92 name=(null) inode=13779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=93 name=(null) inode=13783 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=94 name=(null) inode=13779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=95 name=(null) inode=13784 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=96 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=97 name=(null) inode=13785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=98 name=(null) inode=13785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=99 name=(null) inode=13786 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=100 name=(null) inode=13785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=101 name=(null) inode=13787 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=102 name=(null) inode=13785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=103 name=(null) inode=13788 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=104 name=(null) inode=13785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=105 name=(null) inode=13789 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=106 name=(null) inode=13785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PATH item=107 name=(null) inode=13790 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:41.402000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 19:46:41.469621 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Feb 12 19:46:41.476616 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Feb 12 19:46:41.487627 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 19:46:41.656676 kernel: EDAC MC: Ver: 3.0.0 Feb 12 19:46:41.674339 systemd[1]: Finished systemd-udev-settle.service. Feb 12 19:46:41.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:41.677324 systemd[1]: Starting lvm2-activation-early.service... Feb 12 19:46:41.701993 lvm[1031]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:46:41.738795 systemd[1]: Finished lvm2-activation-early.service. Feb 12 19:46:41.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:41.739785 systemd[1]: Reached target cryptsetup.target. Feb 12 19:46:41.741815 systemd[1]: Starting lvm2-activation.service... Feb 12 19:46:41.748456 lvm[1032]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:46:41.772466 systemd[1]: Finished lvm2-activation.service. Feb 12 19:46:41.773126 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:46:41.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:41.775711 systemd[1]: Mounting media-configdrive.mount... Feb 12 19:46:41.776291 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 19:46:41.776342 systemd[1]: Reached target machines.target. Feb 12 19:46:41.778236 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 19:46:41.794517 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 19:46:41.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:41.800653 kernel: ISO 9660 Extensions: RRIP_1991A Feb 12 19:46:41.801952 systemd[1]: Mounted media-configdrive.mount. Feb 12 19:46:41.802497 systemd[1]: Reached target local-fs.target. Feb 12 19:46:41.804874 systemd[1]: Starting ldconfig.service... Feb 12 19:46:41.806170 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 19:46:41.806279 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:46:41.808445 systemd[1]: Starting systemd-boot-update.service... Feb 12 19:46:41.810994 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 19:46:41.814088 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:46:41.814155 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:46:41.818886 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 19:46:41.824702 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1038 (bootctl) Feb 12 19:46:41.826298 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 19:46:41.902310 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 19:46:41.903303 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 19:46:41.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:41.907903 systemd-tmpfiles[1040]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 19:46:41.917951 systemd-tmpfiles[1040]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 19:46:41.930378 systemd-tmpfiles[1040]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 19:46:42.013923 systemd-fsck[1044]: fsck.fat 4.2 (2021-01-31) Feb 12 19:46:42.013923 systemd-fsck[1044]: /dev/vda1: 789 files, 115339/258078 clusters Feb 12 19:46:42.017988 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 19:46:42.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:42.021645 systemd[1]: Mounting boot.mount... Feb 12 19:46:42.039772 systemd[1]: Mounted boot.mount. Feb 12 19:46:42.081805 systemd[1]: Finished systemd-boot-update.service. Feb 12 19:46:42.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:42.247941 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 19:46:42.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:42.252657 systemd[1]: Starting audit-rules.service... Feb 12 19:46:42.256987 systemd[1]: Starting clean-ca-certificates.service... Feb 12 19:46:42.261286 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 19:46:42.264000 audit: BPF prog-id=24 op=LOAD Feb 12 19:46:42.269358 systemd[1]: Starting systemd-resolved.service... Feb 12 19:46:42.271000 audit: BPF prog-id=25 op=LOAD Feb 12 19:46:42.276149 systemd[1]: Starting systemd-timesyncd.service... Feb 12 19:46:42.281849 systemd[1]: Starting systemd-update-utmp.service... Feb 12 19:46:42.300520 systemd[1]: Finished clean-ca-certificates.service. Feb 12 19:46:42.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:42.301354 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 19:46:42.314000 audit[1053]: SYSTEM_BOOT pid=1053 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 19:46:42.320113 systemd[1]: Finished systemd-update-utmp.service. Feb 12 19:46:42.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:42.356842 ldconfig[1037]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 19:46:42.367355 systemd[1]: Finished ldconfig.service. Feb 12 19:46:42.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:42.369215 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 19:46:42.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:42.372405 systemd[1]: Starting systemd-update-done.service... Feb 12 19:46:42.389907 systemd[1]: Finished systemd-update-done.service. Feb 12 19:46:42.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:42.412000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 19:46:42.412000 audit[1069]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc98f76070 a2=420 a3=0 items=0 ppid=1047 pid=1069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:42.412000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 19:46:42.413858 augenrules[1069]: No rules Feb 12 19:46:42.414083 systemd[1]: Finished audit-rules.service. Feb 12 19:46:42.434461 systemd-resolved[1051]: Positive Trust Anchors: Feb 12 19:46:42.434475 systemd-resolved[1051]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:46:42.434509 systemd-resolved[1051]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:46:42.441314 systemd[1]: Started systemd-timesyncd.service. Feb 12 19:46:42.441982 systemd[1]: Reached target time-set.target. Feb 12 19:46:42.446338 systemd-resolved[1051]: Using system hostname 'ci-3510.3.2-d-344270592c'. Feb 12 19:46:42.448860 systemd[1]: Started systemd-resolved.service. Feb 12 19:46:42.449351 systemd[1]: Reached target network.target. Feb 12 19:46:42.449742 systemd[1]: Reached target nss-lookup.target. Feb 12 19:46:42.450219 systemd[1]: Reached target sysinit.target. Feb 12 19:46:42.450911 systemd[1]: Started motdgen.path. Feb 12 19:46:42.451413 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 19:46:42.452091 systemd[1]: Started logrotate.timer. Feb 12 19:46:42.452669 systemd[1]: Started mdadm.timer. Feb 12 19:46:42.453043 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 19:46:42.453368 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 19:46:42.453398 systemd[1]: Reached target paths.target. Feb 12 19:46:42.453777 systemd[1]: Reached target timers.target. Feb 12 19:46:42.454457 systemd[1]: Listening on dbus.socket. Feb 12 19:46:42.456628 systemd[1]: Starting docker.socket... Feb 12 19:46:42.461836 systemd[1]: Listening on sshd.socket. Feb 12 19:46:42.462477 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:46:42.463360 systemd[1]: Listening on docker.socket. Feb 12 19:46:42.464023 systemd[1]: Reached target sockets.target. Feb 12 19:46:42.464486 systemd[1]: Reached target basic.target. Feb 12 19:46:42.464879 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:46:42.464906 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:46:42.466427 systemd[1]: Starting containerd.service... Feb 12 19:46:42.880257 systemd-timesyncd[1052]: Contacted time server 69.10.223.130:123 (0.flatcar.pool.ntp.org). Feb 12 19:46:42.880347 systemd-timesyncd[1052]: Initial clock synchronization to Mon 2024-02-12 19:46:42.880109 UTC. Feb 12 19:46:42.880822 systemd-resolved[1051]: Clock change detected. Flushing caches. Feb 12 19:46:42.881885 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 12 19:46:42.885029 systemd[1]: Starting dbus.service... Feb 12 19:46:42.888873 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 19:46:42.894769 systemd[1]: Starting extend-filesystems.service... Feb 12 19:46:42.897644 jq[1082]: false Feb 12 19:46:42.895646 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 19:46:42.899197 systemd[1]: Starting motdgen.service... Feb 12 19:46:42.906074 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 19:46:42.909428 systemd[1]: Starting prepare-critools.service... Feb 12 19:46:42.914773 systemd[1]: Starting prepare-helm.service... Feb 12 19:46:42.916970 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 19:46:42.920262 systemd[1]: Starting sshd-keygen.service... Feb 12 19:46:42.928825 systemd[1]: Starting systemd-logind.service... Feb 12 19:46:42.929410 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:46:42.929503 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 19:46:42.930283 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 19:46:42.931641 systemd[1]: Starting update-engine.service... Feb 12 19:46:42.936942 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 19:46:42.950291 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 19:46:42.950542 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 19:46:42.968558 tar[1103]: crictl Feb 12 19:46:42.974743 jq[1095]: true Feb 12 19:46:42.981076 systemd-networkd[998]: eth1: Gained IPv6LL Feb 12 19:46:42.987339 tar[1102]: ./ Feb 12 19:46:42.987339 tar[1102]: ./macvlan Feb 12 19:46:42.986593 systemd[1]: Started dbus.service. Feb 12 19:46:42.985665 dbus-daemon[1079]: [system] SELinux support is enabled Feb 12 19:46:42.990015 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 19:46:42.990064 systemd[1]: Reached target system-config.target. Feb 12 19:46:42.990684 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 19:46:42.992959 systemd[1]: Starting user-configdrive.service... Feb 12 19:46:43.014426 tar[1104]: linux-amd64/helm Feb 12 19:46:43.016998 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 19:46:43.017280 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 19:46:43.035461 jq[1110]: true Feb 12 19:46:43.059489 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 19:46:43.059658 systemd[1]: Finished motdgen.service. Feb 12 19:46:43.077022 extend-filesystems[1083]: Found vda Feb 12 19:46:43.077996 extend-filesystems[1083]: Found vda1 Feb 12 19:46:43.077996 extend-filesystems[1083]: Found vda2 Feb 12 19:46:43.077996 extend-filesystems[1083]: Found vda3 Feb 12 19:46:43.077996 extend-filesystems[1083]: Found usr Feb 12 19:46:43.077996 extend-filesystems[1083]: Found vda4 Feb 12 19:46:43.077996 extend-filesystems[1083]: Found vda6 Feb 12 19:46:43.077996 extend-filesystems[1083]: Found vda7 Feb 12 19:46:43.077996 extend-filesystems[1083]: Found vda9 Feb 12 19:46:43.077996 extend-filesystems[1083]: Checking size of /dev/vda9 Feb 12 19:46:43.098794 coreos-cloudinit[1111]: 2024/02/12 19:46:43 Checking availability of "cloud-drive" Feb 12 19:46:43.100918 coreos-cloudinit[1111]: 2024/02/12 19:46:43 Fetching user-data from datasource of type "cloud-drive" Feb 12 19:46:43.101194 coreos-cloudinit[1111]: 2024/02/12 19:46:43 Attempting to read from "/media/configdrive/openstack/latest/user_data" Feb 12 19:46:43.108033 systemd-networkd[998]: eth0: Gained IPv6LL Feb 12 19:46:43.113006 coreos-cloudinit[1111]: 2024/02/12 19:46:43 Fetching meta-data from datasource of type "cloud-drive" Feb 12 19:46:43.113006 coreos-cloudinit[1111]: 2024/02/12 19:46:43 Attempting to read from "/media/configdrive/openstack/latest/meta_data.json" Feb 12 19:46:43.123963 extend-filesystems[1083]: Resized partition /dev/vda9 Feb 12 19:46:43.147819 extend-filesystems[1140]: resize2fs 1.46.5 (30-Dec-2021) Feb 12 19:46:43.156971 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 15121403 blocks Feb 12 19:46:43.182799 update_engine[1094]: I0212 19:46:43.181635 1094 main.cc:92] Flatcar Update Engine starting Feb 12 19:46:43.191069 systemd[1]: Started update-engine.service. Feb 12 19:46:43.210756 coreos-cloudinit[1111]: Detected an Ignition config. Exiting... Feb 12 19:46:43.210879 update_engine[1094]: I0212 19:46:43.191282 1094 update_check_scheduler.cc:74] Next update check in 4m16s Feb 12 19:46:43.193972 systemd[1]: Started locksmithd.service. Feb 12 19:46:43.196784 systemd[1]: Finished user-configdrive.service. Feb 12 19:46:43.197368 systemd[1]: Reached target user-config.target. Feb 12 19:46:43.226569 env[1106]: time="2024-02-12T19:46:43.226422430Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 19:46:43.231845 bash[1146]: Updated "/home/core/.ssh/authorized_keys" Feb 12 19:46:43.232921 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 19:46:43.264322 systemd-logind[1093]: Watching system buttons on /dev/input/event1 (Power Button) Feb 12 19:46:43.269865 systemd-logind[1093]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 12 19:46:43.270294 systemd-logind[1093]: New seat seat0. Feb 12 19:46:43.273177 systemd[1]: Started systemd-logind.service. Feb 12 19:46:43.286752 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Feb 12 19:46:43.327042 extend-filesystems[1140]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 12 19:46:43.327042 extend-filesystems[1140]: old_desc_blocks = 1, new_desc_blocks = 8 Feb 12 19:46:43.327042 extend-filesystems[1140]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Feb 12 19:46:43.329106 extend-filesystems[1083]: Resized filesystem in /dev/vda9 Feb 12 19:46:43.329106 extend-filesystems[1083]: Found vdb Feb 12 19:46:43.328205 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 19:46:43.328415 systemd[1]: Finished extend-filesystems.service. Feb 12 19:46:43.352067 tar[1102]: ./static Feb 12 19:46:43.365534 env[1106]: time="2024-02-12T19:46:43.365444610Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 19:46:43.365836 env[1106]: time="2024-02-12T19:46:43.365662674Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:46:43.391859 env[1106]: time="2024-02-12T19:46:43.391789782Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:46:43.391859 env[1106]: time="2024-02-12T19:46:43.391837141Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:46:43.392214 env[1106]: time="2024-02-12T19:46:43.392181926Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:46:43.392214 env[1106]: time="2024-02-12T19:46:43.392208321Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 19:46:43.392558 env[1106]: time="2024-02-12T19:46:43.392223695Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 19:46:43.392558 env[1106]: time="2024-02-12T19:46:43.392234353Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 19:46:43.392558 env[1106]: time="2024-02-12T19:46:43.392524168Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:46:43.392961 env[1106]: time="2024-02-12T19:46:43.392931633Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:46:43.393470 env[1106]: time="2024-02-12T19:46:43.393418305Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:46:43.393558 env[1106]: time="2024-02-12T19:46:43.393469822Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 19:46:43.393558 env[1106]: time="2024-02-12T19:46:43.393553902Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 19:46:43.393659 env[1106]: time="2024-02-12T19:46:43.393568271Z" level=info msg="metadata content store policy set" policy=shared Feb 12 19:46:43.405843 coreos-metadata[1078]: Feb 12 19:46:43.405 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Feb 12 19:46:43.422861 env[1106]: time="2024-02-12T19:46:43.422781553Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 19:46:43.422861 env[1106]: time="2024-02-12T19:46:43.422862364Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 19:46:43.423057 env[1106]: time="2024-02-12T19:46:43.422934998Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 19:46:43.423057 env[1106]: time="2024-02-12T19:46:43.423009587Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 19:46:43.423057 env[1106]: time="2024-02-12T19:46:43.423024724Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 19:46:43.423057 env[1106]: time="2024-02-12T19:46:43.423040004Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 19:46:43.423213 env[1106]: time="2024-02-12T19:46:43.423105822Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 19:46:43.423213 env[1106]: time="2024-02-12T19:46:43.423121935Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 19:46:43.423213 env[1106]: time="2024-02-12T19:46:43.423143589Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 19:46:43.423213 env[1106]: time="2024-02-12T19:46:43.423172247Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 19:46:43.423213 env[1106]: time="2024-02-12T19:46:43.423185776Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 19:46:43.423213 env[1106]: time="2024-02-12T19:46:43.423197995Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 19:46:43.423400 env[1106]: time="2024-02-12T19:46:43.423380525Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 19:46:43.423543 env[1106]: time="2024-02-12T19:46:43.423520186Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 19:46:43.423981 env[1106]: time="2024-02-12T19:46:43.423954189Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 19:46:43.424053 env[1106]: time="2024-02-12T19:46:43.424003061Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 19:46:43.424053 env[1106]: time="2024-02-12T19:46:43.424028859Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 19:46:43.424114 env[1106]: time="2024-02-12T19:46:43.424085508Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 19:46:43.424114 env[1106]: time="2024-02-12T19:46:43.424099156Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 19:46:43.424169 env[1106]: time="2024-02-12T19:46:43.424113002Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 19:46:43.424205 env[1106]: time="2024-02-12T19:46:43.424125587Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 19:46:43.424253 env[1106]: time="2024-02-12T19:46:43.424224933Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 19:46:43.424253 env[1106]: time="2024-02-12T19:46:43.424239828Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 19:46:43.424333 env[1106]: time="2024-02-12T19:46:43.424252516Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 19:46:43.424483 env[1106]: time="2024-02-12T19:46:43.424445910Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 19:46:43.424483 env[1106]: time="2024-02-12T19:46:43.424475962Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 19:46:43.424661 env[1106]: time="2024-02-12T19:46:43.424639820Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 19:46:43.424761 env[1106]: time="2024-02-12T19:46:43.424666419Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 19:46:43.424761 env[1106]: time="2024-02-12T19:46:43.424680015Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 19:46:43.424761 env[1106]: time="2024-02-12T19:46:43.424691133Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 19:46:43.424761 env[1106]: time="2024-02-12T19:46:43.424710646Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 19:46:43.424761 env[1106]: time="2024-02-12T19:46:43.424744524Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 19:46:43.424899 env[1106]: time="2024-02-12T19:46:43.424766204Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 19:46:43.424899 env[1106]: time="2024-02-12T19:46:43.424808679Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 19:46:43.425066 env[1106]: time="2024-02-12T19:46:43.425015075Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 19:46:43.425066 env[1106]: time="2024-02-12T19:46:43.425072091Z" level=info msg="Connect containerd service" Feb 12 19:46:43.427912 env[1106]: time="2024-02-12T19:46:43.425110639Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 19:46:43.427912 env[1106]: time="2024-02-12T19:46:43.426099145Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 19:46:43.427912 env[1106]: time="2024-02-12T19:46:43.426490365Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 19:46:43.427912 env[1106]: time="2024-02-12T19:46:43.426536695Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 19:46:43.427912 env[1106]: time="2024-02-12T19:46:43.427515254Z" level=info msg="containerd successfully booted in 0.209011s" Feb 12 19:46:43.426706 systemd[1]: Started containerd.service. Feb 12 19:46:43.431122 env[1106]: time="2024-02-12T19:46:43.430581140Z" level=info msg="Start subscribing containerd event" Feb 12 19:46:43.431261 env[1106]: time="2024-02-12T19:46:43.431135607Z" level=info msg="Start recovering state" Feb 12 19:46:43.431261 env[1106]: time="2024-02-12T19:46:43.431222433Z" level=info msg="Start event monitor" Feb 12 19:46:43.431261 env[1106]: time="2024-02-12T19:46:43.431234674Z" level=info msg="Start snapshots syncer" Feb 12 19:46:43.431261 env[1106]: time="2024-02-12T19:46:43.431245115Z" level=info msg="Start cni network conf syncer for default" Feb 12 19:46:43.431261 env[1106]: time="2024-02-12T19:46:43.431252097Z" level=info msg="Start streaming server" Feb 12 19:46:43.443916 coreos-metadata[1078]: Feb 12 19:46:43.443 INFO Fetch successful Feb 12 19:46:43.452113 unknown[1078]: wrote ssh authorized keys file for user: core Feb 12 19:46:43.454368 tar[1102]: ./vlan Feb 12 19:46:43.473762 update-ssh-keys[1152]: Updated "/home/core/.ssh/authorized_keys" Feb 12 19:46:43.474520 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 12 19:46:43.545152 tar[1102]: ./portmap Feb 12 19:46:43.623580 tar[1102]: ./host-local Feb 12 19:46:43.703803 tar[1102]: ./vrf Feb 12 19:46:43.782751 tar[1102]: ./bridge Feb 12 19:46:43.877059 tar[1102]: ./tuning Feb 12 19:46:43.960350 tar[1102]: ./firewall Feb 12 19:46:44.073622 tar[1102]: ./host-device Feb 12 19:46:44.181014 tar[1102]: ./sbr Feb 12 19:46:44.269292 tar[1102]: ./loopback Feb 12 19:46:44.353632 tar[1102]: ./dhcp Feb 12 19:46:44.567105 tar[1104]: linux-amd64/LICENSE Feb 12 19:46:44.567809 tar[1104]: linux-amd64/README.md Feb 12 19:46:44.576582 systemd[1]: Finished prepare-helm.service. Feb 12 19:46:44.615348 tar[1102]: ./ptp Feb 12 19:46:44.619079 systemd[1]: Finished prepare-critools.service. Feb 12 19:46:44.667319 tar[1102]: ./ipvlan Feb 12 19:46:44.711616 tar[1102]: ./bandwidth Feb 12 19:46:44.760411 sshd_keygen[1115]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 19:46:44.775469 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 19:46:44.812947 systemd[1]: Finished sshd-keygen.service. Feb 12 19:46:44.816375 systemd[1]: Starting issuegen.service... Feb 12 19:46:44.830106 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 19:46:44.830495 systemd[1]: Finished issuegen.service. Feb 12 19:46:44.834180 systemd[1]: Starting systemd-user-sessions.service... Feb 12 19:46:44.849102 systemd[1]: Finished systemd-user-sessions.service. Feb 12 19:46:44.852959 systemd[1]: Started getty@tty1.service. Feb 12 19:46:44.856686 systemd[1]: Started serial-getty@ttyS0.service. Feb 12 19:46:44.857815 systemd[1]: Reached target getty.target. Feb 12 19:46:44.858514 systemd[1]: Reached target multi-user.target. Feb 12 19:46:44.862009 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 19:46:44.864627 locksmithd[1147]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 19:46:44.877209 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 19:46:44.877478 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 19:46:44.878083 systemd[1]: Startup finished in 1.048s (kernel) + 7.453s (initrd) + 9.244s (userspace) = 17.746s. Feb 12 19:46:51.965794 systemd[1]: Created slice system-sshd.slice. Feb 12 19:46:51.968452 systemd[1]: Started sshd@0-146.190.157.125:22-139.178.68.195:56740.service. Feb 12 19:46:52.053042 sshd[1178]: Accepted publickey for core from 139.178.68.195 port 56740 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:46:52.056105 sshd[1178]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:46:52.073010 systemd[1]: Created slice user-500.slice. Feb 12 19:46:52.075451 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 19:46:52.084131 systemd-logind[1093]: New session 1 of user core. Feb 12 19:46:52.090078 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 19:46:52.093330 systemd[1]: Starting user@500.service... Feb 12 19:46:52.098582 (systemd)[1181]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:46:52.200707 systemd[1181]: Queued start job for default target default.target. Feb 12 19:46:52.201479 systemd[1181]: Reached target paths.target. Feb 12 19:46:52.201514 systemd[1181]: Reached target sockets.target. Feb 12 19:46:52.201533 systemd[1181]: Reached target timers.target. Feb 12 19:46:52.201550 systemd[1181]: Reached target basic.target. Feb 12 19:46:52.201617 systemd[1181]: Reached target default.target. Feb 12 19:46:52.201682 systemd[1181]: Startup finished in 93ms. Feb 12 19:46:52.202606 systemd[1]: Started user@500.service. Feb 12 19:46:52.205637 systemd[1]: Started session-1.scope. Feb 12 19:46:52.279945 systemd[1]: Started sshd@1-146.190.157.125:22-139.178.68.195:56752.service. Feb 12 19:46:52.335453 sshd[1190]: Accepted publickey for core from 139.178.68.195 port 56752 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:46:52.338404 sshd[1190]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:46:52.345301 systemd[1]: Started session-2.scope. Feb 12 19:46:52.345894 systemd-logind[1093]: New session 2 of user core. Feb 12 19:46:52.416650 sshd[1190]: pam_unix(sshd:session): session closed for user core Feb 12 19:46:52.423888 systemd[1]: Started sshd@2-146.190.157.125:22-139.178.68.195:56768.service. Feb 12 19:46:52.425085 systemd[1]: sshd@1-146.190.157.125:22-139.178.68.195:56752.service: Deactivated successfully. Feb 12 19:46:52.426111 systemd[1]: session-2.scope: Deactivated successfully. Feb 12 19:46:52.427932 systemd-logind[1093]: Session 2 logged out. Waiting for processes to exit. Feb 12 19:46:52.429567 systemd-logind[1093]: Removed session 2. Feb 12 19:46:52.485327 sshd[1195]: Accepted publickey for core from 139.178.68.195 port 56768 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:46:52.487497 sshd[1195]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:46:52.494923 systemd[1]: Started session-3.scope. Feb 12 19:46:52.495600 systemd-logind[1093]: New session 3 of user core. Feb 12 19:46:52.557396 sshd[1195]: pam_unix(sshd:session): session closed for user core Feb 12 19:46:52.564221 systemd[1]: Started sshd@3-146.190.157.125:22-139.178.68.195:56770.service. Feb 12 19:46:52.565130 systemd[1]: sshd@2-146.190.157.125:22-139.178.68.195:56768.service: Deactivated successfully. Feb 12 19:46:52.566206 systemd[1]: session-3.scope: Deactivated successfully. Feb 12 19:46:52.568038 systemd-logind[1093]: Session 3 logged out. Waiting for processes to exit. Feb 12 19:46:52.570102 systemd-logind[1093]: Removed session 3. Feb 12 19:46:52.621309 sshd[1201]: Accepted publickey for core from 139.178.68.195 port 56770 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:46:52.624030 sshd[1201]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:46:52.630643 systemd-logind[1093]: New session 4 of user core. Feb 12 19:46:52.631268 systemd[1]: Started session-4.scope. Feb 12 19:46:52.706053 sshd[1201]: pam_unix(sshd:session): session closed for user core Feb 12 19:46:52.711965 systemd[1]: sshd@3-146.190.157.125:22-139.178.68.195:56770.service: Deactivated successfully. Feb 12 19:46:52.713053 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 19:46:52.714075 systemd-logind[1093]: Session 4 logged out. Waiting for processes to exit. Feb 12 19:46:52.716056 systemd[1]: Started sshd@4-146.190.157.125:22-139.178.68.195:56776.service. Feb 12 19:46:52.717817 systemd-logind[1093]: Removed session 4. Feb 12 19:46:52.777630 sshd[1208]: Accepted publickey for core from 139.178.68.195 port 56776 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:46:52.781182 sshd[1208]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:46:52.796051 systemd-logind[1093]: New session 5 of user core. Feb 12 19:46:52.797222 systemd[1]: Started session-5.scope. Feb 12 19:46:52.890067 sudo[1211]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 19:46:52.891948 sudo[1211]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:46:52.903082 dbus-daemon[1079]: \xd0m\x9c\u0019\xb1U: received setenforce notice (enforcing=105468720) Feb 12 19:46:52.905475 sudo[1211]: pam_unix(sudo:session): session closed for user root Feb 12 19:46:52.913275 sshd[1208]: pam_unix(sshd:session): session closed for user core Feb 12 19:46:52.922458 systemd[1]: Started sshd@5-146.190.157.125:22-139.178.68.195:56788.service. Feb 12 19:46:52.923521 systemd[1]: sshd@4-146.190.157.125:22-139.178.68.195:56776.service: Deactivated successfully. Feb 12 19:46:52.924993 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 19:46:52.928715 systemd-logind[1093]: Session 5 logged out. Waiting for processes to exit. Feb 12 19:46:52.930951 systemd-logind[1093]: Removed session 5. Feb 12 19:46:52.976034 sshd[1214]: Accepted publickey for core from 139.178.68.195 port 56788 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:46:52.978954 sshd[1214]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:46:52.985534 systemd-logind[1093]: New session 6 of user core. Feb 12 19:46:52.985610 systemd[1]: Started session-6.scope. Feb 12 19:46:53.053677 sudo[1219]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 19:46:53.054609 sudo[1219]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:46:53.059187 sudo[1219]: pam_unix(sudo:session): session closed for user root Feb 12 19:46:53.066669 sudo[1218]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 19:46:53.066982 sudo[1218]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:46:53.081947 systemd[1]: Stopping audit-rules.service... Feb 12 19:46:53.083000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:46:53.085094 auditctl[1222]: No rules Feb 12 19:46:53.086556 kernel: kauditd_printk_skb: 186 callbacks suppressed Feb 12 19:46:53.086694 kernel: audit: type=1305 audit(1707767213.083:171): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:46:53.087038 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 19:46:53.096571 kernel: audit: type=1300 audit(1707767213.083:171): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff18fc21e0 a2=420 a3=0 items=0 ppid=1 pid=1222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:53.096693 kernel: audit: type=1327 audit(1707767213.083:171): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:46:53.096806 kernel: audit: type=1131 audit(1707767213.086:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:53.083000 audit[1222]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff18fc21e0 a2=420 a3=0 items=0 ppid=1 pid=1222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:53.083000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:46:53.086000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:53.087289 systemd[1]: Stopped audit-rules.service. Feb 12 19:46:53.091621 systemd[1]: Starting audit-rules.service... Feb 12 19:46:53.121538 augenrules[1239]: No rules Feb 12 19:46:53.123083 systemd[1]: Finished audit-rules.service. Feb 12 19:46:53.127803 kernel: audit: type=1130 audit(1707767213.122:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:53.128028 kernel: audit: type=1106 audit(1707767213.124:174): pid=1218 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:46:53.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:53.124000 audit[1218]: USER_END pid=1218 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:46:53.125021 sudo[1218]: pam_unix(sudo:session): session closed for user root Feb 12 19:46:53.132069 sshd[1214]: pam_unix(sshd:session): session closed for user core Feb 12 19:46:53.124000 audit[1218]: CRED_DISP pid=1218 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:46:53.137889 kernel: audit: type=1104 audit(1707767213.124:175): pid=1218 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:46:53.133000 audit[1214]: USER_END pid=1214 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:46:53.139975 systemd[1]: sshd@5-146.190.157.125:22-139.178.68.195:56788.service: Deactivated successfully. Feb 12 19:46:53.140915 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 19:46:53.133000 audit[1214]: CRED_DISP pid=1214 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:46:53.153769 kernel: audit: type=1106 audit(1707767213.133:176): pid=1214 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:46:53.153899 kernel: audit: type=1104 audit(1707767213.133:177): pid=1214 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:46:53.150391 systemd[1]: Started sshd@6-146.190.157.125:22-139.178.68.195:56802.service. Feb 12 19:46:53.153404 systemd-logind[1093]: Session 6 logged out. Waiting for processes to exit. Feb 12 19:46:53.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-146.190.157.125:22-139.178.68.195:56788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:53.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-146.190.157.125:22-139.178.68.195:56802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:53.161762 kernel: audit: type=1131 audit(1707767213.139:178): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-146.190.157.125:22-139.178.68.195:56788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:53.161980 systemd-logind[1093]: Removed session 6. Feb 12 19:46:53.217000 audit[1245]: USER_ACCT pid=1245 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:46:53.218052 sshd[1245]: Accepted publickey for core from 139.178.68.195 port 56802 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:46:53.218000 audit[1245]: CRED_ACQ pid=1245 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:46:53.219000 audit[1245]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2ed09860 a2=3 a3=0 items=0 ppid=1 pid=1245 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:53.219000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:46:53.220542 sshd[1245]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:46:53.226984 systemd[1]: Started session-7.scope. Feb 12 19:46:53.227826 systemd-logind[1093]: New session 7 of user core. Feb 12 19:46:53.233000 audit[1245]: USER_START pid=1245 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:46:53.236000 audit[1247]: CRED_ACQ pid=1247 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:46:53.289000 audit[1248]: USER_ACCT pid=1248 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:46:53.290671 sudo[1248]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 19:46:53.290000 audit[1248]: CRED_REFR pid=1248 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:46:53.291312 sudo[1248]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:46:53.293000 audit[1248]: USER_START pid=1248 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:46:53.884449 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 19:46:53.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:53.893969 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 19:46:53.894434 systemd[1]: Reached target network-online.target. Feb 12 19:46:53.897076 systemd[1]: Starting docker.service... Feb 12 19:46:53.959598 env[1264]: time="2024-02-12T19:46:53.959477918Z" level=info msg="Starting up" Feb 12 19:46:53.962087 env[1264]: time="2024-02-12T19:46:53.961942525Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 19:46:53.962416 env[1264]: time="2024-02-12T19:46:53.962001031Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 19:46:53.962515 env[1264]: time="2024-02-12T19:46:53.962457824Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 19:46:53.962515 env[1264]: time="2024-02-12T19:46:53.962480908Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 19:46:53.965543 env[1264]: time="2024-02-12T19:46:53.965448712Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 19:46:53.965543 env[1264]: time="2024-02-12T19:46:53.965492761Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 19:46:53.965543 env[1264]: time="2024-02-12T19:46:53.965523486Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 19:46:53.965543 env[1264]: time="2024-02-12T19:46:53.965540985Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 19:46:53.973894 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2807457780-merged.mount: Deactivated successfully. Feb 12 19:46:54.036406 env[1264]: time="2024-02-12T19:46:54.036344809Z" level=info msg="Loading containers: start." Feb 12 19:46:54.110000 audit[1296]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1296 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:46:54.110000 audit[1296]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc4516e610 a2=0 a3=7ffc4516e5fc items=0 ppid=1264 pid=1296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:54.110000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 12 19:46:54.115000 audit[1298]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1298 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:46:54.115000 audit[1298]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc6054d1b0 a2=0 a3=7ffc6054d19c items=0 ppid=1264 pid=1298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:54.115000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 12 19:46:54.118000 audit[1300]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1300 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:46:54.118000 audit[1300]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd2e580f10 a2=0 a3=7ffd2e580efc items=0 ppid=1264 pid=1300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:54.118000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 19:46:54.122000 audit[1302]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1302 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:46:54.122000 audit[1302]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe2453db60 a2=0 a3=7ffe2453db4c items=0 ppid=1264 pid=1302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:54.122000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 19:46:54.126000 audit[1304]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1304 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:46:54.126000 audit[1304]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff9c70ea60 a2=0 a3=7fff9c70ea4c items=0 ppid=1264 pid=1304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:54.126000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 12 19:46:54.148000 audit[1310]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1310 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:46:54.148000 audit[1310]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff04fa7c00 a2=0 a3=7fff04fa7bec items=0 ppid=1264 pid=1310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:54.148000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 12 19:46:54.159000 audit[1312]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1312 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:46:54.159000 audit[1312]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc34ecc880 a2=0 a3=7ffc34ecc86c items=0 ppid=1264 pid=1312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:54.159000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 12 19:46:54.164000 audit[1314]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1314 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:46:54.164000 audit[1314]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffe81dc0b50 a2=0 a3=7ffe81dc0b3c items=0 ppid=1264 pid=1314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:54.164000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 12 19:46:54.166000 audit[1316]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1316 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:46:54.166000 audit[1316]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fff69eb8ad0 a2=0 a3=7fff69eb8abc items=0 ppid=1264 pid=1316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:54.166000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:46:54.181000 audit[1320]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1320 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:46:54.181000 audit[1320]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe68674a00 a2=0 a3=7ffe686749ec items=0 ppid=1264 pid=1320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:54.181000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:46:54.183000 audit[1321]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1321 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:46:54.183000 audit[1321]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffdff2d2300 a2=0 a3=7ffdff2d22ec items=0 ppid=1264 pid=1321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:54.183000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:46:54.195765 kernel: Initializing XFRM netlink socket Feb 12 19:46:54.242013 env[1264]: time="2024-02-12T19:46:54.241921037Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 12 19:46:54.280000 audit[1329]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1329 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:46:54.280000 audit[1329]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc13c3a1e0 a2=0 a3=7ffc13c3a1cc items=0 ppid=1264 pid=1329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:54.280000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 12 19:46:54.293000 audit[1332]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1332 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:46:54.293000 audit[1332]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffd041c5470 a2=0 a3=7ffd041c545c items=0 ppid=1264 pid=1332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:54.293000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 12 19:46:54.300000 audit[1335]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1335 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:46:54.300000 audit[1335]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff19719490 a2=0 a3=7fff1971947c items=0 ppid=1264 pid=1335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:54.300000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 12 19:46:54.303000 audit[1337]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1337 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:46:54.303000 audit[1337]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc9d7f4680 a2=0 a3=7ffc9d7f466c items=0 ppid=1264 pid=1337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:54.303000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 12 19:46:54.307000 audit[1339]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1339 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:46:54.307000 audit[1339]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffdb056bbd0 a2=0 a3=7ffdb056bbbc items=0 ppid=1264 pid=1339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:54.307000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 12 19:46:54.311000 audit[1341]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1341 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:46:54.311000 audit[1341]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffed1251b10 a2=0 a3=7ffed1251afc items=0 ppid=1264 pid=1341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:54.311000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 12 19:46:54.315000 audit[1343]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1343 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:46:54.315000 audit[1343]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc346000b0 a2=0 a3=7ffc3460009c items=0 ppid=1264 pid=1343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:54.315000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 12 19:46:54.326000 audit[1346]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1346 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:46:54.326000 audit[1346]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffe775914b0 a2=0 a3=7ffe7759149c items=0 ppid=1264 pid=1346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:54.326000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 12 19:46:54.330000 audit[1348]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1348 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:46:54.330000 audit[1348]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffff8e55050 a2=0 a3=7ffff8e5503c items=0 ppid=1264 pid=1348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:54.330000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 19:46:54.333000 audit[1350]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1350 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:46:54.333000 audit[1350]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fffae55c7d0 a2=0 a3=7fffae55c7bc items=0 ppid=1264 pid=1350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:54.333000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 19:46:54.336000 audit[1352]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1352 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:46:54.336000 audit[1352]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc3b4efe80 a2=0 a3=7ffc3b4efe6c items=0 ppid=1264 pid=1352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:54.336000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 12 19:46:54.338051 systemd-networkd[998]: docker0: Link UP Feb 12 19:46:54.357000 audit[1356]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1356 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:46:54.357000 audit[1356]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd170b5ea0 a2=0 a3=7ffd170b5e8c items=0 ppid=1264 pid=1356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:54.357000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:46:54.359000 audit[1357]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1357 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:46:54.359000 audit[1357]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffe45d6210 a2=0 a3=7fffe45d61fc items=0 ppid=1264 pid=1357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:54.359000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:46:54.361288 env[1264]: time="2024-02-12T19:46:54.361247872Z" level=info msg="Loading containers: done." Feb 12 19:46:54.375708 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2897766018-merged.mount: Deactivated successfully. Feb 12 19:46:54.403887 env[1264]: time="2024-02-12T19:46:54.403699774Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 12 19:46:54.404687 env[1264]: time="2024-02-12T19:46:54.404653320Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 12 19:46:54.405047 env[1264]: time="2024-02-12T19:46:54.405017550Z" level=info msg="Daemon has completed initialization" Feb 12 19:46:54.464051 systemd[1]: Started docker.service. Feb 12 19:46:54.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.472840 env[1264]: time="2024-02-12T19:46:54.472716361Z" level=info msg="API listen on /run/docker.sock" Feb 12 19:46:54.501689 systemd[1]: Starting coreos-metadata.service... Feb 12 19:46:54.550124 coreos-metadata[1382]: Feb 12 19:46:54.550 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Feb 12 19:46:54.560021 coreos-metadata[1382]: Feb 12 19:46:54.559 INFO Fetch successful Feb 12 19:46:54.574842 systemd[1]: Finished coreos-metadata.service. Feb 12 19:46:54.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.593410 systemd[1]: Reloading. Feb 12 19:46:54.711361 /usr/lib/systemd/system-generators/torcx-generator[1415]: time="2024-02-12T19:46:54Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:46:54.711399 /usr/lib/systemd/system-generators/torcx-generator[1415]: time="2024-02-12T19:46:54Z" level=info msg="torcx already run" Feb 12 19:46:54.816318 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:46:54.816344 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:46:54.837912 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:46:54.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.912000 audit: BPF prog-id=31 op=LOAD Feb 12 19:46:54.912000 audit: BPF prog-id=29 op=UNLOAD Feb 12 19:46:54.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.914000 audit: BPF prog-id=32 op=LOAD Feb 12 19:46:54.914000 audit: BPF prog-id=26 op=UNLOAD Feb 12 19:46:54.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.914000 audit: BPF prog-id=33 op=LOAD Feb 12 19:46:54.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.914000 audit: BPF prog-id=34 op=LOAD Feb 12 19:46:54.914000 audit: BPF prog-id=27 op=UNLOAD Feb 12 19:46:54.914000 audit: BPF prog-id=28 op=UNLOAD Feb 12 19:46:54.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.915000 audit: BPF prog-id=35 op=LOAD Feb 12 19:46:54.915000 audit: BPF prog-id=25 op=UNLOAD Feb 12 19:46:54.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.917000 audit: BPF prog-id=36 op=LOAD Feb 12 19:46:54.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.917000 audit: BPF prog-id=37 op=LOAD Feb 12 19:46:54.917000 audit: BPF prog-id=18 op=UNLOAD Feb 12 19:46:54.917000 audit: BPF prog-id=19 op=UNLOAD Feb 12 19:46:54.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.918000 audit: BPF prog-id=38 op=LOAD Feb 12 19:46:54.918000 audit: BPF prog-id=20 op=UNLOAD Feb 12 19:46:54.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.921000 audit: BPF prog-id=39 op=LOAD Feb 12 19:46:54.921000 audit: BPF prog-id=24 op=UNLOAD Feb 12 19:46:54.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.923000 audit: BPF prog-id=40 op=LOAD Feb 12 19:46:54.923000 audit: BPF prog-id=21 op=UNLOAD Feb 12 19:46:54.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.923000 audit: BPF prog-id=41 op=LOAD Feb 12 19:46:54.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.923000 audit: BPF prog-id=42 op=LOAD Feb 12 19:46:54.923000 audit: BPF prog-id=22 op=UNLOAD Feb 12 19:46:54.923000 audit: BPF prog-id=23 op=UNLOAD Feb 12 19:46:54.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.924000 audit: BPF prog-id=43 op=LOAD Feb 12 19:46:54.924000 audit: BPF prog-id=15 op=UNLOAD Feb 12 19:46:54.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.924000 audit: BPF prog-id=44 op=LOAD Feb 12 19:46:54.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:54.924000 audit: BPF prog-id=45 op=LOAD Feb 12 19:46:54.924000 audit: BPF prog-id=16 op=UNLOAD Feb 12 19:46:54.924000 audit: BPF prog-id=17 op=UNLOAD Feb 12 19:46:54.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.933469 systemd[1]: Started kubelet.service. Feb 12 19:46:55.060205 kubelet[1461]: E0212 19:46:55.059957 1461 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 12 19:46:55.063071 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:46:55.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:46:55.063261 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:46:55.459053 env[1106]: time="2024-02-12T19:46:55.458849494Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\"" Feb 12 19:46:56.074317 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4245493327.mount: Deactivated successfully. Feb 12 19:46:58.306634 env[1106]: time="2024-02-12T19:46:58.306559934Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:46:58.314884 env[1106]: time="2024-02-12T19:46:58.314817841Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:46:58.317536 env[1106]: time="2024-02-12T19:46:58.317485612Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:46:58.320531 env[1106]: time="2024-02-12T19:46:58.320463475Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2f28bed4096abd572a56595ac0304238bdc271dcfe22c650707c09bf97ec16fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:46:58.322151 env[1106]: time="2024-02-12T19:46:58.322102963Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\" returns image reference \"sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f\"" Feb 12 19:46:58.343773 env[1106]: time="2024-02-12T19:46:58.343668522Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\"" Feb 12 19:47:01.133692 env[1106]: time="2024-02-12T19:47:01.133585422Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:01.140554 env[1106]: time="2024-02-12T19:47:01.140471729Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:01.147102 env[1106]: time="2024-02-12T19:47:01.147030480Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:01.151477 env[1106]: time="2024-02-12T19:47:01.151409261Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fda420c6c15cdd01c4eba3404f0662fe486a9c7f38fa13c741a21334673841a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:01.153531 env[1106]: time="2024-02-12T19:47:01.153464609Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\" returns image reference \"sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486\"" Feb 12 19:47:01.178207 env[1106]: time="2024-02-12T19:47:01.178150887Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\"" Feb 12 19:47:03.194856 env[1106]: time="2024-02-12T19:47:03.194784878Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:03.209547 env[1106]: time="2024-02-12T19:47:03.209386640Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:03.223582 env[1106]: time="2024-02-12T19:47:03.223507071Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:03.228809 env[1106]: time="2024-02-12T19:47:03.228741919Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c3c7303ee6d01c8e5a769db28661cf854b55175aa72c67e9b6a7b9d47ac42af3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:03.230502 env[1106]: time="2024-02-12T19:47:03.230384416Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\" returns image reference \"sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e\"" Feb 12 19:47:03.251651 env[1106]: time="2024-02-12T19:47:03.251529493Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 12 19:47:04.703119 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1011019528.mount: Deactivated successfully. Feb 12 19:47:05.286938 kernel: kauditd_printk_skb: 260 callbacks suppressed Feb 12 19:47:05.287110 kernel: audit: type=1130 audit(1707767225.276:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:05.287158 kernel: audit: type=1131 audit(1707767225.276:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:05.287187 kernel: audit: type=1130 audit(1707767225.282:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:05.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:05.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:05.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:05.277334 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 12 19:47:05.277576 systemd[1]: Stopped kubelet.service. Feb 12 19:47:05.282833 systemd[1]: Started kubelet.service. Feb 12 19:47:05.398124 kubelet[1495]: E0212 19:47:05.397975 1495 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 12 19:47:05.403965 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:47:05.404198 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:47:05.409271 kernel: audit: type=1131 audit(1707767225.403:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:47:05.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:47:05.511761 env[1106]: time="2024-02-12T19:47:05.511184615Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:05.514555 env[1106]: time="2024-02-12T19:47:05.514476013Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:05.517045 env[1106]: time="2024-02-12T19:47:05.516990767Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:05.519779 env[1106]: time="2024-02-12T19:47:05.519607350Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:05.520756 env[1106]: time="2024-02-12T19:47:05.520684871Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f\"" Feb 12 19:47:05.540523 env[1106]: time="2024-02-12T19:47:05.540346648Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 12 19:47:06.053637 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount454410193.mount: Deactivated successfully. Feb 12 19:47:06.062216 env[1106]: time="2024-02-12T19:47:06.062116668Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:06.064437 env[1106]: time="2024-02-12T19:47:06.064384070Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:06.066749 env[1106]: time="2024-02-12T19:47:06.066669677Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:06.068768 env[1106]: time="2024-02-12T19:47:06.068702872Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:06.069665 env[1106]: time="2024-02-12T19:47:06.069615705Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 12 19:47:06.087206 env[1106]: time="2024-02-12T19:47:06.087151621Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Feb 12 19:47:07.119026 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1646053028.mount: Deactivated successfully. Feb 12 19:47:12.406330 env[1106]: time="2024-02-12T19:47:12.406232344Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:12.410211 env[1106]: time="2024-02-12T19:47:12.410149343Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:12.412962 env[1106]: time="2024-02-12T19:47:12.412911469Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:12.416351 env[1106]: time="2024-02-12T19:47:12.416285774Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:12.418588 env[1106]: time="2024-02-12T19:47:12.417703197Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7\"" Feb 12 19:47:12.438046 env[1106]: time="2024-02-12T19:47:12.437919333Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Feb 12 19:47:13.005929 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2296460751.mount: Deactivated successfully. Feb 12 19:47:13.653381 env[1106]: time="2024-02-12T19:47:13.653295006Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:13.656444 env[1106]: time="2024-02-12T19:47:13.656390216Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:13.658986 env[1106]: time="2024-02-12T19:47:13.658933713Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:13.660912 env[1106]: time="2024-02-12T19:47:13.660861442Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:13.661802 env[1106]: time="2024-02-12T19:47:13.661758787Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a\"" Feb 12 19:47:15.527489 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Feb 12 19:47:15.527797 systemd[1]: Stopped kubelet.service. Feb 12 19:47:15.539361 kernel: audit: type=1130 audit(1707767235.527:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:15.539566 kernel: audit: type=1131 audit(1707767235.527:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:15.539621 kernel: audit: type=1130 audit(1707767235.531:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:15.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:15.527000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:15.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:15.532279 systemd[1]: Started kubelet.service. Feb 12 19:47:15.616325 kubelet[1572]: E0212 19:47:15.616234 1572 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 12 19:47:15.618922 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:47:15.619080 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:47:15.623152 kernel: audit: type=1131 audit(1707767235.618:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:47:15.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:47:17.774737 systemd[1]: Stopped kubelet.service. Feb 12 19:47:17.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:17.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:17.782546 kernel: audit: type=1130 audit(1707767237.774:397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:17.782695 kernel: audit: type=1131 audit(1707767237.774:398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:17.808922 systemd[1]: Reloading. Feb 12 19:47:17.923101 /usr/lib/systemd/system-generators/torcx-generator[1601]: time="2024-02-12T19:47:17Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:47:17.923133 /usr/lib/systemd/system-generators/torcx-generator[1601]: time="2024-02-12T19:47:17Z" level=info msg="torcx already run" Feb 12 19:47:18.027547 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:47:18.027575 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:47:18.051589 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:47:18.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.133261 kernel: audit: type=1400 audit(1707767238.127:399): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.133405 kernel: audit: type=1400 audit(1707767238.127:400): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.139316 kernel: audit: type=1400 audit(1707767238.132:401): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.139461 kernel: audit: type=1400 audit(1707767238.132:402): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.132000 audit: BPF prog-id=46 op=LOAD Feb 12 19:47:18.132000 audit: BPF prog-id=31 op=UNLOAD Feb 12 19:47:18.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.135000 audit: BPF prog-id=47 op=LOAD Feb 12 19:47:18.135000 audit: BPF prog-id=32 op=UNLOAD Feb 12 19:47:18.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.138000 audit: BPF prog-id=48 op=LOAD Feb 12 19:47:18.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.138000 audit: BPF prog-id=49 op=LOAD Feb 12 19:47:18.138000 audit: BPF prog-id=33 op=UNLOAD Feb 12 19:47:18.138000 audit: BPF prog-id=34 op=UNLOAD Feb 12 19:47:18.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.139000 audit: BPF prog-id=50 op=LOAD Feb 12 19:47:18.139000 audit: BPF prog-id=35 op=UNLOAD Feb 12 19:47:18.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.141000 audit: BPF prog-id=51 op=LOAD Feb 12 19:47:18.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.141000 audit: BPF prog-id=52 op=LOAD Feb 12 19:47:18.141000 audit: BPF prog-id=36 op=UNLOAD Feb 12 19:47:18.141000 audit: BPF prog-id=37 op=UNLOAD Feb 12 19:47:18.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.142000 audit: BPF prog-id=53 op=LOAD Feb 12 19:47:18.142000 audit: BPF prog-id=38 op=UNLOAD Feb 12 19:47:18.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.145000 audit: BPF prog-id=54 op=LOAD Feb 12 19:47:18.145000 audit: BPF prog-id=39 op=UNLOAD Feb 12 19:47:18.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.146000 audit: BPF prog-id=55 op=LOAD Feb 12 19:47:18.146000 audit: BPF prog-id=40 op=UNLOAD Feb 12 19:47:18.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.147000 audit: BPF prog-id=56 op=LOAD Feb 12 19:47:18.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.147000 audit: BPF prog-id=57 op=LOAD Feb 12 19:47:18.147000 audit: BPF prog-id=41 op=UNLOAD Feb 12 19:47:18.147000 audit: BPF prog-id=42 op=UNLOAD Feb 12 19:47:18.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.148000 audit: BPF prog-id=58 op=LOAD Feb 12 19:47:18.148000 audit: BPF prog-id=43 op=UNLOAD Feb 12 19:47:18.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.148000 audit: BPF prog-id=59 op=LOAD Feb 12 19:47:18.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:18.148000 audit: BPF prog-id=60 op=LOAD Feb 12 19:47:18.148000 audit: BPF prog-id=44 op=UNLOAD Feb 12 19:47:18.148000 audit: BPF prog-id=45 op=UNLOAD Feb 12 19:47:18.167621 systemd[1]: Started kubelet.service. Feb 12 19:47:18.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:18.243098 kubelet[1648]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 19:47:18.243548 kubelet[1648]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:47:18.243793 kubelet[1648]: I0212 19:47:18.243709 1648 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 19:47:18.245927 kubelet[1648]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 19:47:18.246070 kubelet[1648]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:47:19.241985 kubelet[1648]: I0212 19:47:19.241945 1648 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 12 19:47:19.242446 kubelet[1648]: I0212 19:47:19.242423 1648 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 19:47:19.242993 kubelet[1648]: I0212 19:47:19.242957 1648 server.go:836] "Client rotation is on, will bootstrap in background" Feb 12 19:47:19.254640 kubelet[1648]: E0212 19:47:19.254587 1648 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://146.190.157.125:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 146.190.157.125:6443: connect: connection refused Feb 12 19:47:19.256017 kubelet[1648]: I0212 19:47:19.255980 1648 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:47:19.257969 kubelet[1648]: I0212 19:47:19.257815 1648 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 19:47:19.258242 kubelet[1648]: I0212 19:47:19.258171 1648 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 19:47:19.258428 kubelet[1648]: I0212 19:47:19.258303 1648 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 19:47:19.258428 kubelet[1648]: I0212 19:47:19.258336 1648 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 19:47:19.258428 kubelet[1648]: I0212 19:47:19.258351 1648 container_manager_linux.go:308] "Creating device plugin manager" Feb 12 19:47:19.258706 kubelet[1648]: I0212 19:47:19.258506 1648 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:47:19.263276 kubelet[1648]: I0212 19:47:19.263245 1648 kubelet.go:398] "Attempting to sync node with API server" Feb 12 19:47:19.263529 kubelet[1648]: I0212 19:47:19.263513 1648 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 19:47:19.263706 kubelet[1648]: I0212 19:47:19.263691 1648 kubelet.go:297] "Adding apiserver pod source" Feb 12 19:47:19.263841 kubelet[1648]: I0212 19:47:19.263829 1648 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 19:47:19.264921 kubelet[1648]: I0212 19:47:19.264893 1648 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 19:47:19.265313 kubelet[1648]: W0212 19:47:19.265290 1648 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 19:47:19.265822 kubelet[1648]: I0212 19:47:19.265792 1648 server.go:1186] "Started kubelet" Feb 12 19:47:19.266048 kubelet[1648]: W0212 19:47:19.265954 1648 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://146.190.157.125:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-d-344270592c&limit=500&resourceVersion=0": dial tcp 146.190.157.125:6443: connect: connection refused Feb 12 19:47:19.266107 kubelet[1648]: E0212 19:47:19.266073 1648 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://146.190.157.125:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-d-344270592c&limit=500&resourceVersion=0": dial tcp 146.190.157.125:6443: connect: connection refused Feb 12 19:47:19.267000 audit[1648]: AVC avc: denied { mac_admin } for pid=1648 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:19.267000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:47:19.267000 audit[1648]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b4e000 a1=c000b12828 a2=c000ff7fb0 a3=25 items=0 ppid=1 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.267000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:47:19.267000 audit[1648]: AVC avc: denied { mac_admin } for pid=1648 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:19.267000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:47:19.267000 audit[1648]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b28520 a1=c000b12840 a2=c000b4e090 a3=25 items=0 ppid=1 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.267000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:47:19.268844 kubelet[1648]: I0212 19:47:19.268193 1648 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 19:47:19.268844 kubelet[1648]: I0212 19:47:19.268261 1648 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 19:47:19.268844 kubelet[1648]: I0212 19:47:19.268361 1648 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 19:47:19.272935 kubelet[1648]: E0212 19:47:19.272903 1648 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 19:47:19.272935 kubelet[1648]: E0212 19:47:19.272934 1648 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 19:47:19.273308 kubelet[1648]: W0212 19:47:19.273258 1648 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://146.190.157.125:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 146.190.157.125:6443: connect: connection refused Feb 12 19:47:19.273308 kubelet[1648]: E0212 19:47:19.273310 1648 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://146.190.157.125:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 146.190.157.125:6443: connect: connection refused Feb 12 19:47:19.273452 kubelet[1648]: E0212 19:47:19.273362 1648 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-d-344270592c.17b33541877c434c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-d-344270592c", UID:"ci-3510.3.2-d-344270592c", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-d-344270592c"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 47, 19, 265764172, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 47, 19, 265764172, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://146.190.157.125:6443/api/v1/namespaces/default/events": dial tcp 146.190.157.125:6443: connect: connection refused'(may retry after sleeping) Feb 12 19:47:19.275000 audit[1658]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1658 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:19.275000 audit[1658]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffaa1da000 a2=0 a3=7fffaa1d9fec items=0 ppid=1648 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.276671 kubelet[1648]: I0212 19:47:19.276590 1648 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 19:47:19.275000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:47:19.277212 kubelet[1648]: I0212 19:47:19.277173 1648 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 12 19:47:19.278078 kubelet[1648]: I0212 19:47:19.278058 1648 server.go:451] "Adding debug handlers to kubelet server" Feb 12 19:47:19.280000 audit[1659]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1659 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:19.280000 audit[1659]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd5966b120 a2=0 a3=7ffd5966b10c items=0 ppid=1648 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.280000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:47:19.281406 kubelet[1648]: I0212 19:47:19.281305 1648 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 19:47:19.282315 kubelet[1648]: E0212 19:47:19.282280 1648 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://146.190.157.125:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-d-344270592c?timeout=10s": dial tcp 146.190.157.125:6443: connect: connection refused Feb 12 19:47:19.286000 audit[1661]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1661 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:19.286000 audit[1661]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffef256d7e0 a2=0 a3=7ffef256d7cc items=0 ppid=1648 pid=1661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.286000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:47:19.290000 audit[1663]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1663 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:19.290000 audit[1663]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc7399bb30 a2=0 a3=7ffc7399bb1c items=0 ppid=1648 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.290000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:47:19.294202 kubelet[1648]: W0212 19:47:19.294017 1648 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://146.190.157.125:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 146.190.157.125:6443: connect: connection refused Feb 12 19:47:19.294474 kubelet[1648]: E0212 19:47:19.294444 1648 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://146.190.157.125:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 146.190.157.125:6443: connect: connection refused Feb 12 19:47:19.318000 audit[1671]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1671 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:19.318000 audit[1671]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffdeae4aa60 a2=0 a3=7ffdeae4aa4c items=0 ppid=1648 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.318000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 19:47:19.322000 audit[1672]: NETFILTER_CFG table=nat:31 family=2 entries=1 op=nft_register_chain pid=1672 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:19.322000 audit[1672]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff01205aa0 a2=0 a3=7fff01205a8c items=0 ppid=1648 pid=1672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.322000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 12 19:47:19.327811 kubelet[1648]: I0212 19:47:19.327756 1648 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 19:47:19.328194 kubelet[1648]: I0212 19:47:19.328169 1648 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 19:47:19.328391 kubelet[1648]: I0212 19:47:19.328373 1648 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:47:19.340186 kubelet[1648]: I0212 19:47:19.340141 1648 policy_none.go:49] "None policy: Start" Feb 12 19:47:19.342013 kubelet[1648]: I0212 19:47:19.341972 1648 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 19:47:19.342013 kubelet[1648]: I0212 19:47:19.342016 1648 state_mem.go:35] "Initializing new in-memory state store" Feb 12 19:47:19.343000 audit[1675]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_rule pid=1675 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:19.343000 audit[1675]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdf56a0130 a2=0 a3=7ffdf56a011c items=0 ppid=1648 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.343000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 12 19:47:19.350289 systemd[1]: Created slice kubepods.slice. Feb 12 19:47:19.354000 audit[1678]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1678 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:19.354000 audit[1678]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7fffffaa7c80 a2=0 a3=7fffffaa7c6c items=0 ppid=1648 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.354000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 12 19:47:19.356000 audit[1679]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1679 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:19.356000 audit[1679]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd823f78c0 a2=0 a3=7ffd823f78ac items=0 ppid=1648 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.356000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 12 19:47:19.358237 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 19:47:19.359000 audit[1680]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=1680 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:19.359000 audit[1680]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff33a75280 a2=0 a3=7fff33a7526c items=0 ppid=1648 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.359000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:47:19.361962 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 19:47:19.363000 audit[1682]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_rule pid=1682 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:19.363000 audit[1682]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffecbd78d20 a2=0 a3=7ffecbd78d0c items=0 ppid=1648 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.363000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 12 19:47:19.368000 audit[1684]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=1684 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:19.369999 kubelet[1648]: I0212 19:47:19.369972 1648 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 19:47:19.369000 audit[1648]: AVC avc: denied { mac_admin } for pid=1648 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:19.369000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:47:19.369000 audit[1648]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00108bbf0 a1=c000c27b30 a2=c00108bbc0 a3=25 items=0 ppid=1 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.369000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:47:19.371248 kubelet[1648]: I0212 19:47:19.371231 1648 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 19:47:19.371569 kubelet[1648]: I0212 19:47:19.371549 1648 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 19:47:19.372903 kubelet[1648]: E0212 19:47:19.372760 1648 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.2-d-344270592c\" not found" Feb 12 19:47:19.368000 audit[1684]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffecaaa7fb0 a2=0 a3=7ffecaaa7f9c items=0 ppid=1648 pid=1684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.368000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:47:19.378678 kubelet[1648]: I0212 19:47:19.378653 1648 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-d-344270592c" Feb 12 19:47:19.377000 audit[1686]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=1686 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:19.379440 kubelet[1648]: E0212 19:47:19.379370 1648 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://146.190.157.125:6443/api/v1/nodes\": dial tcp 146.190.157.125:6443: connect: connection refused" node="ci-3510.3.2-d-344270592c" Feb 12 19:47:19.377000 audit[1686]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffffed34ae0 a2=0 a3=7ffffed34acc items=0 ppid=1648 pid=1686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.377000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 12 19:47:19.383000 audit[1688]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=1688 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:19.383000 audit[1688]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7fffba0cf070 a2=0 a3=7fffba0cf05c items=0 ppid=1648 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.383000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 12 19:47:19.388000 audit[1690]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=1690 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:19.388000 audit[1690]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7ffea61d4340 a2=0 a3=7ffea61d432c items=0 ppid=1648 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.388000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 12 19:47:19.389796 kubelet[1648]: I0212 19:47:19.389709 1648 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 19:47:19.390000 audit[1691]: NETFILTER_CFG table=mangle:41 family=10 entries=2 op=nft_register_chain pid=1691 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:19.390000 audit[1691]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd2f2dd950 a2=0 a3=7ffd2f2dd93c items=0 ppid=1648 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.390000 audit[1692]: NETFILTER_CFG table=mangle:42 family=2 entries=1 op=nft_register_chain pid=1692 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:19.390000 audit[1692]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcf5a82250 a2=0 a3=7ffcf5a8223c items=0 ppid=1648 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.390000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:47:19.390000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:47:19.392000 audit[1693]: NETFILTER_CFG table=nat:43 family=2 entries=1 op=nft_register_chain pid=1693 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:19.392000 audit[1693]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe29bd9430 a2=0 a3=7ffe29bd941c items=0 ppid=1648 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.392000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:47:19.392000 audit[1694]: NETFILTER_CFG table=nat:44 family=10 entries=2 op=nft_register_chain pid=1694 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:19.392000 audit[1694]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc08151bf0 a2=0 a3=7ffc08151bdc items=0 ppid=1648 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.392000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 12 19:47:19.394000 audit[1696]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_chain pid=1696 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:19.394000 audit[1696]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd6106e500 a2=0 a3=7ffd6106e4ec items=0 ppid=1648 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.394000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:47:19.398000 audit[1697]: NETFILTER_CFG table=nat:46 family=10 entries=1 op=nft_register_rule pid=1697 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:19.398000 audit[1697]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffccd285310 a2=0 a3=7ffccd2852fc items=0 ppid=1648 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.398000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 12 19:47:19.400000 audit[1698]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=1698 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:19.400000 audit[1698]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffce1afc460 a2=0 a3=7ffce1afc44c items=0 ppid=1648 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.400000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:47:19.406000 audit[1700]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=1700 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:19.406000 audit[1700]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffc39875020 a2=0 a3=7ffc3987500c items=0 ppid=1648 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.406000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 12 19:47:19.408000 audit[1701]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_chain pid=1701 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:19.408000 audit[1701]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe7a9e3e70 a2=0 a3=7ffe7a9e3e5c items=0 ppid=1648 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.408000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 12 19:47:19.410000 audit[1702]: NETFILTER_CFG table=nat:50 family=10 entries=1 op=nft_register_chain pid=1702 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:19.410000 audit[1702]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc92590c00 a2=0 a3=7ffc92590bec items=0 ppid=1648 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.410000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:47:19.415000 audit[1704]: NETFILTER_CFG table=nat:51 family=10 entries=1 op=nft_register_rule pid=1704 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:19.415000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff31a77f20 a2=0 a3=7fff31a77f0c items=0 ppid=1648 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.415000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 12 19:47:19.420000 audit[1706]: NETFILTER_CFG table=nat:52 family=10 entries=2 op=nft_register_chain pid=1706 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:19.420000 audit[1706]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffca37db230 a2=0 a3=7ffca37db21c items=0 ppid=1648 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.420000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:47:19.425000 audit[1708]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_rule pid=1708 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:19.425000 audit[1708]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffc628c2730 a2=0 a3=7ffc628c271c items=0 ppid=1648 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.425000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 12 19:47:19.429000 audit[1710]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=1710 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:19.429000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffd27df4be0 a2=0 a3=7ffd27df4bcc items=0 ppid=1648 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.429000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 12 19:47:19.433000 audit[1712]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_rule pid=1712 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:19.433000 audit[1712]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffc97215f00 a2=0 a3=7ffc97215eec items=0 ppid=1648 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.433000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 12 19:47:19.436057 kubelet[1648]: I0212 19:47:19.435862 1648 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 19:47:19.436057 kubelet[1648]: I0212 19:47:19.435923 1648 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 12 19:47:19.436162 kubelet[1648]: I0212 19:47:19.436139 1648 kubelet.go:2113] "Starting kubelet main sync loop" Feb 12 19:47:19.436384 kubelet[1648]: E0212 19:47:19.436357 1648 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 12 19:47:19.437330 kubelet[1648]: W0212 19:47:19.437124 1648 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://146.190.157.125:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 146.190.157.125:6443: connect: connection refused Feb 12 19:47:19.437330 kubelet[1648]: E0212 19:47:19.437288 1648 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://146.190.157.125:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 146.190.157.125:6443: connect: connection refused Feb 12 19:47:19.437000 audit[1713]: NETFILTER_CFG table=mangle:56 family=10 entries=1 op=nft_register_chain pid=1713 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:19.437000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd5f4ea9e0 a2=0 a3=7ffd5f4ea9cc items=0 ppid=1648 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.437000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:47:19.439000 audit[1714]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=1714 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:19.439000 audit[1714]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc3167ff00 a2=0 a3=7ffc3167feec items=0 ppid=1648 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.439000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:47:19.441000 audit[1715]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=1715 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:19.441000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd7204ad50 a2=0 a3=7ffd7204ad3c items=0 ppid=1648 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:19.441000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:47:19.484001 kubelet[1648]: E0212 19:47:19.483940 1648 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://146.190.157.125:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-d-344270592c?timeout=10s": dial tcp 146.190.157.125:6443: connect: connection refused Feb 12 19:47:19.537156 kubelet[1648]: I0212 19:47:19.537107 1648 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:47:19.539101 kubelet[1648]: I0212 19:47:19.539057 1648 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:47:19.540884 kubelet[1648]: I0212 19:47:19.540502 1648 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:47:19.543435 kubelet[1648]: I0212 19:47:19.543404 1648 status_manager.go:698] "Failed to get status for pod" podUID=0f163b06c4109eaa363031fc06a2ff18 pod="kube-system/kube-controller-manager-ci-3510.3.2-d-344270592c" err="Get \"https://146.190.157.125:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ci-3510.3.2-d-344270592c\": dial tcp 146.190.157.125:6443: connect: connection refused" Feb 12 19:47:19.544713 kubelet[1648]: I0212 19:47:19.544686 1648 status_manager.go:698] "Failed to get status for pod" podUID=a162ed5b9b09f2a9b4a9f604bbcb9033 pod="kube-system/kube-apiserver-ci-3510.3.2-d-344270592c" err="Get \"https://146.190.157.125:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ci-3510.3.2-d-344270592c\": dial tcp 146.190.157.125:6443: connect: connection refused" Feb 12 19:47:19.545437 kubelet[1648]: I0212 19:47:19.545410 1648 status_manager.go:698] "Failed to get status for pod" podUID=8564f8fef888b4b9ddcea97a0bcb9696 pod="kube-system/kube-scheduler-ci-3510.3.2-d-344270592c" err="Get \"https://146.190.157.125:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ci-3510.3.2-d-344270592c\": dial tcp 146.190.157.125:6443: connect: connection refused" Feb 12 19:47:19.549915 systemd[1]: Created slice kubepods-burstable-pod0f163b06c4109eaa363031fc06a2ff18.slice. Feb 12 19:47:19.562266 systemd[1]: Created slice kubepods-burstable-poda162ed5b9b09f2a9b4a9f604bbcb9033.slice. Feb 12 19:47:19.577242 systemd[1]: Created slice kubepods-burstable-pod8564f8fef888b4b9ddcea97a0bcb9696.slice. Feb 12 19:47:19.581366 kubelet[1648]: I0212 19:47:19.581335 1648 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-d-344270592c" Feb 12 19:47:19.582535 kubelet[1648]: I0212 19:47:19.582502 1648 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a162ed5b9b09f2a9b4a9f604bbcb9033-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-d-344270592c\" (UID: \"a162ed5b9b09f2a9b4a9f604bbcb9033\") " pod="kube-system/kube-apiserver-ci-3510.3.2-d-344270592c" Feb 12 19:47:19.582690 kubelet[1648]: I0212 19:47:19.582579 1648 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0f163b06c4109eaa363031fc06a2ff18-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-d-344270592c\" (UID: \"0f163b06c4109eaa363031fc06a2ff18\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-d-344270592c" Feb 12 19:47:19.582690 kubelet[1648]: I0212 19:47:19.582631 1648 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0f163b06c4109eaa363031fc06a2ff18-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-d-344270592c\" (UID: \"0f163b06c4109eaa363031fc06a2ff18\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-d-344270592c" Feb 12 19:47:19.582690 kubelet[1648]: I0212 19:47:19.582662 1648 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/0f163b06c4109eaa363031fc06a2ff18-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-d-344270592c\" (UID: \"0f163b06c4109eaa363031fc06a2ff18\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-d-344270592c" Feb 12 19:47:19.582902 kubelet[1648]: I0212 19:47:19.582706 1648 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0f163b06c4109eaa363031fc06a2ff18-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-d-344270592c\" (UID: \"0f163b06c4109eaa363031fc06a2ff18\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-d-344270592c" Feb 12 19:47:19.582902 kubelet[1648]: I0212 19:47:19.582772 1648 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8564f8fef888b4b9ddcea97a0bcb9696-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-d-344270592c\" (UID: \"8564f8fef888b4b9ddcea97a0bcb9696\") " pod="kube-system/kube-scheduler-ci-3510.3.2-d-344270592c" Feb 12 19:47:19.582902 kubelet[1648]: I0212 19:47:19.582804 1648 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a162ed5b9b09f2a9b4a9f604bbcb9033-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-d-344270592c\" (UID: \"a162ed5b9b09f2a9b4a9f604bbcb9033\") " pod="kube-system/kube-apiserver-ci-3510.3.2-d-344270592c" Feb 12 19:47:19.582902 kubelet[1648]: I0212 19:47:19.582855 1648 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a162ed5b9b09f2a9b4a9f604bbcb9033-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-d-344270592c\" (UID: \"a162ed5b9b09f2a9b4a9f604bbcb9033\") " pod="kube-system/kube-apiserver-ci-3510.3.2-d-344270592c" Feb 12 19:47:19.582902 kubelet[1648]: I0212 19:47:19.582888 1648 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0f163b06c4109eaa363031fc06a2ff18-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-d-344270592c\" (UID: \"0f163b06c4109eaa363031fc06a2ff18\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-d-344270592c" Feb 12 19:47:19.583131 kubelet[1648]: E0212 19:47:19.583112 1648 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://146.190.157.125:6443/api/v1/nodes\": dial tcp 146.190.157.125:6443: connect: connection refused" node="ci-3510.3.2-d-344270592c" Feb 12 19:47:19.862414 kubelet[1648]: E0212 19:47:19.862244 1648 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:19.864845 env[1106]: time="2024-02-12T19:47:19.864235142Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-d-344270592c,Uid:0f163b06c4109eaa363031fc06a2ff18,Namespace:kube-system,Attempt:0,}" Feb 12 19:47:19.874320 kubelet[1648]: E0212 19:47:19.874275 1648 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:19.875666 env[1106]: time="2024-02-12T19:47:19.875581061Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-d-344270592c,Uid:a162ed5b9b09f2a9b4a9f604bbcb9033,Namespace:kube-system,Attempt:0,}" Feb 12 19:47:19.883149 kubelet[1648]: E0212 19:47:19.883108 1648 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:19.884437 env[1106]: time="2024-02-12T19:47:19.884374399Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-d-344270592c,Uid:8564f8fef888b4b9ddcea97a0bcb9696,Namespace:kube-system,Attempt:0,}" Feb 12 19:47:19.885620 kubelet[1648]: E0212 19:47:19.885581 1648 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://146.190.157.125:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-d-344270592c?timeout=10s": dial tcp 146.190.157.125:6443: connect: connection refused Feb 12 19:47:19.985772 kubelet[1648]: I0212 19:47:19.985665 1648 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-d-344270592c" Feb 12 19:47:19.986332 kubelet[1648]: E0212 19:47:19.986286 1648 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://146.190.157.125:6443/api/v1/nodes\": dial tcp 146.190.157.125:6443: connect: connection refused" node="ci-3510.3.2-d-344270592c" Feb 12 19:47:20.393341 kubelet[1648]: W0212 19:47:20.393190 1648 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://146.190.157.125:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 146.190.157.125:6443: connect: connection refused Feb 12 19:47:20.393341 kubelet[1648]: E0212 19:47:20.393289 1648 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://146.190.157.125:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 146.190.157.125:6443: connect: connection refused Feb 12 19:47:20.435181 kubelet[1648]: W0212 19:47:20.435125 1648 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://146.190.157.125:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 146.190.157.125:6443: connect: connection refused Feb 12 19:47:20.435181 kubelet[1648]: E0212 19:47:20.435175 1648 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://146.190.157.125:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 146.190.157.125:6443: connect: connection refused Feb 12 19:47:20.441896 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3131600088.mount: Deactivated successfully. Feb 12 19:47:20.452837 env[1106]: time="2024-02-12T19:47:20.452782130Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:20.454542 env[1106]: time="2024-02-12T19:47:20.454456854Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:20.463878 env[1106]: time="2024-02-12T19:47:20.463795528Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:20.470696 env[1106]: time="2024-02-12T19:47:20.470632008Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:20.474889 env[1106]: time="2024-02-12T19:47:20.474836978Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:20.479597 env[1106]: time="2024-02-12T19:47:20.479406674Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:20.489791 kubelet[1648]: W0212 19:47:20.487252 1648 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://146.190.157.125:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 146.190.157.125:6443: connect: connection refused Feb 12 19:47:20.489791 kubelet[1648]: E0212 19:47:20.489695 1648 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://146.190.157.125:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 146.190.157.125:6443: connect: connection refused Feb 12 19:47:20.490488 env[1106]: time="2024-02-12T19:47:20.490420731Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:20.496623 env[1106]: time="2024-02-12T19:47:20.496555993Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:20.497648 env[1106]: time="2024-02-12T19:47:20.497602366Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:20.507003 env[1106]: time="2024-02-12T19:47:20.506941732Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:20.507857 env[1106]: time="2024-02-12T19:47:20.507809238Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:20.509255 env[1106]: time="2024-02-12T19:47:20.509186554Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:20.579451 env[1106]: time="2024-02-12T19:47:20.579279214Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:47:20.579914 env[1106]: time="2024-02-12T19:47:20.579463237Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:47:20.579914 env[1106]: time="2024-02-12T19:47:20.579548407Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:47:20.580597 env[1106]: time="2024-02-12T19:47:20.580158558Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/61a06ef2c1f74a30115aaa0f4f7c8136dce6383621772e5489d2dd01a4e18947 pid=1727 runtime=io.containerd.runc.v2 Feb 12 19:47:20.581012 env[1106]: time="2024-02-12T19:47:20.580910491Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:47:20.581113 env[1106]: time="2024-02-12T19:47:20.581040919Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:47:20.581154 env[1106]: time="2024-02-12T19:47:20.581114621Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:47:20.581685 env[1106]: time="2024-02-12T19:47:20.581597625Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/64feb439e8e8276d876e49153d53aaf6d8859a5ade963f9d0cb12fb47bfa93d1 pid=1741 runtime=io.containerd.runc.v2 Feb 12 19:47:20.587192 env[1106]: time="2024-02-12T19:47:20.587069569Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:47:20.587192 env[1106]: time="2024-02-12T19:47:20.587126748Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:47:20.587192 env[1106]: time="2024-02-12T19:47:20.587145115Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:47:20.588132 env[1106]: time="2024-02-12T19:47:20.588044227Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ea08dbfde7c7e2fd47c8729d648adbc94a1a24a7703a2ccb5d30011e9ba429cb pid=1740 runtime=io.containerd.runc.v2 Feb 12 19:47:20.611539 systemd[1]: Started cri-containerd-64feb439e8e8276d876e49153d53aaf6d8859a5ade963f9d0cb12fb47bfa93d1.scope. Feb 12 19:47:20.644582 systemd[1]: Started cri-containerd-ea08dbfde7c7e2fd47c8729d648adbc94a1a24a7703a2ccb5d30011e9ba429cb.scope. Feb 12 19:47:20.656503 kernel: kauditd_printk_skb: 280 callbacks suppressed Feb 12 19:47:20.656668 kernel: audit: type=1400 audit(1707767240.651:608): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.656706 kernel: audit: type=1400 audit(1707767240.651:609): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.665701 kernel: audit: type=1400 audit(1707767240.651:610): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.670767 kernel: audit: type=1400 audit(1707767240.651:611): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.677765 kernel: audit: type=1400 audit(1707767240.651:612): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.682429 systemd[1]: Started cri-containerd-61a06ef2c1f74a30115aaa0f4f7c8136dce6383621772e5489d2dd01a4e18947.scope. Feb 12 19:47:20.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.689770 kernel: audit: type=1400 audit(1707767240.651:613): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.689964 kubelet[1648]: E0212 19:47:20.689695 1648 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: Get "https://146.190.157.125:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-d-344270592c?timeout=10s": dial tcp 146.190.157.125:6443: connect: connection refused Feb 12 19:47:20.690314 kubelet[1648]: W0212 19:47:20.690234 1648 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://146.190.157.125:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-d-344270592c&limit=500&resourceVersion=0": dial tcp 146.190.157.125:6443: connect: connection refused Feb 12 19:47:20.690409 kubelet[1648]: E0212 19:47:20.690350 1648 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://146.190.157.125:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-d-344270592c&limit=500&resourceVersion=0": dial tcp 146.190.157.125:6443: connect: connection refused Feb 12 19:47:20.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.695794 kernel: audit: type=1400 audit(1707767240.651:614): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.695949 kernel: audit: type=1400 audit(1707767240.651:615): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.707883 kernel: audit: type=1400 audit(1707767240.651:616): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.714127 kernel: audit: type=1400 audit(1707767240.655:617): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.655000 audit: BPF prog-id=61 op=LOAD Feb 12 19:47:20.663000 audit[1759]: AVC avc: denied { bpf } for pid=1759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.663000 audit[1759]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1741 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:20.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634666562343339653865383237366438373665343931353364353361 Feb 12 19:47:20.663000 audit[1759]: AVC avc: denied { perfmon } for pid=1759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.663000 audit[1759]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1741 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:20.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634666562343339653865383237366438373665343931353364353361 Feb 12 19:47:20.663000 audit[1759]: AVC avc: denied { bpf } for pid=1759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.663000 audit[1759]: AVC avc: denied { bpf } for pid=1759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.663000 audit[1759]: AVC avc: denied { bpf } for pid=1759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.663000 audit[1759]: AVC avc: denied { perfmon } for pid=1759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.663000 audit[1759]: AVC avc: denied { perfmon } for pid=1759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.663000 audit[1759]: AVC avc: denied { perfmon } for pid=1759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.663000 audit[1759]: AVC avc: denied { perfmon } for pid=1759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.663000 audit[1759]: AVC avc: denied { perfmon } for pid=1759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.663000 audit[1759]: AVC avc: denied { bpf } for pid=1759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.663000 audit[1759]: AVC avc: denied { bpf } for pid=1759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.663000 audit: BPF prog-id=62 op=LOAD Feb 12 19:47:20.663000 audit[1759]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003c07c0 items=0 ppid=1741 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:20.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634666562343339653865383237366438373665343931353364353361 Feb 12 19:47:20.664000 audit[1759]: AVC avc: denied { bpf } for pid=1759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.664000 audit[1759]: AVC avc: denied { bpf } for pid=1759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.664000 audit[1759]: AVC avc: denied { perfmon } for pid=1759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.664000 audit[1759]: AVC avc: denied { perfmon } for pid=1759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.664000 audit[1759]: AVC avc: denied { perfmon } for pid=1759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.664000 audit[1759]: AVC avc: denied { perfmon } for pid=1759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.664000 audit[1759]: AVC avc: denied { perfmon } for pid=1759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.664000 audit[1759]: AVC avc: denied { bpf } for pid=1759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.664000 audit[1759]: AVC avc: denied { bpf } for pid=1759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.664000 audit: BPF prog-id=63 op=LOAD Feb 12 19:47:20.664000 audit[1759]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003c0808 items=0 ppid=1741 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:20.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634666562343339653865383237366438373665343931353364353361 Feb 12 19:47:20.664000 audit: BPF prog-id=63 op=UNLOAD Feb 12 19:47:20.664000 audit: BPF prog-id=62 op=UNLOAD Feb 12 19:47:20.664000 audit[1759]: AVC avc: denied { bpf } for pid=1759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.664000 audit[1759]: AVC avc: denied { bpf } for pid=1759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.664000 audit[1759]: AVC avc: denied { bpf } for pid=1759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.664000 audit[1759]: AVC avc: denied { perfmon } for pid=1759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.664000 audit[1759]: AVC avc: denied { perfmon } for pid=1759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.664000 audit[1759]: AVC avc: denied { perfmon } for pid=1759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.664000 audit[1759]: AVC avc: denied { perfmon } for pid=1759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.664000 audit[1759]: AVC avc: denied { perfmon } for pid=1759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.664000 audit[1759]: AVC avc: denied { bpf } for pid=1759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.664000 audit[1759]: AVC avc: denied { bpf } for pid=1759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.664000 audit: BPF prog-id=64 op=LOAD Feb 12 19:47:20.664000 audit[1759]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c0c18 items=0 ppid=1741 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:20.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634666562343339653865383237366438373665343931353364353361 Feb 12 19:47:20.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.711000 audit: BPF prog-id=65 op=LOAD Feb 12 19:47:20.716000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.716000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1740 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:20.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561303864626664653763376532666434376338373239643634386164 Feb 12 19:47:20.716000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.716000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1740 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:20.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561303864626664653763376532666434376338373239643634386164 Feb 12 19:47:20.718000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.718000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.718000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.718000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.718000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.718000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.718000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.718000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.718000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.718000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.718000 audit: BPF prog-id=66 op=LOAD Feb 12 19:47:20.718000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002d1f90 items=0 ppid=1740 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:20.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561303864626664653763376532666434376338373239643634386164 Feb 12 19:47:20.718000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.718000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.718000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.718000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.718000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.718000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.718000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.718000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.718000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.718000 audit: BPF prog-id=67 op=LOAD Feb 12 19:47:20.718000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002d1fd8 items=0 ppid=1740 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:20.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561303864626664653763376532666434376338373239643634386164 Feb 12 19:47:20.720000 audit: BPF prog-id=67 op=UNLOAD Feb 12 19:47:20.720000 audit: BPF prog-id=66 op=UNLOAD Feb 12 19:47:20.720000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.720000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.720000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.720000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.720000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.720000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.720000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.720000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.720000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.720000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.720000 audit: BPF prog-id=68 op=LOAD Feb 12 19:47:20.720000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d43e8 items=0 ppid=1740 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:20.720000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561303864626664653763376532666434376338373239643634386164 Feb 12 19:47:20.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.736000 audit: BPF prog-id=69 op=LOAD Feb 12 19:47:20.737000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.737000 audit[1770]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001fbc48 a2=10 a3=1c items=0 ppid=1727 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:20.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631613036656632633166373461333031313561616130663466376338 Feb 12 19:47:20.737000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.737000 audit[1770]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001fb6b0 a2=3c a3=c items=0 ppid=1727 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:20.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631613036656632633166373461333031313561616130663466376338 Feb 12 19:47:20.737000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.737000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.737000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.737000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.737000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.737000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.737000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.737000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.737000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.737000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.737000 audit: BPF prog-id=70 op=LOAD Feb 12 19:47:20.737000 audit[1770]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001fb9d8 a2=78 a3=c000392700 items=0 ppid=1727 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:20.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631613036656632633166373461333031313561616130663466376338 Feb 12 19:47:20.737000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.737000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.737000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.737000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.737000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.737000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.737000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.737000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.737000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.737000 audit: BPF prog-id=71 op=LOAD Feb 12 19:47:20.737000 audit[1770]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001fb770 a2=78 a3=c000392748 items=0 ppid=1727 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:20.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631613036656632633166373461333031313561616130663466376338 Feb 12 19:47:20.737000 audit: BPF prog-id=71 op=UNLOAD Feb 12 19:47:20.737000 audit: BPF prog-id=70 op=UNLOAD Feb 12 19:47:20.737000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.737000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.737000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.737000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.737000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.737000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.737000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.737000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.737000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.737000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.737000 audit: BPF prog-id=72 op=LOAD Feb 12 19:47:20.737000 audit[1770]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001fbc30 a2=78 a3=c000392b58 items=0 ppid=1727 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:20.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631613036656632633166373461333031313561616130663466376338 Feb 12 19:47:20.780462 env[1106]: time="2024-02-12T19:47:20.780354102Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-d-344270592c,Uid:a162ed5b9b09f2a9b4a9f604bbcb9033,Namespace:kube-system,Attempt:0,} returns sandbox id \"64feb439e8e8276d876e49153d53aaf6d8859a5ade963f9d0cb12fb47bfa93d1\"" Feb 12 19:47:20.782402 kubelet[1648]: E0212 19:47:20.782342 1648 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:20.787047 env[1106]: time="2024-02-12T19:47:20.786980918Z" level=info msg="CreateContainer within sandbox \"64feb439e8e8276d876e49153d53aaf6d8859a5ade963f9d0cb12fb47bfa93d1\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 12 19:47:20.791737 kubelet[1648]: I0212 19:47:20.791667 1648 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-d-344270592c" Feb 12 19:47:20.792185 kubelet[1648]: E0212 19:47:20.792066 1648 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://146.190.157.125:6443/api/v1/nodes\": dial tcp 146.190.157.125:6443: connect: connection refused" node="ci-3510.3.2-d-344270592c" Feb 12 19:47:20.807405 env[1106]: time="2024-02-12T19:47:20.807327287Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-d-344270592c,Uid:0f163b06c4109eaa363031fc06a2ff18,Namespace:kube-system,Attempt:0,} returns sandbox id \"61a06ef2c1f74a30115aaa0f4f7c8136dce6383621772e5489d2dd01a4e18947\"" Feb 12 19:47:20.808562 kubelet[1648]: E0212 19:47:20.808523 1648 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:20.811937 env[1106]: time="2024-02-12T19:47:20.811875769Z" level=info msg="CreateContainer within sandbox \"61a06ef2c1f74a30115aaa0f4f7c8136dce6383621772e5489d2dd01a4e18947\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 12 19:47:20.817563 env[1106]: time="2024-02-12T19:47:20.817475611Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-d-344270592c,Uid:8564f8fef888b4b9ddcea97a0bcb9696,Namespace:kube-system,Attempt:0,} returns sandbox id \"ea08dbfde7c7e2fd47c8729d648adbc94a1a24a7703a2ccb5d30011e9ba429cb\"" Feb 12 19:47:20.819058 kubelet[1648]: E0212 19:47:20.819022 1648 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:20.822702 env[1106]: time="2024-02-12T19:47:20.822642865Z" level=info msg="CreateContainer within sandbox \"ea08dbfde7c7e2fd47c8729d648adbc94a1a24a7703a2ccb5d30011e9ba429cb\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 12 19:47:20.825289 kubelet[1648]: E0212 19:47:20.825070 1648 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-d-344270592c.17b33541877c434c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-d-344270592c", UID:"ci-3510.3.2-d-344270592c", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-d-344270592c"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 47, 19, 265764172, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 47, 19, 265764172, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://146.190.157.125:6443/api/v1/namespaces/default/events": dial tcp 146.190.157.125:6443: connect: connection refused'(may retry after sleeping) Feb 12 19:47:20.839343 env[1106]: time="2024-02-12T19:47:20.839249504Z" level=info msg="CreateContainer within sandbox \"64feb439e8e8276d876e49153d53aaf6d8859a5ade963f9d0cb12fb47bfa93d1\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"7174659e3d647a36295c7ad5c90ea43c6ec478b19d3ae7dda5618ad57e5261c5\"" Feb 12 19:47:20.840578 env[1106]: time="2024-02-12T19:47:20.840499489Z" level=info msg="StartContainer for \"7174659e3d647a36295c7ad5c90ea43c6ec478b19d3ae7dda5618ad57e5261c5\"" Feb 12 19:47:20.847833 env[1106]: time="2024-02-12T19:47:20.847778307Z" level=info msg="CreateContainer within sandbox \"61a06ef2c1f74a30115aaa0f4f7c8136dce6383621772e5489d2dd01a4e18947\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"19ca109916d3e4b97c106c818b8ee2229382668114b1b6deec135f7736333227\"" Feb 12 19:47:20.848906 env[1106]: time="2024-02-12T19:47:20.848866135Z" level=info msg="StartContainer for \"19ca109916d3e4b97c106c818b8ee2229382668114b1b6deec135f7736333227\"" Feb 12 19:47:20.861456 env[1106]: time="2024-02-12T19:47:20.861350792Z" level=info msg="CreateContainer within sandbox \"ea08dbfde7c7e2fd47c8729d648adbc94a1a24a7703a2ccb5d30011e9ba429cb\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"d03e440a325bf25a0d96f01847c1f7fe70bff07c383ffecd97ac4d4b3a6c46f6\"" Feb 12 19:47:20.862173 env[1106]: time="2024-02-12T19:47:20.862108268Z" level=info msg="StartContainer for \"d03e440a325bf25a0d96f01847c1f7fe70bff07c383ffecd97ac4d4b3a6c46f6\"" Feb 12 19:47:20.886773 systemd[1]: Started cri-containerd-7174659e3d647a36295c7ad5c90ea43c6ec478b19d3ae7dda5618ad57e5261c5.scope. Feb 12 19:47:20.909168 systemd[1]: Started cri-containerd-19ca109916d3e4b97c106c818b8ee2229382668114b1b6deec135f7736333227.scope. Feb 12 19:47:20.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.940000 audit: BPF prog-id=73 op=LOAD Feb 12 19:47:20.941000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.941000 audit[1849]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001cdc48 a2=10 a3=1c items=0 ppid=1741 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:20.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731373436353965336436343761333632393563376164356339306561 Feb 12 19:47:20.941000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.941000 audit[1849]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001cd6b0 a2=3c a3=8 items=0 ppid=1741 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:20.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731373436353965336436343761333632393563376164356339306561 Feb 12 19:47:20.941000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.941000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.941000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.941000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.941000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.941000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.941000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.941000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.941000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.941000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.941000 audit: BPF prog-id=74 op=LOAD Feb 12 19:47:20.941000 audit[1849]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001cd9d8 a2=78 a3=c000286f00 items=0 ppid=1741 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:20.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731373436353965336436343761333632393563376164356339306561 Feb 12 19:47:20.941000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.941000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.941000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.941000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.941000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.941000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.941000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.941000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.941000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.941000 audit: BPF prog-id=75 op=LOAD Feb 12 19:47:20.941000 audit[1849]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001cd770 a2=78 a3=c000286f48 items=0 ppid=1741 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:20.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731373436353965336436343761333632393563376164356339306561 Feb 12 19:47:20.942000 audit: BPF prog-id=75 op=UNLOAD Feb 12 19:47:20.942000 audit: BPF prog-id=74 op=UNLOAD Feb 12 19:47:20.942000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.942000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.942000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.942000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.942000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.942000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.942000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.942000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.942000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.942000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.942000 audit: BPF prog-id=76 op=LOAD Feb 12 19:47:20.942000 audit[1849]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001cdc30 a2=78 a3=c000287358 items=0 ppid=1741 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:20.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731373436353965336436343761333632393563376164356339306561 Feb 12 19:47:20.956690 systemd[1]: Started cri-containerd-d03e440a325bf25a0d96f01847c1f7fe70bff07c383ffecd97ac4d4b3a6c46f6.scope. Feb 12 19:47:20.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.963000 audit: BPF prog-id=77 op=LOAD Feb 12 19:47:20.964000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.964000 audit[1867]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1727 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:20.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139636131303939313664336534623937633130366338313862386565 Feb 12 19:47:20.964000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.964000 audit[1867]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1727 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:20.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139636131303939313664336534623937633130366338313862386565 Feb 12 19:47:20.964000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.964000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.964000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.964000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.964000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.964000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.964000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.964000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.964000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.964000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.964000 audit: BPF prog-id=78 op=LOAD Feb 12 19:47:20.964000 audit[1867]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000255df0 items=0 ppid=1727 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:20.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139636131303939313664336534623937633130366338313862386565 Feb 12 19:47:20.964000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.964000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.964000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.964000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.964000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.964000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.964000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.964000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.964000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.964000 audit: BPF prog-id=79 op=LOAD Feb 12 19:47:20.964000 audit[1867]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000255e38 items=0 ppid=1727 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:20.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139636131303939313664336534623937633130366338313862386565 Feb 12 19:47:20.965000 audit: BPF prog-id=79 op=UNLOAD Feb 12 19:47:20.965000 audit: BPF prog-id=78 op=UNLOAD Feb 12 19:47:20.965000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.965000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.965000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.965000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.965000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.965000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.965000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.965000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.965000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.965000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:20.965000 audit: BPF prog-id=80 op=LOAD Feb 12 19:47:20.965000 audit[1867]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c0248 items=0 ppid=1727 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:20.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139636131303939313664336534623937633130366338313862386565 Feb 12 19:47:21.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.015000 audit: BPF prog-id=81 op=LOAD Feb 12 19:47:21.016000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.016000 audit[1887]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1740 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:21.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430336534343061333235626632356130643936663031383437633166 Feb 12 19:47:21.016000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.016000 audit[1887]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1740 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:21.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430336534343061333235626632356130643936663031383437633166 Feb 12 19:47:21.016000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.016000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.016000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.016000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.016000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.016000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.016000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.016000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.016000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.016000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.016000 audit: BPF prog-id=82 op=LOAD Feb 12 19:47:21.016000 audit[1887]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000387290 items=0 ppid=1740 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:21.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430336534343061333235626632356130643936663031383437633166 Feb 12 19:47:21.016000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.016000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.016000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.016000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.016000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.016000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.016000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.016000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.016000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.016000 audit: BPF prog-id=83 op=LOAD Feb 12 19:47:21.016000 audit[1887]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003872d8 items=0 ppid=1740 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:21.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430336534343061333235626632356130643936663031383437633166 Feb 12 19:47:21.016000 audit: BPF prog-id=83 op=UNLOAD Feb 12 19:47:21.016000 audit: BPF prog-id=82 op=UNLOAD Feb 12 19:47:21.016000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.016000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.016000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.016000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.016000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.016000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.016000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.016000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.016000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.016000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:21.016000 audit: BPF prog-id=84 op=LOAD Feb 12 19:47:21.016000 audit[1887]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003876e8 items=0 ppid=1740 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:21.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430336534343061333235626632356130643936663031383437633166 Feb 12 19:47:21.052132 env[1106]: time="2024-02-12T19:47:21.052067698Z" level=info msg="StartContainer for \"19ca109916d3e4b97c106c818b8ee2229382668114b1b6deec135f7736333227\" returns successfully" Feb 12 19:47:21.061861 env[1106]: time="2024-02-12T19:47:21.061811656Z" level=info msg="StartContainer for \"7174659e3d647a36295c7ad5c90ea43c6ec478b19d3ae7dda5618ad57e5261c5\" returns successfully" Feb 12 19:47:21.086568 env[1106]: time="2024-02-12T19:47:21.086475284Z" level=info msg="StartContainer for \"d03e440a325bf25a0d96f01847c1f7fe70bff07c383ffecd97ac4d4b3a6c46f6\" returns successfully" Feb 12 19:47:21.331176 kubelet[1648]: E0212 19:47:21.331129 1648 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://146.190.157.125:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 146.190.157.125:6443: connect: connection refused Feb 12 19:47:21.448923 kubelet[1648]: E0212 19:47:21.448882 1648 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:21.449447 kubelet[1648]: I0212 19:47:21.449360 1648 status_manager.go:698] "Failed to get status for pod" podUID=0f163b06c4109eaa363031fc06a2ff18 pod="kube-system/kube-controller-manager-ci-3510.3.2-d-344270592c" err="Get \"https://146.190.157.125:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ci-3510.3.2-d-344270592c\": dial tcp 146.190.157.125:6443: connect: connection refused" Feb 12 19:47:21.453038 kubelet[1648]: E0212 19:47:21.453003 1648 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:21.453550 kubelet[1648]: I0212 19:47:21.453517 1648 status_manager.go:698] "Failed to get status for pod" podUID=a162ed5b9b09f2a9b4a9f604bbcb9033 pod="kube-system/kube-apiserver-ci-3510.3.2-d-344270592c" err="Get \"https://146.190.157.125:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ci-3510.3.2-d-344270592c\": dial tcp 146.190.157.125:6443: connect: connection refused" Feb 12 19:47:21.456350 kubelet[1648]: E0212 19:47:21.456303 1648 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:21.465223 kubelet[1648]: I0212 19:47:21.465179 1648 status_manager.go:698] "Failed to get status for pod" podUID=8564f8fef888b4b9ddcea97a0bcb9696 pod="kube-system/kube-scheduler-ci-3510.3.2-d-344270592c" err="Get \"https://146.190.157.125:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ci-3510.3.2-d-344270592c\": dial tcp 146.190.157.125:6443: connect: connection refused" Feb 12 19:47:22.184000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:22.184000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e54000 a2=fc6 a3=0 items=0 ppid=1727 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 key=(null) Feb 12 19:47:22.184000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:47:22.184000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:22.184000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e48040 a2=fc6 a3=0 items=0 ppid=1727 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 key=(null) Feb 12 19:47:22.184000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:47:22.394015 kubelet[1648]: I0212 19:47:22.393975 1648 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-d-344270592c" Feb 12 19:47:22.458698 kubelet[1648]: E0212 19:47:22.458524 1648 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:22.459390 kubelet[1648]: E0212 19:47:22.459369 1648 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:22.460677 kubelet[1648]: E0212 19:47:22.460637 1648 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:23.460133 kubelet[1648]: E0212 19:47:23.460094 1648 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:25.047000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:25.047000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c003eaa000 a2=fc6 a3=0 items=0 ppid=1741 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 key=(null) Feb 12 19:47:25.047000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135372E313235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F Feb 12 19:47:25.047000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:25.047000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c002777f40 a2=fc6 a3=0 items=0 ppid=1741 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 key=(null) Feb 12 19:47:25.047000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135372E313235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F Feb 12 19:47:25.048000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:25.048000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c003eaa780 a2=fc6 a3=0 items=0 ppid=1741 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 key=(null) Feb 12 19:47:25.048000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135372E313235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F Feb 12 19:47:25.056000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:25.056000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0028af4a0 a2=fc6 a3=0 items=0 ppid=1741 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 key=(null) Feb 12 19:47:25.056000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135372E313235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F Feb 12 19:47:25.056000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:25.056000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c003ed7bf0 a2=fc6 a3=0 items=0 ppid=1741 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 key=(null) Feb 12 19:47:25.056000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135372E313235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F Feb 12 19:47:25.057000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:25.057000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c003ed7dd0 a2=fc6 a3=0 items=0 ppid=1741 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 key=(null) Feb 12 19:47:25.057000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135372E313235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F Feb 12 19:47:25.204447 kubelet[1648]: E0212 19:47:25.204406 1648 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.2-d-344270592c\" not found" node="ci-3510.3.2-d-344270592c" Feb 12 19:47:25.234359 kubelet[1648]: I0212 19:47:25.234300 1648 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-d-344270592c" Feb 12 19:47:25.275474 kubelet[1648]: I0212 19:47:25.275413 1648 apiserver.go:52] "Watching apiserver" Feb 12 19:47:25.382230 kubelet[1648]: I0212 19:47:25.382064 1648 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 19:47:25.421346 kubelet[1648]: I0212 19:47:25.421248 1648 reconciler.go:41] "Reconciler: start to sync state" Feb 12 19:47:27.355050 kubelet[1648]: E0212 19:47:27.354996 1648 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:27.473764 kubelet[1648]: E0212 19:47:27.473565 1648 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:27.650581 kubelet[1648]: E0212 19:47:27.650440 1648 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:27.770197 kubelet[1648]: E0212 19:47:27.770155 1648 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:28.132571 update_engine[1094]: I0212 19:47:28.132344 1094 update_attempter.cc:509] Updating boot flags... Feb 12 19:47:28.476907 kubelet[1648]: E0212 19:47:28.476073 1648 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:28.477831 kubelet[1648]: E0212 19:47:28.477740 1648 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:28.891177 systemd[1]: Reloading. Feb 12 19:47:29.104443 /usr/lib/systemd/system-generators/torcx-generator[1983]: time="2024-02-12T19:47:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:47:29.104500 /usr/lib/systemd/system-generators/torcx-generator[1983]: time="2024-02-12T19:47:29Z" level=info msg="torcx already run" Feb 12 19:47:29.288320 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:47:29.288360 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:47:29.322811 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:47:29.498628 kernel: kauditd_printk_skb: 356 callbacks suppressed Feb 12 19:47:29.498903 kernel: audit: type=1400 audit(1707767249.488:724): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.498954 kernel: audit: type=1400 audit(1707767249.488:725): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.503850 kernel: audit: type=1400 audit(1707767249.488:726): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.507167 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 19:47:29.507394 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 12 19:47:29.507432 kernel: audit: backlog limit exceeded Feb 12 19:47:29.511659 kernel: audit: type=1400 audit(1707767249.488:727): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.519782 kernel: audit: type=1400 audit(1707767249.488:728): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.519937 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 19:47:29.521168 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Feb 12 19:47:29.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.493000 audit: BPF prog-id=85 op=LOAD Feb 12 19:47:29.493000 audit: BPF prog-id=61 op=UNLOAD Feb 12 19:47:29.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.497000 audit: BPF prog-id=86 op=LOAD Feb 12 19:47:29.497000 audit: BPF prog-id=46 op=UNLOAD Feb 12 19:47:29.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.501000 audit: BPF prog-id=87 op=LOAD Feb 12 19:47:29.501000 audit: BPF prog-id=47 op=UNLOAD Feb 12 19:47:29.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.501000 audit: BPF prog-id=88 op=LOAD Feb 12 19:47:29.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.501000 audit: BPF prog-id=89 op=LOAD Feb 12 19:47:29.501000 audit: BPF prog-id=48 op=UNLOAD Feb 12 19:47:29.501000 audit: BPF prog-id=49 op=UNLOAD Feb 12 19:47:29.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.503000 audit: BPF prog-id=90 op=LOAD Feb 12 19:47:29.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.521000 audit: BPF prog-id=94 op=LOAD Feb 12 19:47:29.522000 audit: BPF prog-id=53 op=UNLOAD Feb 12 19:47:29.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.523000 audit: BPF prog-id=95 op=LOAD Feb 12 19:47:29.523000 audit: BPF prog-id=69 op=UNLOAD Feb 12 19:47:29.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.524000 audit: BPF prog-id=96 op=LOAD Feb 12 19:47:29.524000 audit: BPF prog-id=81 op=UNLOAD Feb 12 19:47:29.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.528000 audit: BPF prog-id=97 op=LOAD Feb 12 19:47:29.528000 audit: BPF prog-id=65 op=UNLOAD Feb 12 19:47:29.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.529000 audit: BPF prog-id=98 op=LOAD Feb 12 19:47:29.529000 audit: BPF prog-id=73 op=UNLOAD Feb 12 19:47:29.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.530000 audit: BPF prog-id=99 op=LOAD Feb 12 19:47:29.530000 audit: BPF prog-id=54 op=UNLOAD Feb 12 19:47:29.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.532000 audit: BPF prog-id=100 op=LOAD Feb 12 19:47:29.532000 audit: BPF prog-id=55 op=UNLOAD Feb 12 19:47:29.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.533000 audit: BPF prog-id=101 op=LOAD Feb 12 19:47:29.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.533000 audit: BPF prog-id=102 op=LOAD Feb 12 19:47:29.533000 audit: BPF prog-id=56 op=UNLOAD Feb 12 19:47:29.533000 audit: BPF prog-id=57 op=UNLOAD Feb 12 19:47:29.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.534000 audit: BPF prog-id=103 op=LOAD Feb 12 19:47:29.534000 audit: BPF prog-id=58 op=UNLOAD Feb 12 19:47:29.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.535000 audit: BPF prog-id=104 op=LOAD Feb 12 19:47:29.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.535000 audit: BPF prog-id=105 op=LOAD Feb 12 19:47:29.535000 audit: BPF prog-id=59 op=UNLOAD Feb 12 19:47:29.535000 audit: BPF prog-id=60 op=UNLOAD Feb 12 19:47:29.575000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:29.575000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0008ec4c0 a2=fc6 a3=0 items=0 ppid=1727 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 key=(null) Feb 12 19:47:29.575000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:47:29.586242 systemd[1]: Stopping kubelet.service... Feb 12 19:47:29.592000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:29.592000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0008ec600 a2=fc6 a3=0 items=0 ppid=1727 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 key=(null) Feb 12 19:47:29.592000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:47:29.596264 systemd[1]: kubelet.service: Deactivated successfully. Feb 12 19:47:29.596565 systemd[1]: Stopped kubelet.service. Feb 12 19:47:29.596641 systemd[1]: kubelet.service: Consumed 1.632s CPU time. Feb 12 19:47:29.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:29.599842 systemd[1]: Started kubelet.service. Feb 12 19:47:29.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:29.605000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:29.605000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0008ec740 a2=fc6 a3=0 items=0 ppid=1727 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 key=(null) Feb 12 19:47:29.605000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:47:29.612000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:29.612000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0008ec860 a2=fc6 a3=0 items=0 ppid=1727 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 key=(null) Feb 12 19:47:29.612000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:47:29.822867 kubelet[2029]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 19:47:29.827476 kubelet[2029]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:47:29.827476 kubelet[2029]: I0212 19:47:29.826771 2029 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 19:47:29.832941 kubelet[2029]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 19:47:29.832941 kubelet[2029]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:47:29.844304 kubelet[2029]: I0212 19:47:29.844261 2029 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 12 19:47:29.844510 kubelet[2029]: I0212 19:47:29.844496 2029 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 19:47:29.845096 kubelet[2029]: I0212 19:47:29.845059 2029 server.go:836] "Client rotation is on, will bootstrap in background" Feb 12 19:47:29.848192 kubelet[2029]: I0212 19:47:29.848157 2029 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 12 19:47:29.850101 kubelet[2029]: I0212 19:47:29.849994 2029 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:47:29.858108 kubelet[2029]: I0212 19:47:29.858056 2029 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 19:47:29.858802 kubelet[2029]: I0212 19:47:29.858770 2029 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 19:47:29.859137 kubelet[2029]: I0212 19:47:29.859116 2029 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 19:47:29.859356 kubelet[2029]: I0212 19:47:29.859336 2029 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 19:47:29.859476 kubelet[2029]: I0212 19:47:29.859461 2029 container_manager_linux.go:308] "Creating device plugin manager" Feb 12 19:47:29.859620 kubelet[2029]: I0212 19:47:29.859605 2029 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:47:29.870162 kubelet[2029]: I0212 19:47:29.870123 2029 kubelet.go:398] "Attempting to sync node with API server" Feb 12 19:47:29.870404 kubelet[2029]: I0212 19:47:29.870388 2029 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 19:47:29.870535 kubelet[2029]: I0212 19:47:29.870522 2029 kubelet.go:297] "Adding apiserver pod source" Feb 12 19:47:29.870697 kubelet[2029]: I0212 19:47:29.870682 2029 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 19:47:29.877379 kubelet[2029]: I0212 19:47:29.875268 2029 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 19:47:29.877379 kubelet[2029]: I0212 19:47:29.876564 2029 server.go:1186] "Started kubelet" Feb 12 19:47:29.892000 audit[2029]: AVC avc: denied { mac_admin } for pid=2029 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.892000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:47:29.892000 audit[2029]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bf93b0 a1=c000b4e6c0 a2=c000bf9380 a3=25 items=0 ppid=1 pid=2029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:29.892000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:47:29.898000 audit[2029]: AVC avc: denied { mac_admin } for pid=2029 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:29.898000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:47:29.898000 audit[2029]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e219e0 a1=c000b4e6d8 a2=c000bf9440 a3=25 items=0 ppid=1 pid=2029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:29.898000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:47:29.901953 kubelet[2029]: I0212 19:47:29.900315 2029 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 19:47:29.901953 kubelet[2029]: I0212 19:47:29.900434 2029 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 19:47:29.901953 kubelet[2029]: I0212 19:47:29.900485 2029 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 19:47:29.903642 kubelet[2029]: I0212 19:47:29.902309 2029 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 19:47:29.903642 kubelet[2029]: I0212 19:47:29.903343 2029 server.go:451] "Adding debug handlers to kubelet server" Feb 12 19:47:29.922255 kubelet[2029]: I0212 19:47:29.922201 2029 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 12 19:47:29.923501 kubelet[2029]: E0212 19:47:29.923464 2029 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 19:47:29.924974 kubelet[2029]: E0212 19:47:29.924937 2029 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 19:47:29.938579 kubelet[2029]: I0212 19:47:29.938525 2029 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 19:47:30.027010 kubelet[2029]: I0212 19:47:30.026507 2029 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-d-344270592c" Feb 12 19:47:30.073631 kubelet[2029]: I0212 19:47:30.073482 2029 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.2-d-344270592c" Feb 12 19:47:30.076770 kubelet[2029]: I0212 19:47:30.076247 2029 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-d-344270592c" Feb 12 19:47:30.144796 kubelet[2029]: I0212 19:47:30.138521 2029 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 19:47:30.146000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=525104 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 19:47:30.146000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000daa380 a2=fc6 a3=0 items=0 ppid=1727 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 key=(null) Feb 12 19:47:30.146000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:47:30.205202 kubelet[2029]: I0212 19:47:30.205140 2029 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 19:47:30.205202 kubelet[2029]: I0212 19:47:30.205178 2029 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 19:47:30.205202 kubelet[2029]: I0212 19:47:30.205212 2029 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:47:30.205988 kubelet[2029]: I0212 19:47:30.205947 2029 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 12 19:47:30.205988 kubelet[2029]: I0212 19:47:30.205986 2029 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 12 19:47:30.205988 kubelet[2029]: I0212 19:47:30.205998 2029 policy_none.go:49] "None policy: Start" Feb 12 19:47:30.207906 kubelet[2029]: I0212 19:47:30.207844 2029 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 19:47:30.207906 kubelet[2029]: I0212 19:47:30.207912 2029 state_mem.go:35] "Initializing new in-memory state store" Feb 12 19:47:30.208915 kubelet[2029]: I0212 19:47:30.208873 2029 state_mem.go:75] "Updated machine memory state" Feb 12 19:47:30.226554 kubelet[2029]: I0212 19:47:30.226502 2029 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 19:47:30.226883 kubelet[2029]: I0212 19:47:30.226595 2029 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 19:47:30.224000 audit[2029]: AVC avc: denied { mac_admin } for pid=2029 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:30.224000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:47:30.224000 audit[2029]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0002ff830 a1=c000785848 a2=c0002ff7d0 a3=25 items=0 ppid=1 pid=2029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:30.224000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:47:30.229424 kubelet[2029]: I0212 19:47:30.229383 2029 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 19:47:30.283535 kubelet[2029]: I0212 19:47:30.283498 2029 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 19:47:30.283807 kubelet[2029]: I0212 19:47:30.283787 2029 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 12 19:47:30.287009 kubelet[2029]: I0212 19:47:30.286963 2029 kubelet.go:2113] "Starting kubelet main sync loop" Feb 12 19:47:30.287336 kubelet[2029]: E0212 19:47:30.287313 2029 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 12 19:47:30.388054 kubelet[2029]: I0212 19:47:30.387906 2029 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:47:30.388564 kubelet[2029]: I0212 19:47:30.388511 2029 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:47:30.391277 kubelet[2029]: I0212 19:47:30.389570 2029 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:47:30.419559 kubelet[2029]: E0212 19:47:30.419515 2029 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.2-d-344270592c\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.2-d-344270592c" Feb 12 19:47:30.420456 kubelet[2029]: E0212 19:47:30.420313 2029 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.2-d-344270592c\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.2-d-344270592c" Feb 12 19:47:30.421167 kubelet[2029]: E0212 19:47:30.421122 2029 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-d-344270592c\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.2-d-344270592c" Feb 12 19:47:30.446790 kubelet[2029]: I0212 19:47:30.446744 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0f163b06c4109eaa363031fc06a2ff18-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-d-344270592c\" (UID: \"0f163b06c4109eaa363031fc06a2ff18\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-d-344270592c" Feb 12 19:47:30.447210 kubelet[2029]: I0212 19:47:30.447180 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0f163b06c4109eaa363031fc06a2ff18-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-d-344270592c\" (UID: \"0f163b06c4109eaa363031fc06a2ff18\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-d-344270592c" Feb 12 19:47:30.447421 kubelet[2029]: I0212 19:47:30.447404 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0f163b06c4109eaa363031fc06a2ff18-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-d-344270592c\" (UID: \"0f163b06c4109eaa363031fc06a2ff18\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-d-344270592c" Feb 12 19:47:30.447621 kubelet[2029]: I0212 19:47:30.447604 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a162ed5b9b09f2a9b4a9f604bbcb9033-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-d-344270592c\" (UID: \"a162ed5b9b09f2a9b4a9f604bbcb9033\") " pod="kube-system/kube-apiserver-ci-3510.3.2-d-344270592c" Feb 12 19:47:30.447832 kubelet[2029]: I0212 19:47:30.447816 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a162ed5b9b09f2a9b4a9f604bbcb9033-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-d-344270592c\" (UID: \"a162ed5b9b09f2a9b4a9f604bbcb9033\") " pod="kube-system/kube-apiserver-ci-3510.3.2-d-344270592c" Feb 12 19:47:30.447994 kubelet[2029]: I0212 19:47:30.447979 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0f163b06c4109eaa363031fc06a2ff18-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-d-344270592c\" (UID: \"0f163b06c4109eaa363031fc06a2ff18\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-d-344270592c" Feb 12 19:47:30.448134 kubelet[2029]: I0212 19:47:30.448122 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8564f8fef888b4b9ddcea97a0bcb9696-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-d-344270592c\" (UID: \"8564f8fef888b4b9ddcea97a0bcb9696\") " pod="kube-system/kube-scheduler-ci-3510.3.2-d-344270592c" Feb 12 19:47:30.448233 kubelet[2029]: I0212 19:47:30.448223 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a162ed5b9b09f2a9b4a9f604bbcb9033-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-d-344270592c\" (UID: \"a162ed5b9b09f2a9b4a9f604bbcb9033\") " pod="kube-system/kube-apiserver-ci-3510.3.2-d-344270592c" Feb 12 19:47:30.448330 kubelet[2029]: I0212 19:47:30.448320 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/0f163b06c4109eaa363031fc06a2ff18-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-d-344270592c\" (UID: \"0f163b06c4109eaa363031fc06a2ff18\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-d-344270592c" Feb 12 19:47:30.723796 kubelet[2029]: E0212 19:47:30.722759 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:30.725489 kubelet[2029]: E0212 19:47:30.725453 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:30.726025 kubelet[2029]: E0212 19:47:30.725984 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:30.891232 kubelet[2029]: I0212 19:47:30.891177 2029 apiserver.go:52] "Watching apiserver" Feb 12 19:47:30.939800 kubelet[2029]: I0212 19:47:30.939690 2029 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 19:47:30.950485 kubelet[2029]: I0212 19:47:30.950437 2029 reconciler.go:41] "Reconciler: start to sync state" Feb 12 19:47:31.310166 kubelet[2029]: E0212 19:47:31.310132 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:31.311197 kubelet[2029]: E0212 19:47:31.311035 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:31.338567 kubelet[2029]: E0212 19:47:31.338528 2029 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-d-344270592c\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.2-d-344270592c" Feb 12 19:47:31.339598 kubelet[2029]: E0212 19:47:31.339555 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:31.488459 kubelet[2029]: I0212 19:47:31.488339 2029 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.2-d-344270592c" podStartSLOduration=4.48776925 pod.CreationTimestamp="2024-02-12 19:47:27 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:47:31.484397392 +0000 UTC m=+1.862588280" watchObservedRunningTime="2024-02-12 19:47:31.48776925 +0000 UTC m=+1.865960141" Feb 12 19:47:32.302357 kubelet[2029]: I0212 19:47:32.302320 2029 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.2-d-344270592c" podStartSLOduration=5.302279092 pod.CreationTimestamp="2024-02-12 19:47:27 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:47:31.945792654 +0000 UTC m=+2.323983550" watchObservedRunningTime="2024-02-12 19:47:32.302279092 +0000 UTC m=+2.680469989" Feb 12 19:47:32.308566 kubelet[2029]: E0212 19:47:32.308528 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:32.505070 kubelet[2029]: E0212 19:47:32.505023 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:32.753559 kubelet[2029]: I0212 19:47:32.753413 2029 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.2-d-344270592c" podStartSLOduration=5.753353776 pod.CreationTimestamp="2024-02-12 19:47:27 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:47:32.30336464 +0000 UTC m=+2.681555529" watchObservedRunningTime="2024-02-12 19:47:32.753353776 +0000 UTC m=+3.131544675" Feb 12 19:47:33.311540 kubelet[2029]: E0212 19:47:33.311502 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:33.314111 kubelet[2029]: E0212 19:47:33.312963 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:34.314088 kubelet[2029]: E0212 19:47:34.314050 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:35.315906 kubelet[2029]: E0212 19:47:35.315876 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:35.351521 kubelet[2029]: E0212 19:47:35.351444 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:36.317432 kubelet[2029]: E0212 19:47:36.317388 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:36.373217 sudo[1248]: pam_unix(sudo:session): session closed for user root Feb 12 19:47:36.376980 kernel: kauditd_printk_skb: 329 callbacks suppressed Feb 12 19:47:36.377298 kernel: audit: type=1106 audit(1707767256.372:945): pid=1248 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:47:36.372000 audit[1248]: USER_END pid=1248 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:47:36.372000 audit[1248]: CRED_DISP pid=1248 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:47:36.387655 kernel: audit: type=1104 audit(1707767256.372:946): pid=1248 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:47:36.401313 sshd[1245]: pam_unix(sshd:session): session closed for user core Feb 12 19:47:36.406000 audit[1245]: USER_END pid=1245 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:47:36.418774 kernel: audit: type=1106 audit(1707767256.406:947): pid=1245 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:47:36.418961 kernel: audit: type=1104 audit(1707767256.407:948): pid=1245 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:47:36.407000 audit[1245]: CRED_DISP pid=1245 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:47:36.436830 systemd-logind[1093]: Session 7 logged out. Waiting for processes to exit. Feb 12 19:47:36.442203 systemd[1]: sshd@6-146.190.157.125:22-139.178.68.195:56802.service: Deactivated successfully. Feb 12 19:47:36.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-146.190.157.125:22-139.178.68.195:56802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:36.443640 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 19:47:36.443921 systemd[1]: session-7.scope: Consumed 6.340s CPU time. Feb 12 19:47:36.447016 systemd-logind[1093]: Removed session 7. Feb 12 19:47:36.449072 kernel: audit: type=1131 audit(1707767256.441:949): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-146.190.157.125:22-139.178.68.195:56802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:42.640708 kubelet[2029]: I0212 19:47:42.640651 2029 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 12 19:47:42.642048 env[1106]: time="2024-02-12T19:47:42.641997038Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 19:47:42.643390 kubelet[2029]: I0212 19:47:42.642943 2029 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 12 19:47:42.966361 kubelet[2029]: I0212 19:47:42.965239 2029 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:47:42.973468 systemd[1]: Created slice kubepods-besteffort-pod4d0d1db5_f8c2_4f5d_88f6_9f05289dbd11.slice. Feb 12 19:47:42.995061 kubelet[2029]: W0212 19:47:42.994995 2029 reflector.go:424] object-"tigera-operator"/"kubernetes-services-endpoint": failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:ci-3510.3.2-d-344270592c" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510.3.2-d-344270592c' and this object Feb 12 19:47:42.995061 kubelet[2029]: E0212 19:47:42.995074 2029 reflector.go:140] object-"tigera-operator"/"kubernetes-services-endpoint": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:ci-3510.3.2-d-344270592c" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510.3.2-d-344270592c' and this object Feb 12 19:47:42.995061 kubelet[2029]: W0212 19:47:42.994997 2029 reflector.go:424] object-"tigera-operator"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.2-d-344270592c" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510.3.2-d-344270592c' and this object Feb 12 19:47:42.995404 kubelet[2029]: E0212 19:47:42.995097 2029 reflector.go:140] object-"tigera-operator"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.2-d-344270592c" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510.3.2-d-344270592c' and this object Feb 12 19:47:43.053748 kubelet[2029]: I0212 19:47:43.053679 2029 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:47:43.063954 systemd[1]: Created slice kubepods-besteffort-pode6203f4f_755d_4d4f_9a00_85d077c678c9.slice. Feb 12 19:47:43.148648 kubelet[2029]: I0212 19:47:43.148595 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4d0d1db5-f8c2-4f5d-88f6-9f05289dbd11-var-lib-calico\") pod \"tigera-operator-cfc98749c-mjxkq\" (UID: \"4d0d1db5-f8c2-4f5d-88f6-9f05289dbd11\") " pod="tigera-operator/tigera-operator-cfc98749c-mjxkq" Feb 12 19:47:43.148841 kubelet[2029]: I0212 19:47:43.148667 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f4fpx\" (UniqueName: \"kubernetes.io/projected/4d0d1db5-f8c2-4f5d-88f6-9f05289dbd11-kube-api-access-f4fpx\") pod \"tigera-operator-cfc98749c-mjxkq\" (UID: \"4d0d1db5-f8c2-4f5d-88f6-9f05289dbd11\") " pod="tigera-operator/tigera-operator-cfc98749c-mjxkq" Feb 12 19:47:43.249119 kubelet[2029]: I0212 19:47:43.248944 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/e6203f4f-755d-4d4f-9a00-85d077c678c9-kube-proxy\") pod \"kube-proxy-w6hgc\" (UID: \"e6203f4f-755d-4d4f-9a00-85d077c678c9\") " pod="kube-system/kube-proxy-w6hgc" Feb 12 19:47:43.249471 kubelet[2029]: I0212 19:47:43.249451 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e6203f4f-755d-4d4f-9a00-85d077c678c9-xtables-lock\") pod \"kube-proxy-w6hgc\" (UID: \"e6203f4f-755d-4d4f-9a00-85d077c678c9\") " pod="kube-system/kube-proxy-w6hgc" Feb 12 19:47:43.249660 kubelet[2029]: I0212 19:47:43.249641 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e6203f4f-755d-4d4f-9a00-85d077c678c9-lib-modules\") pod \"kube-proxy-w6hgc\" (UID: \"e6203f4f-755d-4d4f-9a00-85d077c678c9\") " pod="kube-system/kube-proxy-w6hgc" Feb 12 19:47:43.249802 kubelet[2029]: I0212 19:47:43.249791 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wkm4j\" (UniqueName: \"kubernetes.io/projected/e6203f4f-755d-4d4f-9a00-85d077c678c9-kube-api-access-wkm4j\") pod \"kube-proxy-w6hgc\" (UID: \"e6203f4f-755d-4d4f-9a00-85d077c678c9\") " pod="kube-system/kube-proxy-w6hgc" Feb 12 19:47:43.669930 kubelet[2029]: E0212 19:47:43.669880 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:43.672095 env[1106]: time="2024-02-12T19:47:43.670962543Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-w6hgc,Uid:e6203f4f-755d-4d4f-9a00-85d077c678c9,Namespace:kube-system,Attempt:0,}" Feb 12 19:47:43.713895 env[1106]: time="2024-02-12T19:47:43.713601730Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:47:43.713895 env[1106]: time="2024-02-12T19:47:43.713661498Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:47:43.713895 env[1106]: time="2024-02-12T19:47:43.713690634Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:47:43.719747 env[1106]: time="2024-02-12T19:47:43.713950733Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/21f9298fcabf562a9f8e3bcabe76a904f5fd605d06ac0d8fa2e18854b68d7f9e pid=2137 runtime=io.containerd.runc.v2 Feb 12 19:47:43.742967 systemd[1]: Started cri-containerd-21f9298fcabf562a9f8e3bcabe76a904f5fd605d06ac0d8fa2e18854b68d7f9e.scope. Feb 12 19:47:43.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.778970 kernel: audit: type=1400 audit(1707767263.773:950): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.779126 kernel: audit: type=1400 audit(1707767263.773:951): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.785500 kernel: audit: type=1400 audit(1707767263.773:952): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.785679 kernel: audit: type=1400 audit(1707767263.773:953): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.788636 kernel: audit: type=1400 audit(1707767263.773:954): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.796218 kernel: audit: type=1400 audit(1707767263.773:955): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.799847 kernel: audit: type=1400 audit(1707767263.773:956): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.805929 kernel: audit: type=1400 audit(1707767263.773:957): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.806182 kernel: audit: type=1400 audit(1707767263.773:958): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.806254 kernel: audit: type=1400 audit(1707767263.777:959): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.777000 audit: BPF prog-id=106 op=LOAD Feb 12 19:47:43.779000 audit[2147]: AVC avc: denied { bpf } for pid=2147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.779000 audit[2147]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2137 pid=2147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:43.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231663932393866636162663536326139663865336263616265373661 Feb 12 19:47:43.779000 audit[2147]: AVC avc: denied { perfmon } for pid=2147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.779000 audit[2147]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=2137 pid=2147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:43.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231663932393866636162663536326139663865336263616265373661 Feb 12 19:47:43.779000 audit[2147]: AVC avc: denied { bpf } for pid=2147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.779000 audit[2147]: AVC avc: denied { bpf } for pid=2147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.779000 audit[2147]: AVC avc: denied { bpf } for pid=2147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.779000 audit[2147]: AVC avc: denied { perfmon } for pid=2147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.779000 audit[2147]: AVC avc: denied { perfmon } for pid=2147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.779000 audit[2147]: AVC avc: denied { perfmon } for pid=2147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.779000 audit[2147]: AVC avc: denied { perfmon } for pid=2147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.779000 audit[2147]: AVC avc: denied { perfmon } for pid=2147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.779000 audit[2147]: AVC avc: denied { bpf } for pid=2147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.779000 audit[2147]: AVC avc: denied { bpf } for pid=2147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.779000 audit: BPF prog-id=107 op=LOAD Feb 12 19:47:43.779000 audit[2147]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000205710 items=0 ppid=2137 pid=2147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:43.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231663932393866636162663536326139663865336263616265373661 Feb 12 19:47:43.781000 audit[2147]: AVC avc: denied { bpf } for pid=2147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.781000 audit[2147]: AVC avc: denied { bpf } for pid=2147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.781000 audit[2147]: AVC avc: denied { perfmon } for pid=2147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.781000 audit[2147]: AVC avc: denied { perfmon } for pid=2147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.781000 audit[2147]: AVC avc: denied { perfmon } for pid=2147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.781000 audit[2147]: AVC avc: denied { perfmon } for pid=2147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.781000 audit[2147]: AVC avc: denied { perfmon } for pid=2147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.781000 audit[2147]: AVC avc: denied { bpf } for pid=2147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.781000 audit[2147]: AVC avc: denied { bpf } for pid=2147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.781000 audit: BPF prog-id=108 op=LOAD Feb 12 19:47:43.781000 audit[2147]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000205758 items=0 ppid=2137 pid=2147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:43.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231663932393866636162663536326139663865336263616265373661 Feb 12 19:47:43.791000 audit: BPF prog-id=108 op=UNLOAD Feb 12 19:47:43.791000 audit: BPF prog-id=107 op=UNLOAD Feb 12 19:47:43.792000 audit[2147]: AVC avc: denied { bpf } for pid=2147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.792000 audit[2147]: AVC avc: denied { bpf } for pid=2147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.792000 audit[2147]: AVC avc: denied { bpf } for pid=2147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.792000 audit[2147]: AVC avc: denied { perfmon } for pid=2147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.792000 audit[2147]: AVC avc: denied { perfmon } for pid=2147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.792000 audit[2147]: AVC avc: denied { perfmon } for pid=2147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.792000 audit[2147]: AVC avc: denied { perfmon } for pid=2147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.792000 audit[2147]: AVC avc: denied { perfmon } for pid=2147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.792000 audit[2147]: AVC avc: denied { bpf } for pid=2147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.792000 audit[2147]: AVC avc: denied { bpf } for pid=2147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.792000 audit: BPF prog-id=109 op=LOAD Feb 12 19:47:43.792000 audit[2147]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000205b68 items=0 ppid=2137 pid=2147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:43.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231663932393866636162663536326139663865336263616265373661 Feb 12 19:47:43.828525 env[1106]: time="2024-02-12T19:47:43.828475161Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-w6hgc,Uid:e6203f4f-755d-4d4f-9a00-85d077c678c9,Namespace:kube-system,Attempt:0,} returns sandbox id \"21f9298fcabf562a9f8e3bcabe76a904f5fd605d06ac0d8fa2e18854b68d7f9e\"" Feb 12 19:47:43.832331 kubelet[2029]: E0212 19:47:43.829957 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:43.839946 env[1106]: time="2024-02-12T19:47:43.839894505Z" level=info msg="CreateContainer within sandbox \"21f9298fcabf562a9f8e3bcabe76a904f5fd605d06ac0d8fa2e18854b68d7f9e\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 19:47:43.878969 env[1106]: time="2024-02-12T19:47:43.878766872Z" level=info msg="CreateContainer within sandbox \"21f9298fcabf562a9f8e3bcabe76a904f5fd605d06ac0d8fa2e18854b68d7f9e\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"1fe2f0d54ea9586e6fbea25d918faa2392a945f6fd8111a2bc10a1e8ae9ee2b9\"" Feb 12 19:47:43.882988 env[1106]: time="2024-02-12T19:47:43.882931421Z" level=info msg="StartContainer for \"1fe2f0d54ea9586e6fbea25d918faa2392a945f6fd8111a2bc10a1e8ae9ee2b9\"" Feb 12 19:47:43.906280 systemd[1]: Started cri-containerd-1fe2f0d54ea9586e6fbea25d918faa2392a945f6fd8111a2bc10a1e8ae9ee2b9.scope. Feb 12 19:47:43.933000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.933000 audit[2178]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2137 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:43.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166653266306435346561393538366536666265613235643931386661 Feb 12 19:47:43.936000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.936000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.936000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.936000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.936000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.936000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.936000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.936000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.936000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.936000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.936000 audit: BPF prog-id=110 op=LOAD Feb 12 19:47:43.936000 audit[2178]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002d9be0 items=0 ppid=2137 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:43.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166653266306435346561393538366536666265613235643931386661 Feb 12 19:47:43.937000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.937000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.937000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.937000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.937000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.937000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.937000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.937000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.937000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.937000 audit: BPF prog-id=111 op=LOAD Feb 12 19:47:43.937000 audit[2178]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002d9c28 items=0 ppid=2137 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:43.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166653266306435346561393538366536666265613235643931386661 Feb 12 19:47:43.938000 audit: BPF prog-id=111 op=UNLOAD Feb 12 19:47:43.939000 audit: BPF prog-id=110 op=UNLOAD Feb 12 19:47:43.939000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.939000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.939000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.939000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.939000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.939000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.939000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.939000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.939000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.939000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:43.939000 audit: BPF prog-id=112 op=LOAD Feb 12 19:47:43.939000 audit[2178]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002d9cb8 items=0 ppid=2137 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:43.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166653266306435346561393538366536666265613235643931386661 Feb 12 19:47:43.965165 env[1106]: time="2024-02-12T19:47:43.965073356Z" level=info msg="StartContainer for \"1fe2f0d54ea9586e6fbea25d918faa2392a945f6fd8111a2bc10a1e8ae9ee2b9\" returns successfully" Feb 12 19:47:44.188000 audit[2227]: NETFILTER_CFG table=mangle:59 family=2 entries=1 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:44.188000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffedb6adcb0 a2=0 a3=7ffedb6adc9c items=0 ppid=2189 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.188000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:47:44.192000 audit[2228]: NETFILTER_CFG table=mangle:60 family=10 entries=1 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:44.192000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffde2a19d20 a2=0 a3=7ffde2a19d0c items=0 ppid=2189 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.192000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:47:44.193000 audit[2229]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2229 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:44.193000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce8c11f70 a2=0 a3=7ffce8c11f5c items=0 ppid=2189 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.193000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:47:44.194000 audit[2230]: NETFILTER_CFG table=nat:62 family=10 entries=1 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:44.194000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4b5856b0 a2=0 a3=7fff4b58569c items=0 ppid=2189 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.194000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:47:44.196000 audit[2231]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:44.196000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe59fdcd80 a2=0 a3=7ffe59fdcd6c items=0 ppid=2189 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.196000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:47:44.199000 audit[2232]: NETFILTER_CFG table=filter:64 family=2 entries=1 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:44.199000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcdb3a01f0 a2=0 a3=7ffcdb3a01dc items=0 ppid=2189 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.199000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:47:44.264121 kubelet[2029]: E0212 19:47:44.264006 2029 projected.go:292] Couldn't get configMap tigera-operator/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Feb 12 19:47:44.264121 kubelet[2029]: E0212 19:47:44.264097 2029 projected.go:198] Error preparing data for projected volume kube-api-access-f4fpx for pod tigera-operator/tigera-operator-cfc98749c-mjxkq: failed to sync configmap cache: timed out waiting for the condition Feb 12 19:47:44.264381 kubelet[2029]: E0212 19:47:44.264212 2029 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/4d0d1db5-f8c2-4f5d-88f6-9f05289dbd11-kube-api-access-f4fpx podName:4d0d1db5-f8c2-4f5d-88f6-9f05289dbd11 nodeName:}" failed. No retries permitted until 2024-02-12 19:47:44.764179533 +0000 UTC m=+15.142370429 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-f4fpx" (UniqueName: "kubernetes.io/projected/4d0d1db5-f8c2-4f5d-88f6-9f05289dbd11-kube-api-access-f4fpx") pod "tigera-operator-cfc98749c-mjxkq" (UID: "4d0d1db5-f8c2-4f5d-88f6-9f05289dbd11") : failed to sync configmap cache: timed out waiting for the condition Feb 12 19:47:44.302000 audit[2233]: NETFILTER_CFG table=filter:65 family=2 entries=1 op=nft_register_chain pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:44.302000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd13a7b0f0 a2=0 a3=7ffd13a7b0dc items=0 ppid=2189 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.302000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:47:44.311000 audit[2235]: NETFILTER_CFG table=filter:66 family=2 entries=1 op=nft_register_rule pid=2235 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:44.311000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffed590fd20 a2=0 a3=7ffed590fd0c items=0 ppid=2189 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.311000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 19:47:44.318000 audit[2238]: NETFILTER_CFG table=filter:67 family=2 entries=1 op=nft_register_rule pid=2238 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:44.318000 audit[2238]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc7e89bb10 a2=0 a3=7ffc7e89bafc items=0 ppid=2189 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.318000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 19:47:44.321000 audit[2239]: NETFILTER_CFG table=filter:68 family=2 entries=1 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:44.321000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe16a2da60 a2=0 a3=7ffe16a2da4c items=0 ppid=2189 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.321000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:47:44.325000 audit[2241]: NETFILTER_CFG table=filter:69 family=2 entries=1 op=nft_register_rule pid=2241 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:44.325000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdc8efb130 a2=0 a3=7ffdc8efb11c items=0 ppid=2189 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.325000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:47:44.327000 audit[2242]: NETFILTER_CFG table=filter:70 family=2 entries=1 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:44.327000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9eff0e60 a2=0 a3=7ffd9eff0e4c items=0 ppid=2189 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.327000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:47:44.333000 audit[2244]: NETFILTER_CFG table=filter:71 family=2 entries=1 op=nft_register_rule pid=2244 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:44.333000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff313758d0 a2=0 a3=7fff313758bc items=0 ppid=2189 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.333000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:47:44.340000 audit[2247]: NETFILTER_CFG table=filter:72 family=2 entries=1 op=nft_register_rule pid=2247 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:44.340000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc2a071030 a2=0 a3=7ffc2a07101c items=0 ppid=2189 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.340000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 19:47:44.343000 audit[2248]: NETFILTER_CFG table=filter:73 family=2 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:44.343000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd06536300 a2=0 a3=7ffd065362ec items=0 ppid=2189 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.343000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:47:44.347000 audit[2250]: NETFILTER_CFG table=filter:74 family=2 entries=1 op=nft_register_rule pid=2250 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:44.347000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc1ad41e40 a2=0 a3=7ffc1ad41e2c items=0 ppid=2189 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.347000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:47:44.350000 audit[2251]: NETFILTER_CFG table=filter:75 family=2 entries=1 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:44.350000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd475361e0 a2=0 a3=7ffd475361cc items=0 ppid=2189 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.350000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:47:44.355000 audit[2253]: NETFILTER_CFG table=filter:76 family=2 entries=1 op=nft_register_rule pid=2253 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:44.355000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe9d780260 a2=0 a3=7ffe9d78024c items=0 ppid=2189 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.355000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:47:44.361000 audit[2256]: NETFILTER_CFG table=filter:77 family=2 entries=1 op=nft_register_rule pid=2256 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:44.361000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeeb8b6a30 a2=0 a3=7ffeeb8b6a1c items=0 ppid=2189 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.361000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:47:44.368702 kubelet[2029]: E0212 19:47:44.368665 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:44.378000 audit[2259]: NETFILTER_CFG table=filter:78 family=2 entries=1 op=nft_register_rule pid=2259 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:44.378000 audit[2259]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd678cd480 a2=0 a3=7ffd678cd46c items=0 ppid=2189 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.378000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:47:44.382295 kubelet[2029]: I0212 19:47:44.382244 2029 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-w6hgc" podStartSLOduration=1.38219733 pod.CreationTimestamp="2024-02-12 19:47:43 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:47:44.38151254 +0000 UTC m=+14.759703436" watchObservedRunningTime="2024-02-12 19:47:44.38219733 +0000 UTC m=+14.760388227" Feb 12 19:47:44.385000 audit[2260]: NETFILTER_CFG table=nat:79 family=2 entries=1 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:44.385000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdffd30220 a2=0 a3=7ffdffd3020c items=0 ppid=2189 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.385000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:47:44.393871 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3486187381.mount: Deactivated successfully. Feb 12 19:47:44.399000 audit[2262]: NETFILTER_CFG table=nat:80 family=2 entries=1 op=nft_register_rule pid=2262 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:44.399000 audit[2262]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffee4658740 a2=0 a3=7ffee465872c items=0 ppid=2189 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.399000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:47:44.406000 audit[2265]: NETFILTER_CFG table=nat:81 family=2 entries=1 op=nft_register_rule pid=2265 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:47:44.406000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc199b9dd0 a2=0 a3=7ffc199b9dbc items=0 ppid=2189 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.406000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:47:44.430000 audit[2269]: NETFILTER_CFG table=filter:82 family=2 entries=6 op=nft_register_rule pid=2269 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:47:44.430000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffcd99bc460 a2=0 a3=7ffcd99bc44c items=0 ppid=2189 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.430000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:47:44.440000 audit[2269]: NETFILTER_CFG table=nat:83 family=2 entries=17 op=nft_register_chain pid=2269 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:47:44.440000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffcd99bc460 a2=0 a3=7ffcd99bc44c items=0 ppid=2189 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.440000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:47:44.449000 audit[2274]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2274 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:44.449000 audit[2274]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd9d7bfcb0 a2=0 a3=7ffd9d7bfc9c items=0 ppid=2189 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.449000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:47:44.455000 audit[2276]: NETFILTER_CFG table=filter:85 family=10 entries=2 op=nft_register_chain pid=2276 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:44.455000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff1db5c110 a2=0 a3=7fff1db5c0fc items=0 ppid=2189 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.455000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 19:47:44.463000 audit[2279]: NETFILTER_CFG table=filter:86 family=10 entries=2 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:44.463000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe74e28a20 a2=0 a3=7ffe74e28a0c items=0 ppid=2189 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.463000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 19:47:44.467000 audit[2280]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:44.467000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc73ef1280 a2=0 a3=7ffc73ef126c items=0 ppid=2189 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.467000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:47:44.472000 audit[2282]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:44.472000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdc9e38df0 a2=0 a3=7ffdc9e38ddc items=0 ppid=2189 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.472000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:47:44.475000 audit[2283]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_chain pid=2283 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:44.475000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd30e66d30 a2=0 a3=7ffd30e66d1c items=0 ppid=2189 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.475000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:47:44.482000 audit[2285]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_rule pid=2285 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:44.482000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe9555c4d0 a2=0 a3=7ffe9555c4bc items=0 ppid=2189 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.482000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 19:47:44.495000 audit[2288]: NETFILTER_CFG table=filter:91 family=10 entries=2 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:44.495000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe82b0bfc0 a2=0 a3=7ffe82b0bfac items=0 ppid=2189 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.495000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:47:44.497000 audit[2289]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:44.497000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff7859aed0 a2=0 a3=7fff7859aebc items=0 ppid=2189 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.497000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:47:44.503000 audit[2291]: NETFILTER_CFG table=filter:93 family=10 entries=1 op=nft_register_rule pid=2291 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:44.503000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd83966190 a2=0 a3=7ffd8396617c items=0 ppid=2189 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.503000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:47:44.506000 audit[2292]: NETFILTER_CFG table=filter:94 family=10 entries=1 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:44.506000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd20331d30 a2=0 a3=7ffd20331d1c items=0 ppid=2189 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.506000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:47:44.514000 audit[2294]: NETFILTER_CFG table=filter:95 family=10 entries=1 op=nft_register_rule pid=2294 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:44.514000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffef74cd910 a2=0 a3=7ffef74cd8fc items=0 ppid=2189 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.514000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:47:44.520000 audit[2297]: NETFILTER_CFG table=filter:96 family=10 entries=1 op=nft_register_rule pid=2297 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:44.520000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd2e3af4b0 a2=0 a3=7ffd2e3af49c items=0 ppid=2189 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.520000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:47:44.529000 audit[2300]: NETFILTER_CFG table=filter:97 family=10 entries=1 op=nft_register_rule pid=2300 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:44.529000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff00fbc4c0 a2=0 a3=7fff00fbc4ac items=0 ppid=2189 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.529000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 19:47:44.531000 audit[2301]: NETFILTER_CFG table=nat:98 family=10 entries=1 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:44.531000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc45d69a60 a2=0 a3=7ffc45d69a4c items=0 ppid=2189 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.531000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:47:44.537000 audit[2303]: NETFILTER_CFG table=nat:99 family=10 entries=2 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:44.537000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffeca5d7010 a2=0 a3=7ffeca5d6ffc items=0 ppid=2189 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.537000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:47:44.544000 audit[2306]: NETFILTER_CFG table=nat:100 family=10 entries=2 op=nft_register_chain pid=2306 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:47:44.544000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffde4130840 a2=0 a3=7ffde413082c items=0 ppid=2189 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.544000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:47:44.559000 audit[2310]: NETFILTER_CFG table=filter:101 family=10 entries=3 op=nft_register_rule pid=2310 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:47:44.559000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffc164c2b20 a2=0 a3=7ffc164c2b0c items=0 ppid=2189 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.559000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:47:44.561000 audit[2310]: NETFILTER_CFG table=nat:102 family=10 entries=10 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:47:44.561000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffc164c2b20 a2=0 a3=7ffc164c2b0c items=0 ppid=2189 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.561000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:47:44.787517 env[1106]: time="2024-02-12T19:47:44.787443241Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-mjxkq,Uid:4d0d1db5-f8c2-4f5d-88f6-9f05289dbd11,Namespace:tigera-operator,Attempt:0,}" Feb 12 19:47:44.823358 env[1106]: time="2024-02-12T19:47:44.823229509Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:47:44.823358 env[1106]: time="2024-02-12T19:47:44.823298113Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:47:44.823358 env[1106]: time="2024-02-12T19:47:44.823311811Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:47:44.823931 env[1106]: time="2024-02-12T19:47:44.823874985Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e8e1f72048f3d912af053de2c575df6192630959f8cb345803cce946b059e727 pid=2319 runtime=io.containerd.runc.v2 Feb 12 19:47:44.845512 systemd[1]: Started cri-containerd-e8e1f72048f3d912af053de2c575df6192630959f8cb345803cce946b059e727.scope. Feb 12 19:47:44.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.876000 audit: BPF prog-id=113 op=LOAD Feb 12 19:47:44.877000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.877000 audit[2329]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2319 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538653166373230343866336439313261663035336465326335373564 Feb 12 19:47:44.877000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.877000 audit[2329]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2319 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538653166373230343866336439313261663035336465326335373564 Feb 12 19:47:44.877000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.877000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.877000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.877000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.877000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.877000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.877000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.877000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.877000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.877000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.877000 audit: BPF prog-id=114 op=LOAD Feb 12 19:47:44.877000 audit[2329]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00021a8d0 items=0 ppid=2319 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538653166373230343866336439313261663035336465326335373564 Feb 12 19:47:44.877000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.877000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.877000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.877000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.877000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.877000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.877000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.877000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.877000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.877000 audit: BPF prog-id=115 op=LOAD Feb 12 19:47:44.877000 audit[2329]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00021a918 items=0 ppid=2319 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538653166373230343866336439313261663035336465326335373564 Feb 12 19:47:44.877000 audit: BPF prog-id=115 op=UNLOAD Feb 12 19:47:44.878000 audit: BPF prog-id=114 op=UNLOAD Feb 12 19:47:44.878000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.878000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.878000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.878000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.878000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.878000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.878000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.878000 audit[2329]: AVC avc: denied { perfmon } for pid=2329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.878000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.878000 audit[2329]: AVC avc: denied { bpf } for pid=2329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:44.878000 audit: BPF prog-id=116 op=LOAD Feb 12 19:47:44.878000 audit[2329]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00021ad28 items=0 ppid=2319 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:44.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538653166373230343866336439313261663035336465326335373564 Feb 12 19:47:44.922097 env[1106]: time="2024-02-12T19:47:44.922013663Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-mjxkq,Uid:4d0d1db5-f8c2-4f5d-88f6-9f05289dbd11,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"e8e1f72048f3d912af053de2c575df6192630959f8cb345803cce946b059e727\"" Feb 12 19:47:44.926213 env[1106]: time="2024-02-12T19:47:44.926126288Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 12 19:47:45.373519 kubelet[2029]: E0212 19:47:45.373484 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:45.392475 systemd[1]: run-containerd-runc-k8s.io-e8e1f72048f3d912af053de2c575df6192630959f8cb345803cce946b059e727-runc.2A2Rkn.mount: Deactivated successfully. Feb 12 19:47:46.183484 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2687362131.mount: Deactivated successfully. Feb 12 19:47:47.610686 env[1106]: time="2024-02-12T19:47:47.610571999Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:47.614545 env[1106]: time="2024-02-12T19:47:47.614469076Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:47.619083 env[1106]: time="2024-02-12T19:47:47.619024297Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:47.623380 env[1106]: time="2024-02-12T19:47:47.623317200Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:47.625258 env[1106]: time="2024-02-12T19:47:47.625171765Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 12 19:47:47.635852 env[1106]: time="2024-02-12T19:47:47.635782199Z" level=info msg="CreateContainer within sandbox \"e8e1f72048f3d912af053de2c575df6192630959f8cb345803cce946b059e727\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 12 19:47:47.660127 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3937568402.mount: Deactivated successfully. Feb 12 19:47:47.670603 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1879794094.mount: Deactivated successfully. Feb 12 19:47:47.687144 env[1106]: time="2024-02-12T19:47:47.687073983Z" level=info msg="CreateContainer within sandbox \"e8e1f72048f3d912af053de2c575df6192630959f8cb345803cce946b059e727\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"848c46cbacff6f7b5a59793cda1ad22190bc29237f68441522b1828f508c0764\"" Feb 12 19:47:47.689798 env[1106]: time="2024-02-12T19:47:47.689712337Z" level=info msg="StartContainer for \"848c46cbacff6f7b5a59793cda1ad22190bc29237f68441522b1828f508c0764\"" Feb 12 19:47:47.725588 systemd[1]: Started cri-containerd-848c46cbacff6f7b5a59793cda1ad22190bc29237f68441522b1828f508c0764.scope. Feb 12 19:47:47.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.755000 audit: BPF prog-id=117 op=LOAD Feb 12 19:47:47.758000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.758000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2319 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:47.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834386334366362616366663666376235613539373933636461316164 Feb 12 19:47:47.758000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.758000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2319 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:47.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834386334366362616366663666376235613539373933636461316164 Feb 12 19:47:47.758000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.758000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.758000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.758000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.758000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.758000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.758000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.758000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.758000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.758000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.758000 audit: BPF prog-id=118 op=LOAD Feb 12 19:47:47.758000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000283be0 items=0 ppid=2319 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:47.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834386334366362616366663666376235613539373933636461316164 Feb 12 19:47:47.759000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.759000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.759000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.759000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.759000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.759000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.759000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.759000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.759000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.759000 audit: BPF prog-id=119 op=LOAD Feb 12 19:47:47.759000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000283c28 items=0 ppid=2319 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:47.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834386334366362616366663666376235613539373933636461316164 Feb 12 19:47:47.759000 audit: BPF prog-id=119 op=UNLOAD Feb 12 19:47:47.759000 audit: BPF prog-id=118 op=UNLOAD Feb 12 19:47:47.759000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.759000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.759000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.759000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.759000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.759000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.759000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.759000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.759000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.759000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:47.759000 audit: BPF prog-id=120 op=LOAD Feb 12 19:47:47.759000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000382038 items=0 ppid=2319 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:47.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834386334366362616366663666376235613539373933636461316164 Feb 12 19:47:47.796269 env[1106]: time="2024-02-12T19:47:47.796211238Z" level=info msg="StartContainer for \"848c46cbacff6f7b5a59793cda1ad22190bc29237f68441522b1828f508c0764\" returns successfully" Feb 12 19:47:48.416299 kubelet[2029]: I0212 19:47:48.415893 2029 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-cfc98749c-mjxkq" podStartSLOduration=-9.223372030438988e+09 pod.CreationTimestamp="2024-02-12 19:47:42 +0000 UTC" firstStartedPulling="2024-02-12 19:47:44.923621138 +0000 UTC m=+15.301812038" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:47:48.415499336 +0000 UTC m=+18.793690235" watchObservedRunningTime="2024-02-12 19:47:48.415788938 +0000 UTC m=+18.793979838" Feb 12 19:47:50.146771 kernel: kauditd_printk_skb: 336 callbacks suppressed Feb 12 19:47:50.147041 kernel: audit: type=1325 audit(1707767270.145:1054): table=filter:103 family=2 entries=13 op=nft_register_rule pid=2415 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:47:50.145000 audit[2415]: NETFILTER_CFG table=filter:103 family=2 entries=13 op=nft_register_rule pid=2415 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:47:50.145000 audit[2415]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffcf41c9f60 a2=0 a3=7ffcf41c9f4c items=0 ppid=2189 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:50.155002 kernel: audit: type=1300 audit(1707767270.145:1054): arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffcf41c9f60 a2=0 a3=7ffcf41c9f4c items=0 ppid=2189 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:50.155210 kernel: audit: type=1327 audit(1707767270.145:1054): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:47:50.145000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:47:50.146000 audit[2415]: NETFILTER_CFG table=nat:104 family=2 entries=20 op=nft_register_rule pid=2415 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:47:50.146000 audit[2415]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffcf41c9f60 a2=0 a3=7ffcf41c9f4c items=0 ppid=2189 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:50.175869 kernel: audit: type=1325 audit(1707767270.146:1055): table=nat:104 family=2 entries=20 op=nft_register_rule pid=2415 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:47:50.176065 kernel: audit: type=1300 audit(1707767270.146:1055): arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffcf41c9f60 a2=0 a3=7ffcf41c9f4c items=0 ppid=2189 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:50.146000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:47:50.180789 kernel: audit: type=1327 audit(1707767270.146:1055): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:47:50.247388 kubelet[2029]: I0212 19:47:50.247315 2029 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:47:50.258929 systemd[1]: Created slice kubepods-besteffort-pod665ad505_b499_41f6_bb2a_439ab2593c43.slice. Feb 12 19:47:50.268259 kubelet[2029]: W0212 19:47:50.268222 2029 reflector.go:424] object-"calico-system"/"typha-certs": failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:ci-3510.3.2-d-344270592c" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.2-d-344270592c' and this object Feb 12 19:47:50.268549 kubelet[2029]: E0212 19:47:50.268533 2029 reflector.go:140] object-"calico-system"/"typha-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:ci-3510.3.2-d-344270592c" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.2-d-344270592c' and this object Feb 12 19:47:50.269015 kubelet[2029]: W0212 19:47:50.268960 2029 reflector.go:424] object-"calico-system"/"tigera-ca-bundle": failed to list *v1.ConfigMap: configmaps "tigera-ca-bundle" is forbidden: User "system:node:ci-3510.3.2-d-344270592c" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.2-d-344270592c' and this object Feb 12 19:47:50.269015 kubelet[2029]: E0212 19:47:50.268989 2029 reflector.go:140] object-"calico-system"/"tigera-ca-bundle": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "tigera-ca-bundle" is forbidden: User "system:node:ci-3510.3.2-d-344270592c" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.2-d-344270592c' and this object Feb 12 19:47:50.425600 kubelet[2029]: I0212 19:47:50.425451 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/665ad505-b499-41f6-bb2a-439ab2593c43-tigera-ca-bundle\") pod \"calico-typha-79574786d8-g4hvw\" (UID: \"665ad505-b499-41f6-bb2a-439ab2593c43\") " pod="calico-system/calico-typha-79574786d8-g4hvw" Feb 12 19:47:50.425960 kubelet[2029]: I0212 19:47:50.425936 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/665ad505-b499-41f6-bb2a-439ab2593c43-typha-certs\") pod \"calico-typha-79574786d8-g4hvw\" (UID: \"665ad505-b499-41f6-bb2a-439ab2593c43\") " pod="calico-system/calico-typha-79574786d8-g4hvw" Feb 12 19:47:50.426201 kubelet[2029]: I0212 19:47:50.426170 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vxsf6\" (UniqueName: \"kubernetes.io/projected/665ad505-b499-41f6-bb2a-439ab2593c43-kube-api-access-vxsf6\") pod \"calico-typha-79574786d8-g4hvw\" (UID: \"665ad505-b499-41f6-bb2a-439ab2593c43\") " pod="calico-system/calico-typha-79574786d8-g4hvw" Feb 12 19:47:50.485474 kubelet[2029]: I0212 19:47:50.485416 2029 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:47:50.495046 systemd[1]: Created slice kubepods-besteffort-pod6aa22a5e_fe72_45de_8fda_4540fc03472f.slice. Feb 12 19:47:50.512000 audit[2441]: NETFILTER_CFG table=filter:105 family=2 entries=14 op=nft_register_rule pid=2441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:47:50.512000 audit[2441]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffe2bc60850 a2=0 a3=7ffe2bc6083c items=0 ppid=2189 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:50.523655 kernel: audit: type=1325 audit(1707767270.512:1056): table=filter:105 family=2 entries=14 op=nft_register_rule pid=2441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:47:50.523950 kernel: audit: type=1300 audit(1707767270.512:1056): arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffe2bc60850 a2=0 a3=7ffe2bc6083c items=0 ppid=2189 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:50.524020 kernel: audit: type=1327 audit(1707767270.512:1056): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:47:50.512000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:47:50.514000 audit[2441]: NETFILTER_CFG table=nat:106 family=2 entries=20 op=nft_register_rule pid=2441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:47:50.529996 kernel: audit: type=1325 audit(1707767270.514:1057): table=nat:106 family=2 entries=20 op=nft_register_rule pid=2441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:47:50.514000 audit[2441]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffe2bc60850 a2=0 a3=7ffe2bc6083c items=0 ppid=2189 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:50.514000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:47:50.619502 kubelet[2029]: I0212 19:47:50.619457 2029 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:47:50.620517 kubelet[2029]: E0212 19:47:50.620462 2029 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bp7zv" podUID=1b086c16-44ff-4ae2-8b8c-0804a979d643 Feb 12 19:47:50.627194 kubelet[2029]: I0212 19:47:50.627133 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-flexvol-driver-host\") pod \"calico-node-td4fw\" (UID: \"6aa22a5e-fe72-45de-8fda-4540fc03472f\") " pod="calico-system/calico-node-td4fw" Feb 12 19:47:50.627606 kubelet[2029]: I0212 19:47:50.627577 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-lib-modules\") pod \"calico-node-td4fw\" (UID: \"6aa22a5e-fe72-45de-8fda-4540fc03472f\") " pod="calico-system/calico-node-td4fw" Feb 12 19:47:50.627871 kubelet[2029]: I0212 19:47:50.627847 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6aa22a5e-fe72-45de-8fda-4540fc03472f-tigera-ca-bundle\") pod \"calico-node-td4fw\" (UID: \"6aa22a5e-fe72-45de-8fda-4540fc03472f\") " pod="calico-system/calico-node-td4fw" Feb 12 19:47:50.628050 kubelet[2029]: I0212 19:47:50.628032 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-cni-log-dir\") pod \"calico-node-td4fw\" (UID: \"6aa22a5e-fe72-45de-8fda-4540fc03472f\") " pod="calico-system/calico-node-td4fw" Feb 12 19:47:50.628604 kubelet[2029]: I0212 19:47:50.628553 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-policysync\") pod \"calico-node-td4fw\" (UID: \"6aa22a5e-fe72-45de-8fda-4540fc03472f\") " pod="calico-system/calico-node-td4fw" Feb 12 19:47:50.629115 kubelet[2029]: I0212 19:47:50.628850 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-var-run-calico\") pod \"calico-node-td4fw\" (UID: \"6aa22a5e-fe72-45de-8fda-4540fc03472f\") " pod="calico-system/calico-node-td4fw" Feb 12 19:47:50.629418 kubelet[2029]: I0212 19:47:50.629391 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-var-lib-calico\") pod \"calico-node-td4fw\" (UID: \"6aa22a5e-fe72-45de-8fda-4540fc03472f\") " pod="calico-system/calico-node-td4fw" Feb 12 19:47:50.629660 kubelet[2029]: I0212 19:47:50.629613 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-xtables-lock\") pod \"calico-node-td4fw\" (UID: \"6aa22a5e-fe72-45de-8fda-4540fc03472f\") " pod="calico-system/calico-node-td4fw" Feb 12 19:47:50.629933 kubelet[2029]: I0212 19:47:50.629913 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/6aa22a5e-fe72-45de-8fda-4540fc03472f-node-certs\") pod \"calico-node-td4fw\" (UID: \"6aa22a5e-fe72-45de-8fda-4540fc03472f\") " pod="calico-system/calico-node-td4fw" Feb 12 19:47:50.630260 kubelet[2029]: I0212 19:47:50.630194 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-cni-net-dir\") pod \"calico-node-td4fw\" (UID: \"6aa22a5e-fe72-45de-8fda-4540fc03472f\") " pod="calico-system/calico-node-td4fw" Feb 12 19:47:50.630521 kubelet[2029]: I0212 19:47:50.630502 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jvbwc\" (UniqueName: \"kubernetes.io/projected/6aa22a5e-fe72-45de-8fda-4540fc03472f-kube-api-access-jvbwc\") pod \"calico-node-td4fw\" (UID: \"6aa22a5e-fe72-45de-8fda-4540fc03472f\") " pod="calico-system/calico-node-td4fw" Feb 12 19:47:50.630860 kubelet[2029]: I0212 19:47:50.630782 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-cni-bin-dir\") pod \"calico-node-td4fw\" (UID: \"6aa22a5e-fe72-45de-8fda-4540fc03472f\") " pod="calico-system/calico-node-td4fw" Feb 12 19:47:50.731704 kubelet[2029]: I0212 19:47:50.731556 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/1b086c16-44ff-4ae2-8b8c-0804a979d643-varrun\") pod \"csi-node-driver-bp7zv\" (UID: \"1b086c16-44ff-4ae2-8b8c-0804a979d643\") " pod="calico-system/csi-node-driver-bp7zv" Feb 12 19:47:50.731704 kubelet[2029]: I0212 19:47:50.731654 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/1b086c16-44ff-4ae2-8b8c-0804a979d643-kubelet-dir\") pod \"csi-node-driver-bp7zv\" (UID: \"1b086c16-44ff-4ae2-8b8c-0804a979d643\") " pod="calico-system/csi-node-driver-bp7zv" Feb 12 19:47:50.731704 kubelet[2029]: I0212 19:47:50.731711 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9n4dl\" (UniqueName: \"kubernetes.io/projected/1b086c16-44ff-4ae2-8b8c-0804a979d643-kube-api-access-9n4dl\") pod \"csi-node-driver-bp7zv\" (UID: \"1b086c16-44ff-4ae2-8b8c-0804a979d643\") " pod="calico-system/csi-node-driver-bp7zv" Feb 12 19:47:50.732138 kubelet[2029]: I0212 19:47:50.731849 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/1b086c16-44ff-4ae2-8b8c-0804a979d643-socket-dir\") pod \"csi-node-driver-bp7zv\" (UID: \"1b086c16-44ff-4ae2-8b8c-0804a979d643\") " pod="calico-system/csi-node-driver-bp7zv" Feb 12 19:47:50.732138 kubelet[2029]: I0212 19:47:50.732048 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/1b086c16-44ff-4ae2-8b8c-0804a979d643-registration-dir\") pod \"csi-node-driver-bp7zv\" (UID: \"1b086c16-44ff-4ae2-8b8c-0804a979d643\") " pod="calico-system/csi-node-driver-bp7zv" Feb 12 19:47:50.835540 kubelet[2029]: E0212 19:47:50.835498 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.835871 kubelet[2029]: W0212 19:47:50.835825 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.836097 kubelet[2029]: E0212 19:47:50.836074 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.836709 kubelet[2029]: E0212 19:47:50.836685 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.836930 kubelet[2029]: W0212 19:47:50.836887 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.837112 kubelet[2029]: E0212 19:47:50.837089 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.837544 kubelet[2029]: E0212 19:47:50.837517 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.837544 kubelet[2029]: W0212 19:47:50.837540 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.837716 kubelet[2029]: E0212 19:47:50.837575 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.838136 kubelet[2029]: E0212 19:47:50.838110 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.838136 kubelet[2029]: W0212 19:47:50.838130 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.838405 kubelet[2029]: E0212 19:47:50.838158 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.838961 kubelet[2029]: E0212 19:47:50.838931 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.838961 kubelet[2029]: W0212 19:47:50.838954 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.839194 kubelet[2029]: E0212 19:47:50.839168 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.839350 kubelet[2029]: E0212 19:47:50.839241 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.839447 kubelet[2029]: W0212 19:47:50.839355 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.839447 kubelet[2029]: E0212 19:47:50.839400 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.839727 kubelet[2029]: E0212 19:47:50.839709 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.839955 kubelet[2029]: W0212 19:47:50.839744 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.839955 kubelet[2029]: E0212 19:47:50.839793 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.840539 kubelet[2029]: E0212 19:47:50.840458 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.840539 kubelet[2029]: W0212 19:47:50.840488 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.840539 kubelet[2029]: E0212 19:47:50.840521 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.841266 kubelet[2029]: E0212 19:47:50.841234 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.841266 kubelet[2029]: W0212 19:47:50.841262 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.841546 kubelet[2029]: E0212 19:47:50.841520 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.841992 kubelet[2029]: E0212 19:47:50.841968 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.841992 kubelet[2029]: W0212 19:47:50.841989 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.842157 kubelet[2029]: E0212 19:47:50.842134 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.842430 kubelet[2029]: E0212 19:47:50.842411 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.842430 kubelet[2029]: W0212 19:47:50.842429 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.842600 kubelet[2029]: E0212 19:47:50.842583 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.842984 kubelet[2029]: E0212 19:47:50.842958 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.842984 kubelet[2029]: W0212 19:47:50.842979 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.843174 kubelet[2029]: E0212 19:47:50.843005 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.843530 kubelet[2029]: E0212 19:47:50.843507 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.843530 kubelet[2029]: W0212 19:47:50.843526 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.843872 kubelet[2029]: E0212 19:47:50.843672 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.844195 kubelet[2029]: E0212 19:47:50.844155 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.844302 kubelet[2029]: W0212 19:47:50.844197 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.844364 kubelet[2029]: E0212 19:47:50.844325 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.844657 kubelet[2029]: E0212 19:47:50.844635 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.844861 kubelet[2029]: W0212 19:47:50.844669 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.845411 kubelet[2029]: E0212 19:47:50.845353 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.845533 kubelet[2029]: E0212 19:47:50.845485 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.845533 kubelet[2029]: W0212 19:47:50.845498 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.845533 kubelet[2029]: E0212 19:47:50.845524 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.845993 kubelet[2029]: E0212 19:47:50.845967 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.845993 kubelet[2029]: W0212 19:47:50.845988 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.846207 kubelet[2029]: E0212 19:47:50.846072 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.846352 kubelet[2029]: E0212 19:47:50.846327 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.846352 kubelet[2029]: W0212 19:47:50.846346 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.846613 kubelet[2029]: E0212 19:47:50.846482 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.846910 kubelet[2029]: E0212 19:47:50.846856 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.846910 kubelet[2029]: W0212 19:47:50.846877 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.846910 kubelet[2029]: E0212 19:47:50.846914 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.847528 kubelet[2029]: E0212 19:47:50.847498 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.847528 kubelet[2029]: W0212 19:47:50.847522 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.847704 kubelet[2029]: E0212 19:47:50.847560 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.847916 kubelet[2029]: E0212 19:47:50.847878 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.847916 kubelet[2029]: W0212 19:47:50.847911 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.848076 kubelet[2029]: E0212 19:47:50.848022 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.848283 kubelet[2029]: E0212 19:47:50.848260 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.848283 kubelet[2029]: W0212 19:47:50.848279 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.848501 kubelet[2029]: E0212 19:47:50.848435 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.848714 kubelet[2029]: E0212 19:47:50.848640 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.848714 kubelet[2029]: W0212 19:47:50.848658 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.849130 kubelet[2029]: E0212 19:47:50.848823 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.849222 kubelet[2029]: E0212 19:47:50.849153 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.849222 kubelet[2029]: W0212 19:47:50.849168 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.849526 kubelet[2029]: E0212 19:47:50.849496 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.852540 kubelet[2029]: E0212 19:47:50.852459 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.852540 kubelet[2029]: W0212 19:47:50.852495 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.852540 kubelet[2029]: E0212 19:47:50.852535 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.856234 kubelet[2029]: E0212 19:47:50.856180 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.856234 kubelet[2029]: W0212 19:47:50.856215 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.856954 kubelet[2029]: E0212 19:47:50.856921 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.856954 kubelet[2029]: W0212 19:47:50.856946 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.856954 kubelet[2029]: E0212 19:47:50.856996 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.857283 kubelet[2029]: E0212 19:47:50.857025 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.858134 kubelet[2029]: E0212 19:47:50.857822 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.858134 kubelet[2029]: W0212 19:47:50.857845 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.858134 kubelet[2029]: E0212 19:47:50.858051 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.858696 kubelet[2029]: E0212 19:47:50.858661 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.858696 kubelet[2029]: W0212 19:47:50.858681 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.858696 kubelet[2029]: E0212 19:47:50.858704 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.885471 kubelet[2029]: E0212 19:47:50.885410 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.885471 kubelet[2029]: W0212 19:47:50.885454 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.885774 kubelet[2029]: E0212 19:47:50.885687 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.886984 kubelet[2029]: E0212 19:47:50.886949 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.886984 kubelet[2029]: W0212 19:47:50.886972 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.887261 kubelet[2029]: E0212 19:47:50.887006 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.887603 kubelet[2029]: E0212 19:47:50.887568 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.887603 kubelet[2029]: W0212 19:47:50.887588 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.887603 kubelet[2029]: E0212 19:47:50.887611 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.949881 kubelet[2029]: E0212 19:47:50.949791 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.949881 kubelet[2029]: W0212 19:47:50.949822 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.949881 kubelet[2029]: E0212 19:47:50.949854 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.950214 kubelet[2029]: E0212 19:47:50.950126 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.950214 kubelet[2029]: W0212 19:47:50.950139 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.950214 kubelet[2029]: E0212 19:47:50.950160 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.950429 kubelet[2029]: E0212 19:47:50.950407 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.950429 kubelet[2029]: W0212 19:47:50.950427 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.950540 kubelet[2029]: E0212 19:47:50.950495 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.950796 kubelet[2029]: E0212 19:47:50.950755 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.950796 kubelet[2029]: W0212 19:47:50.950773 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.950796 kubelet[2029]: E0212 19:47:50.950791 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.951151 kubelet[2029]: E0212 19:47:50.951130 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.951151 kubelet[2029]: W0212 19:47:50.951150 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.951272 kubelet[2029]: E0212 19:47:50.951165 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:50.951432 kubelet[2029]: E0212 19:47:50.951375 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:50.951432 kubelet[2029]: W0212 19:47:50.951394 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:50.951432 kubelet[2029]: E0212 19:47:50.951411 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.057500 kubelet[2029]: E0212 19:47:51.057441 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.057500 kubelet[2029]: W0212 19:47:51.057476 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.057773 kubelet[2029]: E0212 19:47:51.057523 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.058004 kubelet[2029]: E0212 19:47:51.057978 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.058067 kubelet[2029]: W0212 19:47:51.058001 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.058067 kubelet[2029]: E0212 19:47:51.058049 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.058370 kubelet[2029]: E0212 19:47:51.058351 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.058454 kubelet[2029]: W0212 19:47:51.058369 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.058454 kubelet[2029]: E0212 19:47:51.058388 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.058670 kubelet[2029]: E0212 19:47:51.058651 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.058670 kubelet[2029]: W0212 19:47:51.058668 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.058782 kubelet[2029]: E0212 19:47:51.058689 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.059134 kubelet[2029]: E0212 19:47:51.059114 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.059134 kubelet[2029]: W0212 19:47:51.059131 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.059245 kubelet[2029]: E0212 19:47:51.059144 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.059498 kubelet[2029]: E0212 19:47:51.059474 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.059498 kubelet[2029]: W0212 19:47:51.059496 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.059620 kubelet[2029]: E0212 19:47:51.059513 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.162440 kubelet[2029]: E0212 19:47:51.162358 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.162746 kubelet[2029]: W0212 19:47:51.162690 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.162899 kubelet[2029]: E0212 19:47:51.162882 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.163465 kubelet[2029]: E0212 19:47:51.163444 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.163622 kubelet[2029]: W0212 19:47:51.163607 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.163712 kubelet[2029]: E0212 19:47:51.163698 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.164289 kubelet[2029]: E0212 19:47:51.164254 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.164430 kubelet[2029]: W0212 19:47:51.164410 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.164535 kubelet[2029]: E0212 19:47:51.164521 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.165218 kubelet[2029]: E0212 19:47:51.165192 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.165432 kubelet[2029]: W0212 19:47:51.165410 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.165543 kubelet[2029]: E0212 19:47:51.165531 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.165904 kubelet[2029]: E0212 19:47:51.165890 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.166029 kubelet[2029]: W0212 19:47:51.166014 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.166105 kubelet[2029]: E0212 19:47:51.166095 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.166497 kubelet[2029]: E0212 19:47:51.166447 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.166637 kubelet[2029]: W0212 19:47:51.166617 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.166783 kubelet[2029]: E0212 19:47:51.166766 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.270398 kubelet[2029]: E0212 19:47:51.270346 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.271136 kubelet[2029]: W0212 19:47:51.271098 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.271277 kubelet[2029]: E0212 19:47:51.271261 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.272073 kubelet[2029]: E0212 19:47:51.272048 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.272228 kubelet[2029]: W0212 19:47:51.272208 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.272363 kubelet[2029]: E0212 19:47:51.272347 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.274932 kubelet[2029]: E0212 19:47:51.274901 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.275238 kubelet[2029]: W0212 19:47:51.275207 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.275481 kubelet[2029]: E0212 19:47:51.275458 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.276211 kubelet[2029]: E0212 19:47:51.276190 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.276364 kubelet[2029]: W0212 19:47:51.276341 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.276543 kubelet[2029]: E0212 19:47:51.276523 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.277266 kubelet[2029]: E0212 19:47:51.277247 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.277429 kubelet[2029]: W0212 19:47:51.277410 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.277515 kubelet[2029]: E0212 19:47:51.277503 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.278438 kubelet[2029]: E0212 19:47:51.278422 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.278555 kubelet[2029]: W0212 19:47:51.278537 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.278705 kubelet[2029]: E0212 19:47:51.278687 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.292931 kubelet[2029]: E0212 19:47:51.292881 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.293246 kubelet[2029]: W0212 19:47:51.293215 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.293419 kubelet[2029]: E0212 19:47:51.293399 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.402348 kubelet[2029]: E0212 19:47:51.402127 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.403679 kubelet[2029]: W0212 19:47:51.403645 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.404018 kubelet[2029]: E0212 19:47:51.403986 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.406092 kubelet[2029]: E0212 19:47:51.406052 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.406339 kubelet[2029]: W0212 19:47:51.406313 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.406499 kubelet[2029]: E0212 19:47:51.406482 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.407179 kubelet[2029]: E0212 19:47:51.407141 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.407379 kubelet[2029]: W0212 19:47:51.407334 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.407584 kubelet[2029]: E0212 19:47:51.407563 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.408281 kubelet[2029]: E0212 19:47:51.408195 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.408454 kubelet[2029]: W0212 19:47:51.408416 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.408647 kubelet[2029]: E0212 19:47:51.408628 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.409307 kubelet[2029]: E0212 19:47:51.409282 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.409486 kubelet[2029]: W0212 19:47:51.409467 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.409672 kubelet[2029]: E0212 19:47:51.409654 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.510846 kubelet[2029]: E0212 19:47:51.510810 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.511097 kubelet[2029]: W0212 19:47:51.511071 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.511226 kubelet[2029]: E0212 19:47:51.511207 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.511952 kubelet[2029]: E0212 19:47:51.511927 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.512159 kubelet[2029]: W0212 19:47:51.512133 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.512275 kubelet[2029]: E0212 19:47:51.512259 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.512692 kubelet[2029]: E0212 19:47:51.512672 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.512897 kubelet[2029]: W0212 19:47:51.512876 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.513468 kubelet[2029]: E0212 19:47:51.513443 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.514054 kubelet[2029]: E0212 19:47:51.514032 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.514266 kubelet[2029]: W0212 19:47:51.514244 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.514409 kubelet[2029]: E0212 19:47:51.514393 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.516982 kubelet[2029]: E0212 19:47:51.516949 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.517257 kubelet[2029]: W0212 19:47:51.517228 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.517370 kubelet[2029]: E0212 19:47:51.517356 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.527839 kubelet[2029]: E0212 19:47:51.527796 2029 configmap.go:199] Couldn't get configMap calico-system/tigera-ca-bundle: failed to sync configmap cache: timed out waiting for the condition Feb 12 19:47:51.528302 kubelet[2029]: E0212 19:47:51.528255 2029 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/665ad505-b499-41f6-bb2a-439ab2593c43-tigera-ca-bundle podName:665ad505-b499-41f6-bb2a-439ab2593c43 nodeName:}" failed. No retries permitted until 2024-02-12 19:47:52.028222061 +0000 UTC m=+22.406412969 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "tigera-ca-bundle" (UniqueName: "kubernetes.io/configmap/665ad505-b499-41f6-bb2a-439ab2593c43-tigera-ca-bundle") pod "calico-typha-79574786d8-g4hvw" (UID: "665ad505-b499-41f6-bb2a-439ab2593c43") : failed to sync configmap cache: timed out waiting for the condition Feb 12 19:47:51.528957 kubelet[2029]: E0212 19:47:51.528081 2029 secret.go:194] Couldn't get secret calico-system/typha-certs: failed to sync secret cache: timed out waiting for the condition Feb 12 19:47:51.529203 kubelet[2029]: E0212 19:47:51.529178 2029 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/665ad505-b499-41f6-bb2a-439ab2593c43-typha-certs podName:665ad505-b499-41f6-bb2a-439ab2593c43 nodeName:}" failed. No retries permitted until 2024-02-12 19:47:52.029152419 +0000 UTC m=+22.407343320 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "typha-certs" (UniqueName: "kubernetes.io/secret/665ad505-b499-41f6-bb2a-439ab2593c43-typha-certs") pod "calico-typha-79574786d8-g4hvw" (UID: "665ad505-b499-41f6-bb2a-439ab2593c43") : failed to sync secret cache: timed out waiting for the condition Feb 12 19:47:51.619159 kubelet[2029]: E0212 19:47:51.619115 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.619443 kubelet[2029]: W0212 19:47:51.619414 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.619637 kubelet[2029]: E0212 19:47:51.619605 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.620266 kubelet[2029]: E0212 19:47:51.620240 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.620473 kubelet[2029]: W0212 19:47:51.620439 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.621144 kubelet[2029]: E0212 19:47:51.620896 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.621893 kubelet[2029]: E0212 19:47:51.621870 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.622057 kubelet[2029]: W0212 19:47:51.622036 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.622188 kubelet[2029]: E0212 19:47:51.622171 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.624890 kubelet[2029]: E0212 19:47:51.624626 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.624890 kubelet[2029]: W0212 19:47:51.624668 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.624890 kubelet[2029]: E0212 19:47:51.624698 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.626905 kubelet[2029]: E0212 19:47:51.626868 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.626905 kubelet[2029]: W0212 19:47:51.626897 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.627147 kubelet[2029]: E0212 19:47:51.626926 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.684757 kubelet[2029]: E0212 19:47:51.684528 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.684757 kubelet[2029]: W0212 19:47:51.684559 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.684757 kubelet[2029]: E0212 19:47:51.684591 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.727559 kubelet[2029]: E0212 19:47:51.727526 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.727913 kubelet[2029]: W0212 19:47:51.727886 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.728063 kubelet[2029]: E0212 19:47:51.728044 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.728603 kubelet[2029]: E0212 19:47:51.728580 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.728789 kubelet[2029]: W0212 19:47:51.728765 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.728885 kubelet[2029]: E0212 19:47:51.728873 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.729356 kubelet[2029]: E0212 19:47:51.729338 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.729527 kubelet[2029]: W0212 19:47:51.729510 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.729644 kubelet[2029]: E0212 19:47:51.729629 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.730174 kubelet[2029]: E0212 19:47:51.730156 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.730313 kubelet[2029]: W0212 19:47:51.730297 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.730434 kubelet[2029]: E0212 19:47:51.730421 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.738171 kubelet[2029]: E0212 19:47:51.738125 2029 configmap.go:199] Couldn't get configMap calico-system/tigera-ca-bundle: failed to sync configmap cache: timed out waiting for the condition Feb 12 19:47:51.738845 kubelet[2029]: E0212 19:47:51.738281 2029 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/6aa22a5e-fe72-45de-8fda-4540fc03472f-tigera-ca-bundle podName:6aa22a5e-fe72-45de-8fda-4540fc03472f nodeName:}" failed. No retries permitted until 2024-02-12 19:47:52.23825478 +0000 UTC m=+22.616445671 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "tigera-ca-bundle" (UniqueName: "kubernetes.io/configmap/6aa22a5e-fe72-45de-8fda-4540fc03472f-tigera-ca-bundle") pod "calico-node-td4fw" (UID: "6aa22a5e-fe72-45de-8fda-4540fc03472f") : failed to sync configmap cache: timed out waiting for the condition Feb 12 19:47:51.746000 audit[2544]: NETFILTER_CFG table=filter:107 family=2 entries=14 op=nft_register_rule pid=2544 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:47:51.746000 audit[2544]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffe74472440 a2=0 a3=7ffe7447242c items=0 ppid=2189 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:51.746000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:47:51.748000 audit[2544]: NETFILTER_CFG table=nat:108 family=2 entries=20 op=nft_register_rule pid=2544 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:47:51.748000 audit[2544]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffe74472440 a2=0 a3=7ffe7447242c items=0 ppid=2189 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:51.748000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:47:51.832059 kubelet[2029]: E0212 19:47:51.831974 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.832363 kubelet[2029]: W0212 19:47:51.832336 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.832509 kubelet[2029]: E0212 19:47:51.832494 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.833126 kubelet[2029]: E0212 19:47:51.833103 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.833266 kubelet[2029]: W0212 19:47:51.833241 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.833403 kubelet[2029]: E0212 19:47:51.833378 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.833870 kubelet[2029]: E0212 19:47:51.833851 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.834017 kubelet[2029]: W0212 19:47:51.833998 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.834102 kubelet[2029]: E0212 19:47:51.834091 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.834580 kubelet[2029]: E0212 19:47:51.834562 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.834778 kubelet[2029]: W0212 19:47:51.834755 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.834959 kubelet[2029]: E0212 19:47:51.834933 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.886908 kubelet[2029]: E0212 19:47:51.886875 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.887164 kubelet[2029]: W0212 19:47:51.887137 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.887314 kubelet[2029]: E0212 19:47:51.887297 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.936448 kubelet[2029]: E0212 19:47:51.936321 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.936771 kubelet[2029]: W0212 19:47:51.936699 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.936967 kubelet[2029]: E0212 19:47:51.936945 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.937476 kubelet[2029]: E0212 19:47:51.937455 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.937657 kubelet[2029]: W0212 19:47:51.937635 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.937843 kubelet[2029]: E0212 19:47:51.937778 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:51.938347 kubelet[2029]: E0212 19:47:51.938327 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:51.938494 kubelet[2029]: W0212 19:47:51.938473 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:51.938662 kubelet[2029]: E0212 19:47:51.938644 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:52.040091 kubelet[2029]: E0212 19:47:52.040058 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:52.040313 kubelet[2029]: W0212 19:47:52.040292 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:52.040449 kubelet[2029]: E0212 19:47:52.040413 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:52.040978 kubelet[2029]: E0212 19:47:52.040955 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:52.041143 kubelet[2029]: W0212 19:47:52.041120 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:52.041257 kubelet[2029]: E0212 19:47:52.041242 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:52.041737 kubelet[2029]: E0212 19:47:52.041633 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:52.041737 kubelet[2029]: W0212 19:47:52.041659 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:52.041737 kubelet[2029]: E0212 19:47:52.041689 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:52.041993 kubelet[2029]: E0212 19:47:52.041977 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:52.041993 kubelet[2029]: W0212 19:47:52.041992 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:52.042096 kubelet[2029]: E0212 19:47:52.042013 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:52.042351 kubelet[2029]: E0212 19:47:52.042278 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:52.042351 kubelet[2029]: W0212 19:47:52.042306 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:52.042351 kubelet[2029]: E0212 19:47:52.042327 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:52.042628 kubelet[2029]: E0212 19:47:52.042583 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:52.042628 kubelet[2029]: W0212 19:47:52.042593 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:52.042628 kubelet[2029]: E0212 19:47:52.042609 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:52.043076 kubelet[2029]: E0212 19:47:52.043053 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:52.043076 kubelet[2029]: W0212 19:47:52.043070 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:52.043267 kubelet[2029]: E0212 19:47:52.043095 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:52.043401 kubelet[2029]: E0212 19:47:52.043387 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:52.043401 kubelet[2029]: W0212 19:47:52.043400 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:52.043529 kubelet[2029]: E0212 19:47:52.043416 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:52.043624 kubelet[2029]: E0212 19:47:52.043610 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:52.043624 kubelet[2029]: W0212 19:47:52.043623 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:52.043701 kubelet[2029]: E0212 19:47:52.043636 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:52.043874 kubelet[2029]: E0212 19:47:52.043860 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:52.043874 kubelet[2029]: W0212 19:47:52.043873 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:52.043969 kubelet[2029]: E0212 19:47:52.043890 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:52.044353 kubelet[2029]: E0212 19:47:52.044325 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:52.044353 kubelet[2029]: W0212 19:47:52.044342 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:52.044353 kubelet[2029]: E0212 19:47:52.044359 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:52.065935 kubelet[2029]: E0212 19:47:52.065879 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:52.065935 kubelet[2029]: W0212 19:47:52.065920 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:52.065935 kubelet[2029]: E0212 19:47:52.065952 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:52.144843 kubelet[2029]: E0212 19:47:52.144801 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:52.145348 kubelet[2029]: W0212 19:47:52.145312 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:52.145466 kubelet[2029]: E0212 19:47:52.145453 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:52.146067 kubelet[2029]: E0212 19:47:52.146042 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:52.146286 kubelet[2029]: W0212 19:47:52.146265 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:52.146411 kubelet[2029]: E0212 19:47:52.146395 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:52.247369 kubelet[2029]: E0212 19:47:52.247206 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:52.247612 kubelet[2029]: W0212 19:47:52.247580 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:52.247773 kubelet[2029]: E0212 19:47:52.247755 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:52.248330 kubelet[2029]: E0212 19:47:52.248307 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:52.248512 kubelet[2029]: W0212 19:47:52.248490 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:52.248630 kubelet[2029]: E0212 19:47:52.248614 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:52.249243 kubelet[2029]: E0212 19:47:52.249224 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:52.249406 kubelet[2029]: W0212 19:47:52.249386 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:52.249636 kubelet[2029]: E0212 19:47:52.249600 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:52.250146 kubelet[2029]: E0212 19:47:52.250129 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:52.250294 kubelet[2029]: W0212 19:47:52.250275 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:52.250509 kubelet[2029]: E0212 19:47:52.250491 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:52.252930 kubelet[2029]: E0212 19:47:52.252878 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:52.253122 kubelet[2029]: W0212 19:47:52.252921 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:52.253220 kubelet[2029]: E0212 19:47:52.253142 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:52.253891 kubelet[2029]: E0212 19:47:52.253851 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:52.253891 kubelet[2029]: W0212 19:47:52.253884 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:52.254294 kubelet[2029]: E0212 19:47:52.253927 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:52.256072 kubelet[2029]: E0212 19:47:52.256043 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:52.256072 kubelet[2029]: W0212 19:47:52.256065 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:52.256276 kubelet[2029]: E0212 19:47:52.256092 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:52.291024 kubelet[2029]: E0212 19:47:52.290974 2029 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bp7zv" podUID=1b086c16-44ff-4ae2-8b8c-0804a979d643 Feb 12 19:47:52.302412 kubelet[2029]: E0212 19:47:52.302165 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:52.303889 env[1106]: time="2024-02-12T19:47:52.303023884Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-td4fw,Uid:6aa22a5e-fe72-45de-8fda-4540fc03472f,Namespace:calico-system,Attempt:0,}" Feb 12 19:47:52.350460 kubelet[2029]: E0212 19:47:52.350420 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:52.350822 kubelet[2029]: W0212 19:47:52.350789 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:52.351046 kubelet[2029]: E0212 19:47:52.351005 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:52.371254 env[1106]: time="2024-02-12T19:47:52.371050220Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:47:52.371254 env[1106]: time="2024-02-12T19:47:52.371145247Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:47:52.371254 env[1106]: time="2024-02-12T19:47:52.371164509Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:47:52.373242 env[1106]: time="2024-02-12T19:47:52.372896638Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/361d5d9f662e7b52528d5f59b2d76df27bf7f90ad995ef45ae9072f0aa2bed91 pid=2586 runtime=io.containerd.runc.v2 Feb 12 19:47:52.420011 systemd[1]: run-containerd-runc-k8s.io-361d5d9f662e7b52528d5f59b2d76df27bf7f90ad995ef45ae9072f0aa2bed91-runc.1NtPs9.mount: Deactivated successfully. Feb 12 19:47:52.433373 systemd[1]: Started cri-containerd-361d5d9f662e7b52528d5f59b2d76df27bf7f90ad995ef45ae9072f0aa2bed91.scope. Feb 12 19:47:52.452760 kubelet[2029]: E0212 19:47:52.452643 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:52.452760 kubelet[2029]: W0212 19:47:52.452739 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:52.452760 kubelet[2029]: E0212 19:47:52.452764 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:52.474714 kubelet[2029]: E0212 19:47:52.474662 2029 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:47:52.474714 kubelet[2029]: W0212 19:47:52.474706 2029 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:47:52.474714 kubelet[2029]: E0212 19:47:52.474754 2029 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:47:52.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.479000 audit: BPF prog-id=121 op=LOAD Feb 12 19:47:52.480000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.480000 audit[2596]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2586 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:52.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336316435643966363632653762353235323864356635396232643736 Feb 12 19:47:52.480000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.480000 audit[2596]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2586 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:52.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336316435643966363632653762353235323864356635396232643736 Feb 12 19:47:52.481000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.481000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.481000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.481000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.481000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.481000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.481000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.481000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.481000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.481000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.481000 audit: BPF prog-id=122 op=LOAD Feb 12 19:47:52.481000 audit[2596]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00020a810 items=0 ppid=2586 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:52.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336316435643966363632653762353235323864356635396232643736 Feb 12 19:47:52.482000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.482000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.482000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.482000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.482000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.482000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.482000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.482000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.482000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.482000 audit: BPF prog-id=123 op=LOAD Feb 12 19:47:52.482000 audit[2596]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00020a858 items=0 ppid=2586 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:52.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336316435643966363632653762353235323864356635396232643736 Feb 12 19:47:52.483000 audit: BPF prog-id=123 op=UNLOAD Feb 12 19:47:52.483000 audit: BPF prog-id=122 op=UNLOAD Feb 12 19:47:52.483000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.483000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.483000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.483000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.483000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.483000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.483000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.483000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.483000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.483000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.483000 audit: BPF prog-id=124 op=LOAD Feb 12 19:47:52.483000 audit[2596]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00020ac68 items=0 ppid=2586 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:52.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336316435643966363632653762353235323864356635396232643736 Feb 12 19:47:52.513924 env[1106]: time="2024-02-12T19:47:52.513744004Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-td4fw,Uid:6aa22a5e-fe72-45de-8fda-4540fc03472f,Namespace:calico-system,Attempt:0,} returns sandbox id \"361d5d9f662e7b52528d5f59b2d76df27bf7f90ad995ef45ae9072f0aa2bed91\"" Feb 12 19:47:52.521210 kubelet[2029]: E0212 19:47:52.520970 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:52.523966 env[1106]: time="2024-02-12T19:47:52.523903878Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 19:47:52.663995 kubelet[2029]: E0212 19:47:52.663920 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:52.664873 env[1106]: time="2024-02-12T19:47:52.664813238Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-79574786d8-g4hvw,Uid:665ad505-b499-41f6-bb2a-439ab2593c43,Namespace:calico-system,Attempt:0,}" Feb 12 19:47:52.703767 env[1106]: time="2024-02-12T19:47:52.703614188Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:47:52.704020 env[1106]: time="2024-02-12T19:47:52.703979021Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:47:52.704198 env[1106]: time="2024-02-12T19:47:52.704140583Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:47:52.705070 env[1106]: time="2024-02-12T19:47:52.704817584Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9acdc21f152cabfb8101a758ea9ab4ca678df037951e5e975e4381de102440d0 pid=2633 runtime=io.containerd.runc.v2 Feb 12 19:47:52.730573 systemd[1]: Started cri-containerd-9acdc21f152cabfb8101a758ea9ab4ca678df037951e5e975e4381de102440d0.scope. Feb 12 19:47:52.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.773000 audit: BPF prog-id=125 op=LOAD Feb 12 19:47:52.774000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.774000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001b3c48 a2=10 a3=1c items=0 ppid=2633 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:52.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961636463323166313532636162666238313031613735386561396162 Feb 12 19:47:52.775000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.775000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001b36b0 a2=3c a3=c items=0 ppid=2633 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:52.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961636463323166313532636162666238313031613735386561396162 Feb 12 19:47:52.775000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.775000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.775000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.775000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.775000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.775000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.775000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.775000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.775000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.775000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.775000 audit: BPF prog-id=126 op=LOAD Feb 12 19:47:52.775000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001b39d8 a2=78 a3=c00017f440 items=0 ppid=2633 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:52.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961636463323166313532636162666238313031613735386561396162 Feb 12 19:47:52.775000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.775000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.775000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.775000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.775000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.775000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.775000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.775000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.775000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.775000 audit: BPF prog-id=127 op=LOAD Feb 12 19:47:52.775000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001b3770 a2=78 a3=c00017f488 items=0 ppid=2633 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:52.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961636463323166313532636162666238313031613735386561396162 Feb 12 19:47:52.775000 audit: BPF prog-id=127 op=UNLOAD Feb 12 19:47:52.775000 audit: BPF prog-id=126 op=UNLOAD Feb 12 19:47:52.776000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.776000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.776000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.776000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.776000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.776000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.776000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.776000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.776000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.776000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:52.776000 audit: BPF prog-id=128 op=LOAD Feb 12 19:47:52.776000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001b3c30 a2=78 a3=c00017f898 items=0 ppid=2633 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:52.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961636463323166313532636162666238313031613735386561396162 Feb 12 19:47:52.861588 env[1106]: time="2024-02-12T19:47:52.861359364Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-79574786d8-g4hvw,Uid:665ad505-b499-41f6-bb2a-439ab2593c43,Namespace:calico-system,Attempt:0,} returns sandbox id \"9acdc21f152cabfb8101a758ea9ab4ca678df037951e5e975e4381de102440d0\"" Feb 12 19:47:52.862827 kubelet[2029]: E0212 19:47:52.862526 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:52.915000 audit[2691]: NETFILTER_CFG table=filter:109 family=2 entries=14 op=nft_register_rule pid=2691 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:47:52.915000 audit[2691]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffe6d319f90 a2=0 a3=7ffe6d319f7c items=0 ppid=2189 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:52.915000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:47:52.917000 audit[2691]: NETFILTER_CFG table=nat:110 family=2 entries=20 op=nft_register_rule pid=2691 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:47:52.917000 audit[2691]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffe6d319f90 a2=0 a3=7ffe6d319f7c items=0 ppid=2189 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:52.917000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:47:54.291116 kubelet[2029]: E0212 19:47:54.290471 2029 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bp7zv" podUID=1b086c16-44ff-4ae2-8b8c-0804a979d643 Feb 12 19:47:55.842786 env[1106]: time="2024-02-12T19:47:55.842674020Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:55.850099 env[1106]: time="2024-02-12T19:47:55.849996552Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:55.870330 env[1106]: time="2024-02-12T19:47:55.870233943Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:55.876219 env[1106]: time="2024-02-12T19:47:55.876161700Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:55.884791 env[1106]: time="2024-02-12T19:47:55.877384807Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 12 19:47:55.888943 env[1106]: time="2024-02-12T19:47:55.887299480Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 12 19:47:55.896146 env[1106]: time="2024-02-12T19:47:55.896094400Z" level=info msg="CreateContainer within sandbox \"361d5d9f662e7b52528d5f59b2d76df27bf7f90ad995ef45ae9072f0aa2bed91\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 19:47:55.920255 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1359351036.mount: Deactivated successfully. Feb 12 19:47:55.927259 env[1106]: time="2024-02-12T19:47:55.927185347Z" level=info msg="CreateContainer within sandbox \"361d5d9f662e7b52528d5f59b2d76df27bf7f90ad995ef45ae9072f0aa2bed91\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"d632417d4227767741cbd99ae2d9a7f754dd4a878f6ed989bbc9f447fd7c0fa2\"" Feb 12 19:47:55.928190 env[1106]: time="2024-02-12T19:47:55.928122170Z" level=info msg="StartContainer for \"d632417d4227767741cbd99ae2d9a7f754dd4a878f6ed989bbc9f447fd7c0fa2\"" Feb 12 19:47:55.980106 systemd[1]: Started cri-containerd-d632417d4227767741cbd99ae2d9a7f754dd4a878f6ed989bbc9f447fd7c0fa2.scope. Feb 12 19:47:56.021266 kernel: kauditd_printk_skb: 128 callbacks suppressed Feb 12 19:47:56.021522 kernel: audit: type=1400 audit(1707767276.015:1098): avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.015000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.015000 audit[2701]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2586 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:56.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436333234313764343232373736373734316362643939616532643961 Feb 12 19:47:56.032978 kernel: audit: type=1300 audit(1707767276.015:1098): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2586 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:56.033149 kernel: audit: type=1327 audit(1707767276.015:1098): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436333234313764343232373736373734316362643939616532643961 Feb 12 19:47:56.015000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.015000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.045860 kernel: audit: type=1400 audit(1707767276.015:1099): avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.046028 kernel: audit: type=1400 audit(1707767276.015:1099): avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.046067 kernel: audit: type=1400 audit(1707767276.015:1099): avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.046105 kernel: audit: type=1400 audit(1707767276.015:1099): avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.015000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.015000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.015000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.054796 kernel: audit: type=1400 audit(1707767276.015:1099): avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.015000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.058832 kernel: audit: type=1400 audit(1707767276.015:1099): avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.015000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.072809 kernel: audit: type=1400 audit(1707767276.015:1099): avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.015000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.015000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.015000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.015000 audit: BPF prog-id=129 op=LOAD Feb 12 19:47:56.015000 audit[2701]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000228ce0 items=0 ppid=2586 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:56.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436333234313764343232373736373734316362643939616532643961 Feb 12 19:47:56.020000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.020000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.020000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.020000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.020000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.020000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.020000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.020000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.020000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.020000 audit: BPF prog-id=130 op=LOAD Feb 12 19:47:56.020000 audit[2701]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000228d28 items=0 ppid=2586 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:56.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436333234313764343232373736373734316362643939616532643961 Feb 12 19:47:56.020000 audit: BPF prog-id=130 op=UNLOAD Feb 12 19:47:56.020000 audit: BPF prog-id=129 op=UNLOAD Feb 12 19:47:56.020000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.020000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.020000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.020000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.020000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.020000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.020000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.020000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.020000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.020000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:56.020000 audit: BPF prog-id=131 op=LOAD Feb 12 19:47:56.020000 audit[2701]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000228db8 items=0 ppid=2586 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:56.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436333234313764343232373736373734316362643939616532643961 Feb 12 19:47:56.080136 env[1106]: time="2024-02-12T19:47:56.080068933Z" level=info msg="StartContainer for \"d632417d4227767741cbd99ae2d9a7f754dd4a878f6ed989bbc9f447fd7c0fa2\" returns successfully" Feb 12 19:47:56.101241 systemd[1]: cri-containerd-d632417d4227767741cbd99ae2d9a7f754dd4a878f6ed989bbc9f447fd7c0fa2.scope: Deactivated successfully. Feb 12 19:47:56.104000 audit: BPF prog-id=131 op=UNLOAD Feb 12 19:47:56.191348 env[1106]: time="2024-02-12T19:47:56.191279341Z" level=info msg="shim disconnected" id=d632417d4227767741cbd99ae2d9a7f754dd4a878f6ed989bbc9f447fd7c0fa2 Feb 12 19:47:56.194430 env[1106]: time="2024-02-12T19:47:56.194372085Z" level=warning msg="cleaning up after shim disconnected" id=d632417d4227767741cbd99ae2d9a7f754dd4a878f6ed989bbc9f447fd7c0fa2 namespace=k8s.io Feb 12 19:47:56.194691 env[1106]: time="2024-02-12T19:47:56.194665969Z" level=info msg="cleaning up dead shim" Feb 12 19:47:56.210909 env[1106]: time="2024-02-12T19:47:56.210811963Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:47:56Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2745 runtime=io.containerd.runc.v2\n" Feb 12 19:47:56.289942 kubelet[2029]: E0212 19:47:56.289897 2029 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bp7zv" podUID=1b086c16-44ff-4ae2-8b8c-0804a979d643 Feb 12 19:47:56.424124 env[1106]: time="2024-02-12T19:47:56.424001677Z" level=info msg="StopPodSandbox for \"361d5d9f662e7b52528d5f59b2d76df27bf7f90ad995ef45ae9072f0aa2bed91\"" Feb 12 19:47:56.424371 env[1106]: time="2024-02-12T19:47:56.424333472Z" level=info msg="Container to stop \"d632417d4227767741cbd99ae2d9a7f754dd4a878f6ed989bbc9f447fd7c0fa2\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Feb 12 19:47:56.438000 audit: BPF prog-id=121 op=UNLOAD Feb 12 19:47:56.438592 systemd[1]: cri-containerd-361d5d9f662e7b52528d5f59b2d76df27bf7f90ad995ef45ae9072f0aa2bed91.scope: Deactivated successfully. Feb 12 19:47:56.443000 audit: BPF prog-id=124 op=UNLOAD Feb 12 19:47:56.479594 env[1106]: time="2024-02-12T19:47:56.479529983Z" level=info msg="shim disconnected" id=361d5d9f662e7b52528d5f59b2d76df27bf7f90ad995ef45ae9072f0aa2bed91 Feb 12 19:47:56.480157 env[1106]: time="2024-02-12T19:47:56.480117540Z" level=warning msg="cleaning up after shim disconnected" id=361d5d9f662e7b52528d5f59b2d76df27bf7f90ad995ef45ae9072f0aa2bed91 namespace=k8s.io Feb 12 19:47:56.480324 env[1106]: time="2024-02-12T19:47:56.480301752Z" level=info msg="cleaning up dead shim" Feb 12 19:47:56.500245 env[1106]: time="2024-02-12T19:47:56.500166614Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:47:56Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2778 runtime=io.containerd.runc.v2\n" Feb 12 19:47:56.504265 env[1106]: time="2024-02-12T19:47:56.504181245Z" level=info msg="TearDown network for sandbox \"361d5d9f662e7b52528d5f59b2d76df27bf7f90ad995ef45ae9072f0aa2bed91\" successfully" Feb 12 19:47:56.504824 env[1106]: time="2024-02-12T19:47:56.504695558Z" level=info msg="StopPodSandbox for \"361d5d9f662e7b52528d5f59b2d76df27bf7f90ad995ef45ae9072f0aa2bed91\" returns successfully" Feb 12 19:47:56.698641 kubelet[2029]: I0212 19:47:56.698512 2029 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-flexvol-driver-host\") pod \"6aa22a5e-fe72-45de-8fda-4540fc03472f\" (UID: \"6aa22a5e-fe72-45de-8fda-4540fc03472f\") " Feb 12 19:47:56.699102 kubelet[2029]: I0212 19:47:56.699078 2029 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-cni-net-dir\") pod \"6aa22a5e-fe72-45de-8fda-4540fc03472f\" (UID: \"6aa22a5e-fe72-45de-8fda-4540fc03472f\") " Feb 12 19:47:56.699313 kubelet[2029]: I0212 19:47:56.699292 2029 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-cni-log-dir\") pod \"6aa22a5e-fe72-45de-8fda-4540fc03472f\" (UID: \"6aa22a5e-fe72-45de-8fda-4540fc03472f\") " Feb 12 19:47:56.699456 kubelet[2029]: I0212 19:47:56.699439 2029 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-var-lib-calico\") pod \"6aa22a5e-fe72-45de-8fda-4540fc03472f\" (UID: \"6aa22a5e-fe72-45de-8fda-4540fc03472f\") " Feb 12 19:47:56.699566 kubelet[2029]: I0212 19:47:56.699552 2029 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-cni-bin-dir\") pod \"6aa22a5e-fe72-45de-8fda-4540fc03472f\" (UID: \"6aa22a5e-fe72-45de-8fda-4540fc03472f\") " Feb 12 19:47:56.699697 kubelet[2029]: I0212 19:47:56.699661 2029 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-lib-modules\") pod \"6aa22a5e-fe72-45de-8fda-4540fc03472f\" (UID: \"6aa22a5e-fe72-45de-8fda-4540fc03472f\") " Feb 12 19:47:56.699880 kubelet[2029]: I0212 19:47:56.699861 2029 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/6aa22a5e-fe72-45de-8fda-4540fc03472f-node-certs\") pod \"6aa22a5e-fe72-45de-8fda-4540fc03472f\" (UID: \"6aa22a5e-fe72-45de-8fda-4540fc03472f\") " Feb 12 19:47:56.700010 kubelet[2029]: I0212 19:47:56.699991 2029 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-var-run-calico\") pod \"6aa22a5e-fe72-45de-8fda-4540fc03472f\" (UID: \"6aa22a5e-fe72-45de-8fda-4540fc03472f\") " Feb 12 19:47:56.700155 kubelet[2029]: I0212 19:47:56.700122 2029 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"kube-api-access-jvbwc\" (UniqueName: \"kubernetes.io/projected/6aa22a5e-fe72-45de-8fda-4540fc03472f-kube-api-access-jvbwc\") pod \"6aa22a5e-fe72-45de-8fda-4540fc03472f\" (UID: \"6aa22a5e-fe72-45de-8fda-4540fc03472f\") " Feb 12 19:47:56.700281 kubelet[2029]: I0212 19:47:56.700269 2029 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6aa22a5e-fe72-45de-8fda-4540fc03472f-tigera-ca-bundle\") pod \"6aa22a5e-fe72-45de-8fda-4540fc03472f\" (UID: \"6aa22a5e-fe72-45de-8fda-4540fc03472f\") " Feb 12 19:47:56.700369 kubelet[2029]: I0212 19:47:56.700359 2029 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-policysync\") pod \"6aa22a5e-fe72-45de-8fda-4540fc03472f\" (UID: \"6aa22a5e-fe72-45de-8fda-4540fc03472f\") " Feb 12 19:47:56.700462 kubelet[2029]: I0212 19:47:56.700451 2029 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-xtables-lock\") pod \"6aa22a5e-fe72-45de-8fda-4540fc03472f\" (UID: \"6aa22a5e-fe72-45de-8fda-4540fc03472f\") " Feb 12 19:47:56.700622 kubelet[2029]: I0212 19:47:56.700601 2029 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "6aa22a5e-fe72-45de-8fda-4540fc03472f" (UID: "6aa22a5e-fe72-45de-8fda-4540fc03472f"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 19:47:56.700783 kubelet[2029]: I0212 19:47:56.699791 2029 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "6aa22a5e-fe72-45de-8fda-4540fc03472f" (UID: "6aa22a5e-fe72-45de-8fda-4540fc03472f"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 19:47:56.701298 kubelet[2029]: I0212 19:47:56.699872 2029 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "6aa22a5e-fe72-45de-8fda-4540fc03472f" (UID: "6aa22a5e-fe72-45de-8fda-4540fc03472f"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 19:47:56.701479 kubelet[2029]: I0212 19:47:56.698985 2029 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "6aa22a5e-fe72-45de-8fda-4540fc03472f" (UID: "6aa22a5e-fe72-45de-8fda-4540fc03472f"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 19:47:56.701595 kubelet[2029]: I0212 19:47:56.699894 2029 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "6aa22a5e-fe72-45de-8fda-4540fc03472f" (UID: "6aa22a5e-fe72-45de-8fda-4540fc03472f"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 19:47:56.701864 kubelet[2029]: I0212 19:47:56.699916 2029 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "6aa22a5e-fe72-45de-8fda-4540fc03472f" (UID: "6aa22a5e-fe72-45de-8fda-4540fc03472f"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 19:47:56.701981 kubelet[2029]: I0212 19:47:56.699932 2029 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "6aa22a5e-fe72-45de-8fda-4540fc03472f" (UID: "6aa22a5e-fe72-45de-8fda-4540fc03472f"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 19:47:56.702099 kubelet[2029]: I0212 19:47:56.702075 2029 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "6aa22a5e-fe72-45de-8fda-4540fc03472f" (UID: "6aa22a5e-fe72-45de-8fda-4540fc03472f"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 19:47:56.702650 kubelet[2029]: W0212 19:47:56.702599 2029 empty_dir.go:525] Warning: Failed to clear quota on /var/lib/kubelet/pods/6aa22a5e-fe72-45de-8fda-4540fc03472f/volumes/kubernetes.io~configmap/tigera-ca-bundle: clearQuota called, but quotas disabled Feb 12 19:47:56.703176 kubelet[2029]: I0212 19:47:56.703148 2029 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/6aa22a5e-fe72-45de-8fda-4540fc03472f-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "6aa22a5e-fe72-45de-8fda-4540fc03472f" (UID: "6aa22a5e-fe72-45de-8fda-4540fc03472f"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Feb 12 19:47:56.703347 kubelet[2029]: I0212 19:47:56.703328 2029 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-policysync" (OuterVolumeSpecName: "policysync") pod "6aa22a5e-fe72-45de-8fda-4540fc03472f" (UID: "6aa22a5e-fe72-45de-8fda-4540fc03472f"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 19:47:56.710637 kubelet[2029]: I0212 19:47:56.710586 2029 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/6aa22a5e-fe72-45de-8fda-4540fc03472f-kube-api-access-jvbwc" (OuterVolumeSpecName: "kube-api-access-jvbwc") pod "6aa22a5e-fe72-45de-8fda-4540fc03472f" (UID: "6aa22a5e-fe72-45de-8fda-4540fc03472f"). InnerVolumeSpecName "kube-api-access-jvbwc". PluginName "kubernetes.io/projected", VolumeGidValue "" Feb 12 19:47:56.713055 kubelet[2029]: I0212 19:47:56.712944 2029 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/6aa22a5e-fe72-45de-8fda-4540fc03472f-node-certs" (OuterVolumeSpecName: "node-certs") pod "6aa22a5e-fe72-45de-8fda-4540fc03472f" (UID: "6aa22a5e-fe72-45de-8fda-4540fc03472f"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Feb 12 19:47:56.801123 kubelet[2029]: I0212 19:47:56.800882 2029 reconciler_common.go:295] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-cni-net-dir\") on node \"ci-3510.3.2-d-344270592c\" DevicePath \"\"" Feb 12 19:47:56.801473 kubelet[2029]: I0212 19:47:56.801452 2029 reconciler_common.go:295] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-cni-log-dir\") on node \"ci-3510.3.2-d-344270592c\" DevicePath \"\"" Feb 12 19:47:56.801608 kubelet[2029]: I0212 19:47:56.801594 2029 reconciler_common.go:295] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-var-lib-calico\") on node \"ci-3510.3.2-d-344270592c\" DevicePath \"\"" Feb 12 19:47:56.801715 kubelet[2029]: I0212 19:47:56.801702 2029 reconciler_common.go:295] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-lib-modules\") on node \"ci-3510.3.2-d-344270592c\" DevicePath \"\"" Feb 12 19:47:56.801926 kubelet[2029]: I0212 19:47:56.801863 2029 reconciler_common.go:295] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/6aa22a5e-fe72-45de-8fda-4540fc03472f-node-certs\") on node \"ci-3510.3.2-d-344270592c\" DevicePath \"\"" Feb 12 19:47:56.802152 kubelet[2029]: I0212 19:47:56.802131 2029 reconciler_common.go:295] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-cni-bin-dir\") on node \"ci-3510.3.2-d-344270592c\" DevicePath \"\"" Feb 12 19:47:56.802263 kubelet[2029]: I0212 19:47:56.802250 2029 reconciler_common.go:295] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-var-run-calico\") on node \"ci-3510.3.2-d-344270592c\" DevicePath \"\"" Feb 12 19:47:56.802353 kubelet[2029]: I0212 19:47:56.802341 2029 reconciler_common.go:295] "Volume detached for volume \"kube-api-access-jvbwc\" (UniqueName: \"kubernetes.io/projected/6aa22a5e-fe72-45de-8fda-4540fc03472f-kube-api-access-jvbwc\") on node \"ci-3510.3.2-d-344270592c\" DevicePath \"\"" Feb 12 19:47:56.802445 kubelet[2029]: I0212 19:47:56.802434 2029 reconciler_common.go:295] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-policysync\") on node \"ci-3510.3.2-d-344270592c\" DevicePath \"\"" Feb 12 19:47:56.802517 kubelet[2029]: I0212 19:47:56.802507 2029 reconciler_common.go:295] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-xtables-lock\") on node \"ci-3510.3.2-d-344270592c\" DevicePath \"\"" Feb 12 19:47:56.802599 kubelet[2029]: I0212 19:47:56.802589 2029 reconciler_common.go:295] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6aa22a5e-fe72-45de-8fda-4540fc03472f-tigera-ca-bundle\") on node \"ci-3510.3.2-d-344270592c\" DevicePath \"\"" Feb 12 19:47:56.802772 kubelet[2029]: I0212 19:47:56.802749 2029 reconciler_common.go:295] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/6aa22a5e-fe72-45de-8fda-4540fc03472f-flexvol-driver-host\") on node \"ci-3510.3.2-d-344270592c\" DevicePath \"\"" Feb 12 19:47:56.915695 systemd[1]: run-containerd-runc-k8s.io-d632417d4227767741cbd99ae2d9a7f754dd4a878f6ed989bbc9f447fd7c0fa2-runc.GUWVIR.mount: Deactivated successfully. Feb 12 19:47:56.916389 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d632417d4227767741cbd99ae2d9a7f754dd4a878f6ed989bbc9f447fd7c0fa2-rootfs.mount: Deactivated successfully. Feb 12 19:47:56.916664 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-361d5d9f662e7b52528d5f59b2d76df27bf7f90ad995ef45ae9072f0aa2bed91-rootfs.mount: Deactivated successfully. Feb 12 19:47:56.916940 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-361d5d9f662e7b52528d5f59b2d76df27bf7f90ad995ef45ae9072f0aa2bed91-shm.mount: Deactivated successfully. Feb 12 19:47:56.917353 systemd[1]: var-lib-kubelet-pods-6aa22a5e\x2dfe72\x2d45de\x2d8fda\x2d4540fc03472f-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2djvbwc.mount: Deactivated successfully. Feb 12 19:47:56.917696 systemd[1]: var-lib-kubelet-pods-6aa22a5e\x2dfe72\x2d45de\x2d8fda\x2d4540fc03472f-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Feb 12 19:47:57.427829 kubelet[2029]: I0212 19:47:57.426953 2029 scope.go:115] "RemoveContainer" containerID="d632417d4227767741cbd99ae2d9a7f754dd4a878f6ed989bbc9f447fd7c0fa2" Feb 12 19:47:57.430762 systemd[1]: Removed slice kubepods-besteffort-pod6aa22a5e_fe72_45de_8fda_4540fc03472f.slice. Feb 12 19:47:57.433070 env[1106]: time="2024-02-12T19:47:57.433016500Z" level=info msg="RemoveContainer for \"d632417d4227767741cbd99ae2d9a7f754dd4a878f6ed989bbc9f447fd7c0fa2\"" Feb 12 19:47:57.437428 env[1106]: time="2024-02-12T19:47:57.437378102Z" level=info msg="RemoveContainer for \"d632417d4227767741cbd99ae2d9a7f754dd4a878f6ed989bbc9f447fd7c0fa2\" returns successfully" Feb 12 19:47:57.482300 kubelet[2029]: I0212 19:47:57.482253 2029 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:47:57.482588 kubelet[2029]: E0212 19:47:57.482405 2029 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="6aa22a5e-fe72-45de-8fda-4540fc03472f" containerName="flexvol-driver" Feb 12 19:47:57.482588 kubelet[2029]: I0212 19:47:57.482451 2029 memory_manager.go:346] "RemoveStaleState removing state" podUID="6aa22a5e-fe72-45de-8fda-4540fc03472f" containerName="flexvol-driver" Feb 12 19:47:57.505827 systemd[1]: Created slice kubepods-besteffort-podbce1eaa7_d7f6_44b0_9ca3_dcfe1cc01deb.slice. Feb 12 19:47:57.528737 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3992883559.mount: Deactivated successfully. Feb 12 19:47:57.607916 kubelet[2029]: I0212 19:47:57.607866 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/bce1eaa7-d7f6-44b0-9ca3-dcfe1cc01deb-policysync\") pod \"calico-node-27czq\" (UID: \"bce1eaa7-d7f6-44b0-9ca3-dcfe1cc01deb\") " pod="calico-system/calico-node-27czq" Feb 12 19:47:57.607916 kubelet[2029]: I0212 19:47:57.607923 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g5wzf\" (UniqueName: \"kubernetes.io/projected/bce1eaa7-d7f6-44b0-9ca3-dcfe1cc01deb-kube-api-access-g5wzf\") pod \"calico-node-27czq\" (UID: \"bce1eaa7-d7f6-44b0-9ca3-dcfe1cc01deb\") " pod="calico-system/calico-node-27czq" Feb 12 19:47:57.608312 kubelet[2029]: I0212 19:47:57.607962 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/bce1eaa7-d7f6-44b0-9ca3-dcfe1cc01deb-lib-modules\") pod \"calico-node-27czq\" (UID: \"bce1eaa7-d7f6-44b0-9ca3-dcfe1cc01deb\") " pod="calico-system/calico-node-27czq" Feb 12 19:47:57.608312 kubelet[2029]: I0212 19:47:57.608004 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/bce1eaa7-d7f6-44b0-9ca3-dcfe1cc01deb-var-lib-calico\") pod \"calico-node-27czq\" (UID: \"bce1eaa7-d7f6-44b0-9ca3-dcfe1cc01deb\") " pod="calico-system/calico-node-27czq" Feb 12 19:47:57.608312 kubelet[2029]: I0212 19:47:57.608031 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/bce1eaa7-d7f6-44b0-9ca3-dcfe1cc01deb-cni-net-dir\") pod \"calico-node-27czq\" (UID: \"bce1eaa7-d7f6-44b0-9ca3-dcfe1cc01deb\") " pod="calico-system/calico-node-27czq" Feb 12 19:47:57.608312 kubelet[2029]: I0212 19:47:57.608063 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/bce1eaa7-d7f6-44b0-9ca3-dcfe1cc01deb-xtables-lock\") pod \"calico-node-27czq\" (UID: \"bce1eaa7-d7f6-44b0-9ca3-dcfe1cc01deb\") " pod="calico-system/calico-node-27czq" Feb 12 19:47:57.608312 kubelet[2029]: I0212 19:47:57.608095 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/bce1eaa7-d7f6-44b0-9ca3-dcfe1cc01deb-tigera-ca-bundle\") pod \"calico-node-27czq\" (UID: \"bce1eaa7-d7f6-44b0-9ca3-dcfe1cc01deb\") " pod="calico-system/calico-node-27czq" Feb 12 19:47:57.608572 kubelet[2029]: I0212 19:47:57.608163 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/bce1eaa7-d7f6-44b0-9ca3-dcfe1cc01deb-var-run-calico\") pod \"calico-node-27czq\" (UID: \"bce1eaa7-d7f6-44b0-9ca3-dcfe1cc01deb\") " pod="calico-system/calico-node-27czq" Feb 12 19:47:57.608572 kubelet[2029]: I0212 19:47:57.608194 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/bce1eaa7-d7f6-44b0-9ca3-dcfe1cc01deb-node-certs\") pod \"calico-node-27czq\" (UID: \"bce1eaa7-d7f6-44b0-9ca3-dcfe1cc01deb\") " pod="calico-system/calico-node-27czq" Feb 12 19:47:57.608572 kubelet[2029]: I0212 19:47:57.608216 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/bce1eaa7-d7f6-44b0-9ca3-dcfe1cc01deb-cni-bin-dir\") pod \"calico-node-27czq\" (UID: \"bce1eaa7-d7f6-44b0-9ca3-dcfe1cc01deb\") " pod="calico-system/calico-node-27czq" Feb 12 19:47:57.608572 kubelet[2029]: I0212 19:47:57.608240 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/bce1eaa7-d7f6-44b0-9ca3-dcfe1cc01deb-cni-log-dir\") pod \"calico-node-27czq\" (UID: \"bce1eaa7-d7f6-44b0-9ca3-dcfe1cc01deb\") " pod="calico-system/calico-node-27czq" Feb 12 19:47:57.608572 kubelet[2029]: I0212 19:47:57.608272 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/bce1eaa7-d7f6-44b0-9ca3-dcfe1cc01deb-flexvol-driver-host\") pod \"calico-node-27czq\" (UID: \"bce1eaa7-d7f6-44b0-9ca3-dcfe1cc01deb\") " pod="calico-system/calico-node-27czq" Feb 12 19:47:57.815775 kubelet[2029]: E0212 19:47:57.815603 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:57.816616 env[1106]: time="2024-02-12T19:47:57.816522231Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-27czq,Uid:bce1eaa7-d7f6-44b0-9ca3-dcfe1cc01deb,Namespace:calico-system,Attempt:0,}" Feb 12 19:47:57.863949 env[1106]: time="2024-02-12T19:47:57.860182247Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:47:57.864313 env[1106]: time="2024-02-12T19:47:57.864256437Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:47:57.864561 env[1106]: time="2024-02-12T19:47:57.864525488Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:47:57.865171 env[1106]: time="2024-02-12T19:47:57.865121054Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/709646d3ebd14964f620b442c5f0235daccc33912f8367bfa06a023257f43d65 pid=2807 runtime=io.containerd.runc.v2 Feb 12 19:47:57.888379 systemd[1]: Started cri-containerd-709646d3ebd14964f620b442c5f0235daccc33912f8367bfa06a023257f43d65.scope. Feb 12 19:47:57.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.923000 audit: BPF prog-id=132 op=LOAD Feb 12 19:47:57.925000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.925000 audit[2819]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2807 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:57.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730393634366433656264313439363466363230623434326335663032 Feb 12 19:47:57.926000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.926000 audit[2819]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2807 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:57.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730393634366433656264313439363466363230623434326335663032 Feb 12 19:47:57.927000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.927000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.927000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.927000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.927000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.927000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.927000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.927000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.927000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.927000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.927000 audit: BPF prog-id=133 op=LOAD Feb 12 19:47:57.927000 audit[2819]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00015f580 items=0 ppid=2807 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:57.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730393634366433656264313439363466363230623434326335663032 Feb 12 19:47:57.928000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.928000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.928000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.928000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.928000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.928000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.928000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.928000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.928000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.928000 audit: BPF prog-id=134 op=LOAD Feb 12 19:47:57.928000 audit[2819]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00015f5c8 items=0 ppid=2807 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:57.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730393634366433656264313439363466363230623434326335663032 Feb 12 19:47:57.948000 audit: BPF prog-id=134 op=UNLOAD Feb 12 19:47:57.949000 audit: BPF prog-id=133 op=UNLOAD Feb 12 19:47:57.949000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.949000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.949000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.949000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.949000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.949000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.949000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.949000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.949000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.949000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:57.949000 audit: BPF prog-id=135 op=LOAD Feb 12 19:47:57.949000 audit[2819]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00015f9d8 items=0 ppid=2807 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:57.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730393634366433656264313439363466363230623434326335663032 Feb 12 19:47:57.974326 env[1106]: time="2024-02-12T19:47:57.974262036Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-27czq,Uid:bce1eaa7-d7f6-44b0-9ca3-dcfe1cc01deb,Namespace:calico-system,Attempt:0,} returns sandbox id \"709646d3ebd14964f620b442c5f0235daccc33912f8367bfa06a023257f43d65\"" Feb 12 19:47:57.975296 kubelet[2029]: E0212 19:47:57.975262 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:57.980329 env[1106]: time="2024-02-12T19:47:57.980266868Z" level=info msg="CreateContainer within sandbox \"709646d3ebd14964f620b442c5f0235daccc33912f8367bfa06a023257f43d65\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 19:47:58.046948 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1482513314.mount: Deactivated successfully. Feb 12 19:47:58.058809 env[1106]: time="2024-02-12T19:47:58.058715785Z" level=info msg="CreateContainer within sandbox \"709646d3ebd14964f620b442c5f0235daccc33912f8367bfa06a023257f43d65\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"93fab44cdb52f4281f836d517e501e2040ed216c03c43f223d480a233dfa86ec\"" Feb 12 19:47:58.062782 env[1106]: time="2024-02-12T19:47:58.062738925Z" level=info msg="StartContainer for \"93fab44cdb52f4281f836d517e501e2040ed216c03c43f223d480a233dfa86ec\"" Feb 12 19:47:58.101821 systemd[1]: Started cri-containerd-93fab44cdb52f4281f836d517e501e2040ed216c03c43f223d480a233dfa86ec.scope. Feb 12 19:47:58.140000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.140000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2807 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:58.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933666162343463646235326634323831663833366435313765353031 Feb 12 19:47:58.140000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.140000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.140000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.140000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.140000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.140000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.140000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.140000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.140000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.140000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.140000 audit: BPF prog-id=136 op=LOAD Feb 12 19:47:58.140000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000308760 items=0 ppid=2807 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:58.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933666162343463646235326634323831663833366435313765353031 Feb 12 19:47:58.140000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.140000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.140000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.140000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.140000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.140000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.140000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.140000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.140000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.140000 audit: BPF prog-id=137 op=LOAD Feb 12 19:47:58.140000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003087a8 items=0 ppid=2807 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:58.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933666162343463646235326634323831663833366435313765353031 Feb 12 19:47:58.141000 audit: BPF prog-id=137 op=UNLOAD Feb 12 19:47:58.141000 audit: BPF prog-id=136 op=UNLOAD Feb 12 19:47:58.141000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.141000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.141000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.141000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.141000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.141000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.141000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.141000 audit[2850]: AVC avc: denied { perfmon } for pid=2850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.141000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.141000 audit[2850]: AVC avc: denied { bpf } for pid=2850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:58.141000 audit: BPF prog-id=138 op=LOAD Feb 12 19:47:58.141000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000308838 items=0 ppid=2807 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:58.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933666162343463646235326634323831663833366435313765353031 Feb 12 19:47:58.181375 env[1106]: time="2024-02-12T19:47:58.181293658Z" level=info msg="StartContainer for \"93fab44cdb52f4281f836d517e501e2040ed216c03c43f223d480a233dfa86ec\" returns successfully" Feb 12 19:47:58.208383 systemd[1]: cri-containerd-93fab44cdb52f4281f836d517e501e2040ed216c03c43f223d480a233dfa86ec.scope: Deactivated successfully. Feb 12 19:47:58.210000 audit: BPF prog-id=138 op=UNLOAD Feb 12 19:47:58.289827 kubelet[2029]: E0212 19:47:58.288126 2029 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bp7zv" podUID=1b086c16-44ff-4ae2-8b8c-0804a979d643 Feb 12 19:47:58.292910 env[1106]: time="2024-02-12T19:47:58.292716983Z" level=info msg="shim disconnected" id=93fab44cdb52f4281f836d517e501e2040ed216c03c43f223d480a233dfa86ec Feb 12 19:47:58.292910 env[1106]: time="2024-02-12T19:47:58.292818316Z" level=warning msg="cleaning up after shim disconnected" id=93fab44cdb52f4281f836d517e501e2040ed216c03c43f223d480a233dfa86ec namespace=k8s.io Feb 12 19:47:58.292910 env[1106]: time="2024-02-12T19:47:58.292834469Z" level=info msg="cleaning up dead shim" Feb 12 19:47:58.296678 kubelet[2029]: I0212 19:47:58.296407 2029 kubelet_volumes.go:160] "Cleaned up orphaned pod volumes dir" podUID=6aa22a5e-fe72-45de-8fda-4540fc03472f path="/var/lib/kubelet/pods/6aa22a5e-fe72-45de-8fda-4540fc03472f/volumes" Feb 12 19:47:58.309365 env[1106]: time="2024-02-12T19:47:58.309309731Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:47:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2890 runtime=io.containerd.runc.v2\n" Feb 12 19:47:58.438466 kubelet[2029]: E0212 19:47:58.435923 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:47:58.915639 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-93fab44cdb52f4281f836d517e501e2040ed216c03c43f223d480a233dfa86ec-rootfs.mount: Deactivated successfully. Feb 12 19:47:59.698096 env[1106]: time="2024-02-12T19:47:59.698026365Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:59.702611 env[1106]: time="2024-02-12T19:47:59.702553596Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:59.707538 env[1106]: time="2024-02-12T19:47:59.706802307Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:59.712107 env[1106]: time="2024-02-12T19:47:59.712040649Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:47:59.716840 env[1106]: time="2024-02-12T19:47:59.715637480Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 12 19:47:59.720159 env[1106]: time="2024-02-12T19:47:59.719843526Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 19:47:59.747185 env[1106]: time="2024-02-12T19:47:59.747120871Z" level=info msg="CreateContainer within sandbox \"9acdc21f152cabfb8101a758ea9ab4ca678df037951e5e975e4381de102440d0\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 12 19:47:59.771565 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2120351807.mount: Deactivated successfully. Feb 12 19:47:59.782276 env[1106]: time="2024-02-12T19:47:59.782204231Z" level=info msg="CreateContainer within sandbox \"9acdc21f152cabfb8101a758ea9ab4ca678df037951e5e975e4381de102440d0\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"e76d711110ca366317709dfb92f1f98dda7575a875c56e25370e87dcf56e58e8\"" Feb 12 19:47:59.783672 env[1106]: time="2024-02-12T19:47:59.783620880Z" level=info msg="StartContainer for \"e76d711110ca366317709dfb92f1f98dda7575a875c56e25370e87dcf56e58e8\"" Feb 12 19:47:59.852964 systemd[1]: Started cri-containerd-e76d711110ca366317709dfb92f1f98dda7575a875c56e25370e87dcf56e58e8.scope. Feb 12 19:47:59.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.902000 audit: BPF prog-id=139 op=LOAD Feb 12 19:47:59.904000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.904000 audit[2918]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2633 pid=2918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:59.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537366437313131313063613336363331373730396466623932663166 Feb 12 19:47:59.904000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.904000 audit[2918]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2633 pid=2918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:59.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537366437313131313063613336363331373730396466623932663166 Feb 12 19:47:59.904000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.904000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.904000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.904000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.904000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.904000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.904000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.904000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.904000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.904000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.904000 audit: BPF prog-id=140 op=LOAD Feb 12 19:47:59.904000 audit[2918]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00026e9b0 items=0 ppid=2633 pid=2918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:59.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537366437313131313063613336363331373730396466623932663166 Feb 12 19:47:59.905000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.905000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.905000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.905000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.905000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.905000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.905000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.905000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.905000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.905000 audit: BPF prog-id=141 op=LOAD Feb 12 19:47:59.905000 audit[2918]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00026e9f8 items=0 ppid=2633 pid=2918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:59.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537366437313131313063613336363331373730396466623932663166 Feb 12 19:47:59.905000 audit: BPF prog-id=141 op=UNLOAD Feb 12 19:47:59.905000 audit: BPF prog-id=140 op=UNLOAD Feb 12 19:47:59.905000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.905000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.905000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.905000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.905000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.905000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.905000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.905000 audit[2918]: AVC avc: denied { perfmon } for pid=2918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.905000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.905000 audit[2918]: AVC avc: denied { bpf } for pid=2918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:47:59.905000 audit: BPF prog-id=142 op=LOAD Feb 12 19:47:59.905000 audit[2918]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00026ee08 items=0 ppid=2633 pid=2918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:59.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537366437313131313063613336363331373730396466623932663166 Feb 12 19:47:59.980504 env[1106]: time="2024-02-12T19:47:59.980366020Z" level=info msg="StartContainer for \"e76d711110ca366317709dfb92f1f98dda7575a875c56e25370e87dcf56e58e8\" returns successfully" Feb 12 19:48:00.290546 kubelet[2029]: E0212 19:48:00.290473 2029 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bp7zv" podUID=1b086c16-44ff-4ae2-8b8c-0804a979d643 Feb 12 19:48:00.469433 env[1106]: time="2024-02-12T19:48:00.468756234Z" level=info msg="StopContainer for \"e76d711110ca366317709dfb92f1f98dda7575a875c56e25370e87dcf56e58e8\" with timeout 300 (s)" Feb 12 19:48:00.469678 env[1106]: time="2024-02-12T19:48:00.469496560Z" level=info msg="Stop container \"e76d711110ca366317709dfb92f1f98dda7575a875c56e25370e87dcf56e58e8\" with signal terminated" Feb 12 19:48:00.526000 audit: BPF prog-id=139 op=UNLOAD Feb 12 19:48:00.524511 systemd[1]: cri-containerd-e76d711110ca366317709dfb92f1f98dda7575a875c56e25370e87dcf56e58e8.scope: Deactivated successfully. Feb 12 19:48:00.531000 audit: BPF prog-id=142 op=UNLOAD Feb 12 19:48:00.569912 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e76d711110ca366317709dfb92f1f98dda7575a875c56e25370e87dcf56e58e8-rootfs.mount: Deactivated successfully. Feb 12 19:48:00.660842 env[1106]: time="2024-02-12T19:48:00.660786058Z" level=info msg="shim disconnected" id=e76d711110ca366317709dfb92f1f98dda7575a875c56e25370e87dcf56e58e8 Feb 12 19:48:00.662082 env[1106]: time="2024-02-12T19:48:00.662025498Z" level=warning msg="cleaning up after shim disconnected" id=e76d711110ca366317709dfb92f1f98dda7575a875c56e25370e87dcf56e58e8 namespace=k8s.io Feb 12 19:48:00.662304 env[1106]: time="2024-02-12T19:48:00.662282869Z" level=info msg="cleaning up dead shim" Feb 12 19:48:00.680982 env[1106]: time="2024-02-12T19:48:00.680908898Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:48:00Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2968 runtime=io.containerd.runc.v2\n" Feb 12 19:48:00.687464 env[1106]: time="2024-02-12T19:48:00.687395055Z" level=info msg="StopContainer for \"e76d711110ca366317709dfb92f1f98dda7575a875c56e25370e87dcf56e58e8\" returns successfully" Feb 12 19:48:00.688659 env[1106]: time="2024-02-12T19:48:00.688608069Z" level=info msg="StopPodSandbox for \"9acdc21f152cabfb8101a758ea9ab4ca678df037951e5e975e4381de102440d0\"" Feb 12 19:48:00.689524 env[1106]: time="2024-02-12T19:48:00.689469635Z" level=info msg="Container to stop \"e76d711110ca366317709dfb92f1f98dda7575a875c56e25370e87dcf56e58e8\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Feb 12 19:48:00.692985 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9acdc21f152cabfb8101a758ea9ab4ca678df037951e5e975e4381de102440d0-shm.mount: Deactivated successfully. Feb 12 19:48:00.718000 audit: BPF prog-id=125 op=UNLOAD Feb 12 19:48:00.718958 systemd[1]: cri-containerd-9acdc21f152cabfb8101a758ea9ab4ca678df037951e5e975e4381de102440d0.scope: Deactivated successfully. Feb 12 19:48:00.722000 audit: BPF prog-id=128 op=UNLOAD Feb 12 19:48:00.816626 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9acdc21f152cabfb8101a758ea9ab4ca678df037951e5e975e4381de102440d0-rootfs.mount: Deactivated successfully. Feb 12 19:48:00.828656 env[1106]: time="2024-02-12T19:48:00.827920782Z" level=info msg="shim disconnected" id=9acdc21f152cabfb8101a758ea9ab4ca678df037951e5e975e4381de102440d0 Feb 12 19:48:00.830478 env[1106]: time="2024-02-12T19:48:00.830414582Z" level=warning msg="cleaning up after shim disconnected" id=9acdc21f152cabfb8101a758ea9ab4ca678df037951e5e975e4381de102440d0 namespace=k8s.io Feb 12 19:48:00.831246 env[1106]: time="2024-02-12T19:48:00.831206992Z" level=info msg="cleaning up dead shim" Feb 12 19:48:00.858183 env[1106]: time="2024-02-12T19:48:00.858107702Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:48:00Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3001 runtime=io.containerd.runc.v2\n" Feb 12 19:48:00.859470 env[1106]: time="2024-02-12T19:48:00.859389542Z" level=info msg="TearDown network for sandbox \"9acdc21f152cabfb8101a758ea9ab4ca678df037951e5e975e4381de102440d0\" successfully" Feb 12 19:48:00.859796 env[1106]: time="2024-02-12T19:48:00.859760981Z" level=info msg="StopPodSandbox for \"9acdc21f152cabfb8101a758ea9ab4ca678df037951e5e975e4381de102440d0\" returns successfully" Feb 12 19:48:01.043103 kubelet[2029]: I0212 19:48:01.042985 2029 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"kube-api-access-vxsf6\" (UniqueName: \"kubernetes.io/projected/665ad505-b499-41f6-bb2a-439ab2593c43-kube-api-access-vxsf6\") pod \"665ad505-b499-41f6-bb2a-439ab2593c43\" (UID: \"665ad505-b499-41f6-bb2a-439ab2593c43\") " Feb 12 19:48:01.043103 kubelet[2029]: I0212 19:48:01.043093 2029 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/665ad505-b499-41f6-bb2a-439ab2593c43-typha-certs\") pod \"665ad505-b499-41f6-bb2a-439ab2593c43\" (UID: \"665ad505-b499-41f6-bb2a-439ab2593c43\") " Feb 12 19:48:01.043462 kubelet[2029]: I0212 19:48:01.043136 2029 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/665ad505-b499-41f6-bb2a-439ab2593c43-tigera-ca-bundle\") pod \"665ad505-b499-41f6-bb2a-439ab2593c43\" (UID: \"665ad505-b499-41f6-bb2a-439ab2593c43\") " Feb 12 19:48:01.051621 systemd[1]: var-lib-kubelet-pods-665ad505\x2db499\x2d41f6\x2dbb2a\x2d439ab2593c43-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dtypha-1.mount: Deactivated successfully. Feb 12 19:48:01.059447 systemd[1]: var-lib-kubelet-pods-665ad505\x2db499\x2d41f6\x2dbb2a\x2d439ab2593c43-volumes-kubernetes.io\x7esecret-typha\x2dcerts.mount: Deactivated successfully. Feb 12 19:48:01.062226 kubelet[2029]: I0212 19:48:01.062172 2029 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/665ad505-b499-41f6-bb2a-439ab2593c43-typha-certs" (OuterVolumeSpecName: "typha-certs") pod "665ad505-b499-41f6-bb2a-439ab2593c43" (UID: "665ad505-b499-41f6-bb2a-439ab2593c43"). InnerVolumeSpecName "typha-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Feb 12 19:48:01.067331 systemd[1]: var-lib-kubelet-pods-665ad505\x2db499\x2d41f6\x2dbb2a\x2d439ab2593c43-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dvxsf6.mount: Deactivated successfully. Feb 12 19:48:01.072307 kubelet[2029]: I0212 19:48:01.071841 2029 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/665ad505-b499-41f6-bb2a-439ab2593c43-kube-api-access-vxsf6" (OuterVolumeSpecName: "kube-api-access-vxsf6") pod "665ad505-b499-41f6-bb2a-439ab2593c43" (UID: "665ad505-b499-41f6-bb2a-439ab2593c43"). InnerVolumeSpecName "kube-api-access-vxsf6". PluginName "kubernetes.io/projected", VolumeGidValue "" Feb 12 19:48:01.072531 kubelet[2029]: W0212 19:48:01.072491 2029 empty_dir.go:525] Warning: Failed to clear quota on /var/lib/kubelet/pods/665ad505-b499-41f6-bb2a-439ab2593c43/volumes/kubernetes.io~configmap/tigera-ca-bundle: clearQuota called, but quotas disabled Feb 12 19:48:01.073183 kubelet[2029]: I0212 19:48:01.073123 2029 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/665ad505-b499-41f6-bb2a-439ab2593c43-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "665ad505-b499-41f6-bb2a-439ab2593c43" (UID: "665ad505-b499-41f6-bb2a-439ab2593c43"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Feb 12 19:48:01.144073 kubelet[2029]: I0212 19:48:01.143871 2029 reconciler_common.go:295] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/665ad505-b499-41f6-bb2a-439ab2593c43-tigera-ca-bundle\") on node \"ci-3510.3.2-d-344270592c\" DevicePath \"\"" Feb 12 19:48:01.144446 kubelet[2029]: I0212 19:48:01.144385 2029 reconciler_common.go:295] "Volume detached for volume \"kube-api-access-vxsf6\" (UniqueName: \"kubernetes.io/projected/665ad505-b499-41f6-bb2a-439ab2593c43-kube-api-access-vxsf6\") on node \"ci-3510.3.2-d-344270592c\" DevicePath \"\"" Feb 12 19:48:01.144579 kubelet[2029]: I0212 19:48:01.144566 2029 reconciler_common.go:295] "Volume detached for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/665ad505-b499-41f6-bb2a-439ab2593c43-typha-certs\") on node \"ci-3510.3.2-d-344270592c\" DevicePath \"\"" Feb 12 19:48:01.509480 kubelet[2029]: I0212 19:48:01.509299 2029 scope.go:115] "RemoveContainer" containerID="e76d711110ca366317709dfb92f1f98dda7575a875c56e25370e87dcf56e58e8" Feb 12 19:48:01.520405 env[1106]: time="2024-02-12T19:48:01.520343882Z" level=info msg="RemoveContainer for \"e76d711110ca366317709dfb92f1f98dda7575a875c56e25370e87dcf56e58e8\"" Feb 12 19:48:01.522888 systemd[1]: Removed slice kubepods-besteffort-pod665ad505_b499_41f6_bb2a_439ab2593c43.slice. Feb 12 19:48:01.594340 env[1106]: time="2024-02-12T19:48:01.562029916Z" level=info msg="RemoveContainer for \"e76d711110ca366317709dfb92f1f98dda7575a875c56e25370e87dcf56e58e8\" returns successfully" Feb 12 19:48:01.594905 kubelet[2029]: I0212 19:48:01.594859 2029 scope.go:115] "RemoveContainer" containerID="e76d711110ca366317709dfb92f1f98dda7575a875c56e25370e87dcf56e58e8" Feb 12 19:48:01.618092 env[1106]: time="2024-02-12T19:48:01.610552525Z" level=error msg="ContainerStatus for \"e76d711110ca366317709dfb92f1f98dda7575a875c56e25370e87dcf56e58e8\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"e76d711110ca366317709dfb92f1f98dda7575a875c56e25370e87dcf56e58e8\": not found" Feb 12 19:48:01.631249 kubelet[2029]: E0212 19:48:01.631180 2029 remote_runtime.go:415] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"e76d711110ca366317709dfb92f1f98dda7575a875c56e25370e87dcf56e58e8\": not found" containerID="e76d711110ca366317709dfb92f1f98dda7575a875c56e25370e87dcf56e58e8" Feb 12 19:48:01.631817 kubelet[2029]: I0212 19:48:01.631781 2029 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={Type:containerd ID:e76d711110ca366317709dfb92f1f98dda7575a875c56e25370e87dcf56e58e8} err="failed to get container status \"e76d711110ca366317709dfb92f1f98dda7575a875c56e25370e87dcf56e58e8\": rpc error: code = NotFound desc = an error occurred when try to find container \"e76d711110ca366317709dfb92f1f98dda7575a875c56e25370e87dcf56e58e8\": not found" Feb 12 19:48:01.726984 kubelet[2029]: I0212 19:48:01.726553 2029 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:48:01.726984 kubelet[2029]: E0212 19:48:01.726676 2029 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="665ad505-b499-41f6-bb2a-439ab2593c43" containerName="calico-typha" Feb 12 19:48:01.726984 kubelet[2029]: I0212 19:48:01.726718 2029 memory_manager.go:346] "RemoveStaleState removing state" podUID="665ad505-b499-41f6-bb2a-439ab2593c43" containerName="calico-typha" Feb 12 19:48:01.739112 systemd[1]: Created slice kubepods-besteffort-pod98d6ef15_4396_458e_a543_e6dc8cd804dd.slice. Feb 12 19:48:01.753933 kubelet[2029]: I0212 19:48:01.753864 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jrkgk\" (UniqueName: \"kubernetes.io/projected/98d6ef15-4396-458e-a543-e6dc8cd804dd-kube-api-access-jrkgk\") pod \"calico-typha-6f89cc549c-mtvqx\" (UID: \"98d6ef15-4396-458e-a543-e6dc8cd804dd\") " pod="calico-system/calico-typha-6f89cc549c-mtvqx" Feb 12 19:48:01.754415 kubelet[2029]: I0212 19:48:01.754385 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/98d6ef15-4396-458e-a543-e6dc8cd804dd-tigera-ca-bundle\") pod \"calico-typha-6f89cc549c-mtvqx\" (UID: \"98d6ef15-4396-458e-a543-e6dc8cd804dd\") " pod="calico-system/calico-typha-6f89cc549c-mtvqx" Feb 12 19:48:01.754708 kubelet[2029]: I0212 19:48:01.754684 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/98d6ef15-4396-458e-a543-e6dc8cd804dd-typha-certs\") pod \"calico-typha-6f89cc549c-mtvqx\" (UID: \"98d6ef15-4396-458e-a543-e6dc8cd804dd\") " pod="calico-system/calico-typha-6f89cc549c-mtvqx" Feb 12 19:48:01.766572 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2876660363.mount: Deactivated successfully. Feb 12 19:48:02.023000 audit[3043]: NETFILTER_CFG table=filter:111 family=2 entries=14 op=nft_register_rule pid=3043 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:02.032871 kernel: kauditd_printk_skb: 198 callbacks suppressed Feb 12 19:48:02.033095 kernel: audit: type=1325 audit(1707767282.023:1154): table=filter:111 family=2 entries=14 op=nft_register_rule pid=3043 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:02.023000 audit[3043]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7fff424953a0 a2=0 a3=7fff4249538c items=0 ppid=2189 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:02.048184 kernel: audit: type=1300 audit(1707767282.023:1154): arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7fff424953a0 a2=0 a3=7fff4249538c items=0 ppid=2189 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:02.048744 kernel: audit: type=1327 audit(1707767282.023:1154): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:02.023000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:02.065678 kubelet[2029]: E0212 19:48:02.065627 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:48:02.072314 env[1106]: time="2024-02-12T19:48:02.072203772Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6f89cc549c-mtvqx,Uid:98d6ef15-4396-458e-a543-e6dc8cd804dd,Namespace:calico-system,Attempt:0,}" Feb 12 19:48:02.028000 audit[3043]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=3043 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:02.080965 kernel: audit: type=1325 audit(1707767282.028:1155): table=nat:112 family=2 entries=20 op=nft_register_rule pid=3043 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:02.028000 audit[3043]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fff424953a0 a2=0 a3=7fff4249538c items=0 ppid=2189 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:02.087803 kernel: audit: type=1300 audit(1707767282.028:1155): arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fff424953a0 a2=0 a3=7fff4249538c items=0 ppid=2189 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:02.028000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:02.103785 kernel: audit: type=1327 audit(1707767282.028:1155): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:02.264000 audit[3069]: NETFILTER_CFG table=filter:113 family=2 entries=14 op=nft_register_rule pid=3069 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:02.269227 kernel: audit: type=1325 audit(1707767282.264:1156): table=filter:113 family=2 entries=14 op=nft_register_rule pid=3069 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:02.264000 audit[3069]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffffa02f790 a2=0 a3=7ffffa02f77c items=0 ppid=2189 pid=3069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:02.278817 kernel: audit: type=1300 audit(1707767282.264:1156): arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffffa02f790 a2=0 a3=7ffffa02f77c items=0 ppid=2189 pid=3069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:02.264000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:02.289813 kernel: audit: type=1327 audit(1707767282.264:1156): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:02.289995 kernel: audit: type=1325 audit(1707767282.265:1157): table=nat:114 family=2 entries=20 op=nft_register_rule pid=3069 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:02.265000 audit[3069]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=3069 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:02.265000 audit[3069]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffffa02f790 a2=0 a3=7ffffa02f77c items=0 ppid=2189 pid=3069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:02.265000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:02.291814 kubelet[2029]: E0212 19:48:02.291011 2029 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bp7zv" podUID=1b086c16-44ff-4ae2-8b8c-0804a979d643 Feb 12 19:48:02.309792 kubelet[2029]: I0212 19:48:02.308762 2029 kubelet_volumes.go:160] "Cleaned up orphaned pod volumes dir" podUID=665ad505-b499-41f6-bb2a-439ab2593c43 path="/var/lib/kubelet/pods/665ad505-b499-41f6-bb2a-439ab2593c43/volumes" Feb 12 19:48:02.423674 env[1106]: time="2024-02-12T19:48:02.422939962Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:48:02.423674 env[1106]: time="2024-02-12T19:48:02.423003952Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:48:02.423674 env[1106]: time="2024-02-12T19:48:02.423015539Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:48:02.423674 env[1106]: time="2024-02-12T19:48:02.423404706Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9ca017dd1cadb9665567aa12c2e2056b40ade4156acb85ea2298fae162e4e31b pid=3077 runtime=io.containerd.runc.v2 Feb 12 19:48:02.478263 systemd[1]: Started cri-containerd-9ca017dd1cadb9665567aa12c2e2056b40ade4156acb85ea2298fae162e4e31b.scope. Feb 12 19:48:02.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.550000 audit: BPF prog-id=143 op=LOAD Feb 12 19:48:02.552000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.552000 audit[3086]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3077 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:02.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963613031376464316361646239363635353637616131326332653230 Feb 12 19:48:02.553000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.553000 audit[3086]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3077 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:02.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963613031376464316361646239363635353637616131326332653230 Feb 12 19:48:02.554000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.554000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.554000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.554000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.554000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.554000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.554000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.554000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.554000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.554000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.554000 audit: BPF prog-id=144 op=LOAD Feb 12 19:48:02.554000 audit[3086]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003087f0 items=0 ppid=3077 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:02.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963613031376464316361646239363635353637616131326332653230 Feb 12 19:48:02.556000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.556000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.556000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.556000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.556000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.556000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.556000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.556000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.556000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.556000 audit: BPF prog-id=145 op=LOAD Feb 12 19:48:02.556000 audit[3086]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000308838 items=0 ppid=3077 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:02.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963613031376464316361646239363635353637616131326332653230 Feb 12 19:48:02.558000 audit: BPF prog-id=145 op=UNLOAD Feb 12 19:48:02.558000 audit: BPF prog-id=144 op=UNLOAD Feb 12 19:48:02.558000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.558000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.558000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.558000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.558000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.558000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.558000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.558000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.558000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.558000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.558000 audit: BPF prog-id=146 op=LOAD Feb 12 19:48:02.558000 audit[3086]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000308c48 items=0 ppid=3077 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:02.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963613031376464316361646239363635353637616131326332653230 Feb 12 19:48:02.646450 env[1106]: time="2024-02-12T19:48:02.646302096Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6f89cc549c-mtvqx,Uid:98d6ef15-4396-458e-a543-e6dc8cd804dd,Namespace:calico-system,Attempt:0,} returns sandbox id \"9ca017dd1cadb9665567aa12c2e2056b40ade4156acb85ea2298fae162e4e31b\"" Feb 12 19:48:02.649909 kubelet[2029]: E0212 19:48:02.649843 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:48:02.691415 env[1106]: time="2024-02-12T19:48:02.689875166Z" level=info msg="CreateContainer within sandbox \"9ca017dd1cadb9665567aa12c2e2056b40ade4156acb85ea2298fae162e4e31b\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 12 19:48:02.757877 env[1106]: time="2024-02-12T19:48:02.757692879Z" level=info msg="CreateContainer within sandbox \"9ca017dd1cadb9665567aa12c2e2056b40ade4156acb85ea2298fae162e4e31b\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"9e027b0e88eca40062a77a9453130335192be4d972154fb7c29d233e9d991788\"" Feb 12 19:48:02.759252 env[1106]: time="2024-02-12T19:48:02.759175524Z" level=info msg="StartContainer for \"9e027b0e88eca40062a77a9453130335192be4d972154fb7c29d233e9d991788\"" Feb 12 19:48:02.807054 systemd[1]: Started cri-containerd-9e027b0e88eca40062a77a9453130335192be4d972154fb7c29d233e9d991788.scope. Feb 12 19:48:02.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.862000 audit: BPF prog-id=147 op=LOAD Feb 12 19:48:02.866000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.866000 audit[3119]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3077 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:02.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965303237623065383865636134303036326137376139343533313330 Feb 12 19:48:02.866000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.866000 audit[3119]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3077 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:02.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965303237623065383865636134303036326137376139343533313330 Feb 12 19:48:02.866000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.866000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.866000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.866000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.866000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.866000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.866000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.866000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.866000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.866000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.866000 audit: BPF prog-id=148 op=LOAD Feb 12 19:48:02.866000 audit[3119]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00022ab50 items=0 ppid=3077 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:02.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965303237623065383865636134303036326137376139343533313330 Feb 12 19:48:02.866000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.866000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.866000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.866000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.866000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.866000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.866000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.866000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.866000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.866000 audit: BPF prog-id=149 op=LOAD Feb 12 19:48:02.866000 audit[3119]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00022ab98 items=0 ppid=3077 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:02.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965303237623065383865636134303036326137376139343533313330 Feb 12 19:48:02.867000 audit: BPF prog-id=149 op=UNLOAD Feb 12 19:48:02.867000 audit: BPF prog-id=148 op=UNLOAD Feb 12 19:48:02.867000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.867000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.867000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.867000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.867000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.867000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.867000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.867000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.867000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.867000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:02.867000 audit: BPF prog-id=150 op=LOAD Feb 12 19:48:02.867000 audit[3119]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00022afa8 items=0 ppid=3077 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:02.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965303237623065383865636134303036326137376139343533313330 Feb 12 19:48:02.962590 env[1106]: time="2024-02-12T19:48:02.962499158Z" level=info msg="StartContainer for \"9e027b0e88eca40062a77a9453130335192be4d972154fb7c29d233e9d991788\" returns successfully" Feb 12 19:48:03.069553 systemd[1]: run-containerd-runc-k8s.io-9ca017dd1cadb9665567aa12c2e2056b40ade4156acb85ea2298fae162e4e31b-runc.hpSbqW.mount: Deactivated successfully. Feb 12 19:48:03.525826 kubelet[2029]: E0212 19:48:03.525413 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:48:03.553792 kubelet[2029]: I0212 19:48:03.553300 2029 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-6f89cc549c-mtvqx" podStartSLOduration=12.553210172 pod.CreationTimestamp="2024-02-12 19:47:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:48:03.5515347 +0000 UTC m=+33.929725600" watchObservedRunningTime="2024-02-12 19:48:03.553210172 +0000 UTC m=+33.931401071" Feb 12 19:48:03.787000 audit[3177]: NETFILTER_CFG table=filter:115 family=2 entries=13 op=nft_register_rule pid=3177 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:03.787000 audit[3177]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffdfae1e750 a2=0 a3=7ffdfae1e73c items=0 ppid=2189 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:03.787000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:03.789000 audit[3177]: NETFILTER_CFG table=nat:116 family=2 entries=27 op=nft_register_chain pid=3177 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:03.789000 audit[3177]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffdfae1e750 a2=0 a3=7ffdfae1e73c items=0 ppid=2189 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:03.789000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:04.288767 kubelet[2029]: E0212 19:48:04.288178 2029 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bp7zv" podUID=1b086c16-44ff-4ae2-8b8c-0804a979d643 Feb 12 19:48:04.527011 kubelet[2029]: E0212 19:48:04.526934 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:48:05.529331 kubelet[2029]: E0212 19:48:05.528544 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:48:06.289251 kubelet[2029]: E0212 19:48:06.289201 2029 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bp7zv" podUID=1b086c16-44ff-4ae2-8b8c-0804a979d643 Feb 12 19:48:07.283631 env[1106]: time="2024-02-12T19:48:07.283559289Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:07.291473 env[1106]: time="2024-02-12T19:48:07.291342167Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:07.297400 env[1106]: time="2024-02-12T19:48:07.297341635Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:07.302253 env[1106]: time="2024-02-12T19:48:07.302160272Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:07.304126 env[1106]: time="2024-02-12T19:48:07.304036030Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 12 19:48:07.307893 env[1106]: time="2024-02-12T19:48:07.307690769Z" level=info msg="CreateContainer within sandbox \"709646d3ebd14964f620b442c5f0235daccc33912f8367bfa06a023257f43d65\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 19:48:07.328970 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount403552581.mount: Deactivated successfully. Feb 12 19:48:07.340239 env[1106]: time="2024-02-12T19:48:07.340118980Z" level=info msg="CreateContainer within sandbox \"709646d3ebd14964f620b442c5f0235daccc33912f8367bfa06a023257f43d65\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"0c9afe40c5153195fe9c94f258fe1b477f7f92ec1e7d4093674961bb78cdc613\"" Feb 12 19:48:07.344702 env[1106]: time="2024-02-12T19:48:07.344646517Z" level=info msg="StartContainer for \"0c9afe40c5153195fe9c94f258fe1b477f7f92ec1e7d4093674961bb78cdc613\"" Feb 12 19:48:07.394610 systemd[1]: Started cri-containerd-0c9afe40c5153195fe9c94f258fe1b477f7f92ec1e7d4093674961bb78cdc613.scope. Feb 12 19:48:07.450000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.452600 kernel: kauditd_printk_skb: 122 callbacks suppressed Feb 12 19:48:07.452802 kernel: audit: type=1400 audit(1707767287.450:1196): avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.450000 audit[3186]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2807 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:07.461288 kernel: audit: type=1300 audit(1707767287.450:1196): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2807 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:07.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063396166653430633531353331393566653963393466323538666531 Feb 12 19:48:07.468775 kernel: audit: type=1327 audit(1707767287.450:1196): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063396166653430633531353331393566653963393466323538666531 Feb 12 19:48:07.469140 kernel: audit: type=1400 audit(1707767287.450:1197): avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.450000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.450000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.476027 kernel: audit: type=1400 audit(1707767287.450:1197): avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.476219 kernel: audit: type=1400 audit(1707767287.450:1197): avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.450000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.450000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.450000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.489920 kernel: audit: type=1400 audit(1707767287.450:1197): avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.490110 kernel: audit: type=1400 audit(1707767287.450:1197): avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.490153 kernel: audit: type=1400 audit(1707767287.450:1197): avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.450000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.494666 kernel: audit: type=1400 audit(1707767287.450:1197): avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.450000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.450000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.450000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.450000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.450000 audit: BPF prog-id=151 op=LOAD Feb 12 19:48:07.450000 audit[3186]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0002f7e30 items=0 ppid=2807 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:07.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063396166653430633531353331393566653963393466323538666531 Feb 12 19:48:07.450000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.450000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.450000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.450000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.450000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.450000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.450000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.450000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.450000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.450000 audit: BPF prog-id=152 op=LOAD Feb 12 19:48:07.450000 audit[3186]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0002f7e78 items=0 ppid=2807 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:07.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063396166653430633531353331393566653963393466323538666531 Feb 12 19:48:07.450000 audit: BPF prog-id=152 op=UNLOAD Feb 12 19:48:07.450000 audit: BPF prog-id=151 op=UNLOAD Feb 12 19:48:07.450000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.450000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.450000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.450000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.450000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.450000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.450000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.450000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.450000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.450000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:07.450000 audit: BPF prog-id=153 op=LOAD Feb 12 19:48:07.450000 audit[3186]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0002f7f08 items=0 ppid=2807 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:07.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063396166653430633531353331393566653963393466323538666531 Feb 12 19:48:07.510837 env[1106]: time="2024-02-12T19:48:07.509763508Z" level=info msg="StartContainer for \"0c9afe40c5153195fe9c94f258fe1b477f7f92ec1e7d4093674961bb78cdc613\" returns successfully" Feb 12 19:48:07.538823 kubelet[2029]: E0212 19:48:07.538670 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:48:08.288719 kubelet[2029]: E0212 19:48:08.288663 2029 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bp7zv" podUID=1b086c16-44ff-4ae2-8b8c-0804a979d643 Feb 12 19:48:08.429619 systemd[1]: cri-containerd-0c9afe40c5153195fe9c94f258fe1b477f7f92ec1e7d4093674961bb78cdc613.scope: Deactivated successfully. Feb 12 19:48:08.432000 audit: BPF prog-id=153 op=UNLOAD Feb 12 19:48:08.498320 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0c9afe40c5153195fe9c94f258fe1b477f7f92ec1e7d4093674961bb78cdc613-rootfs.mount: Deactivated successfully. Feb 12 19:48:08.510564 kubelet[2029]: I0212 19:48:08.508645 2029 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 19:48:08.517138 env[1106]: time="2024-02-12T19:48:08.516711115Z" level=info msg="shim disconnected" id=0c9afe40c5153195fe9c94f258fe1b477f7f92ec1e7d4093674961bb78cdc613 Feb 12 19:48:08.517138 env[1106]: time="2024-02-12T19:48:08.517118241Z" level=warning msg="cleaning up after shim disconnected" id=0c9afe40c5153195fe9c94f258fe1b477f7f92ec1e7d4093674961bb78cdc613 namespace=k8s.io Feb 12 19:48:08.517138 env[1106]: time="2024-02-12T19:48:08.517137876Z" level=info msg="cleaning up dead shim" Feb 12 19:48:08.543819 kubelet[2029]: E0212 19:48:08.541195 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:48:08.553139 env[1106]: time="2024-02-12T19:48:08.552001009Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:48:08Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3233 runtime=io.containerd.runc.v2\n" Feb 12 19:48:08.566966 kubelet[2029]: I0212 19:48:08.566917 2029 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:48:08.577916 systemd[1]: Created slice kubepods-burstable-podb6f10a97_6a15_4fe6_aa96_1b867b822576.slice. Feb 12 19:48:08.579106 kubelet[2029]: I0212 19:48:08.579068 2029 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:48:08.617326 kubelet[2029]: I0212 19:48:08.614476 2029 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:48:08.621590 systemd[1]: Created slice kubepods-burstable-pod9035b034_9c8e_4b17_b971_e692c700076a.slice. Feb 12 19:48:08.629676 systemd[1]: Created slice kubepods-besteffort-pod5e9cad69_faf3_454a_be31_c3424451d07d.slice. Feb 12 19:48:08.759534 kubelet[2029]: I0212 19:48:08.759441 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5e9cad69-faf3-454a-be31-c3424451d07d-tigera-ca-bundle\") pod \"calico-kube-controllers-5cffbfd69f-dlhss\" (UID: \"5e9cad69-faf3-454a-be31-c3424451d07d\") " pod="calico-system/calico-kube-controllers-5cffbfd69f-dlhss" Feb 12 19:48:08.759865 kubelet[2029]: I0212 19:48:08.759599 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7wqdx\" (UniqueName: \"kubernetes.io/projected/5e9cad69-faf3-454a-be31-c3424451d07d-kube-api-access-7wqdx\") pod \"calico-kube-controllers-5cffbfd69f-dlhss\" (UID: \"5e9cad69-faf3-454a-be31-c3424451d07d\") " pod="calico-system/calico-kube-controllers-5cffbfd69f-dlhss" Feb 12 19:48:08.759865 kubelet[2029]: I0212 19:48:08.759667 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zl5nv\" (UniqueName: \"kubernetes.io/projected/b6f10a97-6a15-4fe6-aa96-1b867b822576-kube-api-access-zl5nv\") pod \"coredns-787d4945fb-wqwhf\" (UID: \"b6f10a97-6a15-4fe6-aa96-1b867b822576\") " pod="kube-system/coredns-787d4945fb-wqwhf" Feb 12 19:48:08.759865 kubelet[2029]: I0212 19:48:08.759738 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/9035b034-9c8e-4b17-b971-e692c700076a-config-volume\") pod \"coredns-787d4945fb-flv9z\" (UID: \"9035b034-9c8e-4b17-b971-e692c700076a\") " pod="kube-system/coredns-787d4945fb-flv9z" Feb 12 19:48:08.759865 kubelet[2029]: I0212 19:48:08.759776 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-clrl4\" (UniqueName: \"kubernetes.io/projected/9035b034-9c8e-4b17-b971-e692c700076a-kube-api-access-clrl4\") pod \"coredns-787d4945fb-flv9z\" (UID: \"9035b034-9c8e-4b17-b971-e692c700076a\") " pod="kube-system/coredns-787d4945fb-flv9z" Feb 12 19:48:08.759865 kubelet[2029]: I0212 19:48:08.759824 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/b6f10a97-6a15-4fe6-aa96-1b867b822576-config-volume\") pod \"coredns-787d4945fb-wqwhf\" (UID: \"b6f10a97-6a15-4fe6-aa96-1b867b822576\") " pod="kube-system/coredns-787d4945fb-wqwhf" Feb 12 19:48:08.927854 kubelet[2029]: E0212 19:48:08.927668 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:48:08.930038 env[1106]: time="2024-02-12T19:48:08.929263594Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-flv9z,Uid:9035b034-9c8e-4b17-b971-e692c700076a,Namespace:kube-system,Attempt:0,}" Feb 12 19:48:08.941311 env[1106]: time="2024-02-12T19:48:08.940547194Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5cffbfd69f-dlhss,Uid:5e9cad69-faf3-454a-be31-c3424451d07d,Namespace:calico-system,Attempt:0,}" Feb 12 19:48:09.176093 env[1106]: time="2024-02-12T19:48:09.176000689Z" level=error msg="Failed to destroy network for sandbox \"2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:09.176657 env[1106]: time="2024-02-12T19:48:09.176470168Z" level=error msg="Failed to destroy network for sandbox \"1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:09.177673 env[1106]: time="2024-02-12T19:48:09.177542659Z" level=error msg="encountered an error cleaning up failed sandbox \"2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:09.178204 env[1106]: time="2024-02-12T19:48:09.178094421Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-flv9z,Uid:9035b034-9c8e-4b17-b971-e692c700076a,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:09.178865 env[1106]: time="2024-02-12T19:48:09.178796152Z" level=error msg="encountered an error cleaning up failed sandbox \"1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:09.179276 env[1106]: time="2024-02-12T19:48:09.179211440Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5cffbfd69f-dlhss,Uid:5e9cad69-faf3-454a-be31-c3424451d07d,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:09.179447 kubelet[2029]: E0212 19:48:09.179425 2029 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:09.179537 kubelet[2029]: E0212 19:48:09.179511 2029 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-flv9z" Feb 12 19:48:09.179609 kubelet[2029]: E0212 19:48:09.179547 2029 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-flv9z" Feb 12 19:48:09.179794 kubelet[2029]: E0212 19:48:09.179643 2029 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-flv9z_kube-system(9035b034-9c8e-4b17-b971-e692c700076a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-flv9z_kube-system(9035b034-9c8e-4b17-b971-e692c700076a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-flv9z" podUID=9035b034-9c8e-4b17-b971-e692c700076a Feb 12 19:48:09.185160 kubelet[2029]: E0212 19:48:09.183068 2029 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:09.185160 kubelet[2029]: E0212 19:48:09.183141 2029 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5cffbfd69f-dlhss" Feb 12 19:48:09.185160 kubelet[2029]: E0212 19:48:09.183182 2029 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5cffbfd69f-dlhss" Feb 12 19:48:09.185160 kubelet[2029]: E0212 19:48:09.183222 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:48:09.185554 env[1106]: time="2024-02-12T19:48:09.184410015Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-wqwhf,Uid:b6f10a97-6a15-4fe6-aa96-1b867b822576,Namespace:kube-system,Attempt:0,}" Feb 12 19:48:09.185628 kubelet[2029]: E0212 19:48:09.183258 2029 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5cffbfd69f-dlhss_calico-system(5e9cad69-faf3-454a-be31-c3424451d07d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5cffbfd69f-dlhss_calico-system(5e9cad69-faf3-454a-be31-c3424451d07d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5cffbfd69f-dlhss" podUID=5e9cad69-faf3-454a-be31-c3424451d07d Feb 12 19:48:09.319686 env[1106]: time="2024-02-12T19:48:09.319601552Z" level=error msg="Failed to destroy network for sandbox \"955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:09.320596 env[1106]: time="2024-02-12T19:48:09.320519198Z" level=error msg="encountered an error cleaning up failed sandbox \"955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:09.321122 env[1106]: time="2024-02-12T19:48:09.321066102Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-wqwhf,Uid:b6f10a97-6a15-4fe6-aa96-1b867b822576,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:09.321908 kubelet[2029]: E0212 19:48:09.321808 2029 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:09.322078 kubelet[2029]: E0212 19:48:09.321940 2029 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-wqwhf" Feb 12 19:48:09.322078 kubelet[2029]: E0212 19:48:09.321983 2029 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-wqwhf" Feb 12 19:48:09.322231 kubelet[2029]: E0212 19:48:09.322085 2029 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-wqwhf_kube-system(b6f10a97-6a15-4fe6-aa96-1b867b822576)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-wqwhf_kube-system(b6f10a97-6a15-4fe6-aa96-1b867b822576)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-wqwhf" podUID=b6f10a97-6a15-4fe6-aa96-1b867b822576 Feb 12 19:48:09.497683 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b-shm.mount: Deactivated successfully. Feb 12 19:48:09.544796 kubelet[2029]: I0212 19:48:09.544751 2029 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" Feb 12 19:48:09.546118 env[1106]: time="2024-02-12T19:48:09.546061445Z" level=info msg="StopPodSandbox for \"1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b\"" Feb 12 19:48:09.550058 kubelet[2029]: I0212 19:48:09.550012 2029 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" Feb 12 19:48:09.551100 env[1106]: time="2024-02-12T19:48:09.550946325Z" level=info msg="StopPodSandbox for \"955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41\"" Feb 12 19:48:09.556789 kubelet[2029]: E0212 19:48:09.555535 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:48:09.557275 env[1106]: time="2024-02-12T19:48:09.556897486Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 19:48:09.559971 kubelet[2029]: I0212 19:48:09.559933 2029 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" Feb 12 19:48:09.563087 env[1106]: time="2024-02-12T19:48:09.563005353Z" level=info msg="StopPodSandbox for \"2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169\"" Feb 12 19:48:09.659604 env[1106]: time="2024-02-12T19:48:09.659513691Z" level=error msg="StopPodSandbox for \"1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b\" failed" error="failed to destroy network for sandbox \"1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:09.660541 kubelet[2029]: E0212 19:48:09.660495 2029 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" Feb 12 19:48:09.660811 kubelet[2029]: E0212 19:48:09.660580 2029 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b} Feb 12 19:48:09.660811 kubelet[2029]: E0212 19:48:09.660632 2029 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5e9cad69-faf3-454a-be31-c3424451d07d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:48:09.660811 kubelet[2029]: E0212 19:48:09.660714 2029 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5e9cad69-faf3-454a-be31-c3424451d07d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5cffbfd69f-dlhss" podUID=5e9cad69-faf3-454a-be31-c3424451d07d Feb 12 19:48:09.684246 env[1106]: time="2024-02-12T19:48:09.682210001Z" level=error msg="StopPodSandbox for \"955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41\" failed" error="failed to destroy network for sandbox \"955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:09.684496 kubelet[2029]: E0212 19:48:09.682577 2029 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" Feb 12 19:48:09.684496 kubelet[2029]: E0212 19:48:09.682643 2029 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41} Feb 12 19:48:09.684496 kubelet[2029]: E0212 19:48:09.682801 2029 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b6f10a97-6a15-4fe6-aa96-1b867b822576\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:48:09.684496 kubelet[2029]: E0212 19:48:09.682865 2029 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b6f10a97-6a15-4fe6-aa96-1b867b822576\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-wqwhf" podUID=b6f10a97-6a15-4fe6-aa96-1b867b822576 Feb 12 19:48:09.698593 env[1106]: time="2024-02-12T19:48:09.698308543Z" level=error msg="StopPodSandbox for \"2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169\" failed" error="failed to destroy network for sandbox \"2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:09.698842 kubelet[2029]: E0212 19:48:09.698794 2029 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" Feb 12 19:48:09.698957 kubelet[2029]: E0212 19:48:09.698864 2029 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169} Feb 12 19:48:09.698957 kubelet[2029]: E0212 19:48:09.698933 2029 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9035b034-9c8e-4b17-b971-e692c700076a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:48:09.699118 kubelet[2029]: E0212 19:48:09.698999 2029 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9035b034-9c8e-4b17-b971-e692c700076a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-flv9z" podUID=9035b034-9c8e-4b17-b971-e692c700076a Feb 12 19:48:10.299991 systemd[1]: Created slice kubepods-besteffort-pod1b086c16_44ff_4ae2_8b8c_0804a979d643.slice. Feb 12 19:48:10.307037 env[1106]: time="2024-02-12T19:48:10.306198063Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bp7zv,Uid:1b086c16-44ff-4ae2-8b8c-0804a979d643,Namespace:calico-system,Attempt:0,}" Feb 12 19:48:10.493326 env[1106]: time="2024-02-12T19:48:10.492691516Z" level=error msg="Failed to destroy network for sandbox \"e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:10.498458 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e-shm.mount: Deactivated successfully. Feb 12 19:48:10.500320 env[1106]: time="2024-02-12T19:48:10.500233934Z" level=error msg="encountered an error cleaning up failed sandbox \"e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:10.500687 env[1106]: time="2024-02-12T19:48:10.500628668Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bp7zv,Uid:1b086c16-44ff-4ae2-8b8c-0804a979d643,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:10.501643 kubelet[2029]: E0212 19:48:10.501594 2029 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:10.502408 kubelet[2029]: E0212 19:48:10.501703 2029 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-bp7zv" Feb 12 19:48:10.502408 kubelet[2029]: E0212 19:48:10.501792 2029 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-bp7zv" Feb 12 19:48:10.503022 kubelet[2029]: E0212 19:48:10.502911 2029 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-bp7zv_calico-system(1b086c16-44ff-4ae2-8b8c-0804a979d643)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-bp7zv_calico-system(1b086c16-44ff-4ae2-8b8c-0804a979d643)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-bp7zv" podUID=1b086c16-44ff-4ae2-8b8c-0804a979d643 Feb 12 19:48:10.568215 kubelet[2029]: I0212 19:48:10.565813 2029 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" Feb 12 19:48:10.569857 env[1106]: time="2024-02-12T19:48:10.569746148Z" level=info msg="StopPodSandbox for \"e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e\"" Feb 12 19:48:10.631060 env[1106]: time="2024-02-12T19:48:10.630934188Z" level=error msg="StopPodSandbox for \"e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e\" failed" error="failed to destroy network for sandbox \"e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:10.631875 kubelet[2029]: E0212 19:48:10.631546 2029 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" Feb 12 19:48:10.631875 kubelet[2029]: E0212 19:48:10.631603 2029 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e} Feb 12 19:48:10.631875 kubelet[2029]: E0212 19:48:10.631660 2029 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1b086c16-44ff-4ae2-8b8c-0804a979d643\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:48:10.631875 kubelet[2029]: E0212 19:48:10.631711 2029 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1b086c16-44ff-4ae2-8b8c-0804a979d643\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-bp7zv" podUID=1b086c16-44ff-4ae2-8b8c-0804a979d643 Feb 12 19:48:18.841604 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2962978456.mount: Deactivated successfully. Feb 12 19:48:18.961712 env[1106]: time="2024-02-12T19:48:18.961609454Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:18.965167 env[1106]: time="2024-02-12T19:48:18.965109623Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:18.967321 env[1106]: time="2024-02-12T19:48:18.967269649Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:18.970283 env[1106]: time="2024-02-12T19:48:18.970216005Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:18.971251 env[1106]: time="2024-02-12T19:48:18.971191662Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 12 19:48:19.000284 env[1106]: time="2024-02-12T19:48:19.000202094Z" level=info msg="CreateContainer within sandbox \"709646d3ebd14964f620b442c5f0235daccc33912f8367bfa06a023257f43d65\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 19:48:19.027534 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount473723394.mount: Deactivated successfully. Feb 12 19:48:19.048635 env[1106]: time="2024-02-12T19:48:19.048551401Z" level=info msg="CreateContainer within sandbox \"709646d3ebd14964f620b442c5f0235daccc33912f8367bfa06a023257f43d65\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"b875817a6138008d50cef1b46ca8b3a8517ed48ccd9cae3df843a4247a92b868\"" Feb 12 19:48:19.054346 env[1106]: time="2024-02-12T19:48:19.051832578Z" level=info msg="StartContainer for \"b875817a6138008d50cef1b46ca8b3a8517ed48ccd9cae3df843a4247a92b868\"" Feb 12 19:48:19.096852 systemd[1]: Started cri-containerd-b875817a6138008d50cef1b46ca8b3a8517ed48ccd9cae3df843a4247a92b868.scope. Feb 12 19:48:19.155877 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 12 19:48:19.156102 kernel: audit: type=1400 audit(1707767299.150:1203): avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.150000 audit[3460]: AVC avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.161909 kernel: audit: type=1300 audit(1707767299.150:1203): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2807 pid=3460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:19.150000 audit[3460]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2807 pid=3460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:19.176499 kernel: audit: type=1327 audit(1707767299.150:1203): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238373538313761363133383030386435306365663162343663613862 Feb 12 19:48:19.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238373538313761363133383030386435306365663162343663613862 Feb 12 19:48:19.150000 audit[3460]: AVC avc: denied { bpf } for pid=3460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.186867 kernel: audit: type=1400 audit(1707767299.150:1204): avc: denied { bpf } for pid=3460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.187043 kernel: audit: type=1400 audit(1707767299.150:1204): avc: denied { bpf } for pid=3460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.150000 audit[3460]: AVC avc: denied { bpf } for pid=3460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.150000 audit[3460]: AVC avc: denied { bpf } for pid=3460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.201021 kernel: audit: type=1400 audit(1707767299.150:1204): avc: denied { bpf } for pid=3460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.201239 kernel: audit: type=1400 audit(1707767299.150:1204): avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.150000 audit[3460]: AVC avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.150000 audit[3460]: AVC avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.209315 kernel: audit: type=1400 audit(1707767299.150:1204): avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.150000 audit[3460]: AVC avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.215505 kernel: audit: type=1400 audit(1707767299.150:1204): avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.150000 audit[3460]: AVC avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.220847 kernel: audit: type=1400 audit(1707767299.150:1204): avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.150000 audit[3460]: AVC avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.150000 audit[3460]: AVC avc: denied { bpf } for pid=3460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.150000 audit[3460]: AVC avc: denied { bpf } for pid=3460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.150000 audit: BPF prog-id=154 op=LOAD Feb 12 19:48:19.150000 audit[3460]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00027c420 items=0 ppid=2807 pid=3460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:19.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238373538313761363133383030386435306365663162343663613862 Feb 12 19:48:19.155000 audit[3460]: AVC avc: denied { bpf } for pid=3460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.155000 audit[3460]: AVC avc: denied { bpf } for pid=3460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.155000 audit[3460]: AVC avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.155000 audit[3460]: AVC avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.155000 audit[3460]: AVC avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.155000 audit[3460]: AVC avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.155000 audit[3460]: AVC avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.155000 audit[3460]: AVC avc: denied { bpf } for pid=3460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.155000 audit[3460]: AVC avc: denied { bpf } for pid=3460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.155000 audit: BPF prog-id=155 op=LOAD Feb 12 19:48:19.155000 audit[3460]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00027c468 items=0 ppid=2807 pid=3460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:19.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238373538313761363133383030386435306365663162343663613862 Feb 12 19:48:19.155000 audit: BPF prog-id=155 op=UNLOAD Feb 12 19:48:19.155000 audit: BPF prog-id=154 op=UNLOAD Feb 12 19:48:19.155000 audit[3460]: AVC avc: denied { bpf } for pid=3460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.155000 audit[3460]: AVC avc: denied { bpf } for pid=3460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.155000 audit[3460]: AVC avc: denied { bpf } for pid=3460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.155000 audit[3460]: AVC avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.155000 audit[3460]: AVC avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.155000 audit[3460]: AVC avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.155000 audit[3460]: AVC avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.155000 audit[3460]: AVC avc: denied { perfmon } for pid=3460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.155000 audit[3460]: AVC avc: denied { bpf } for pid=3460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.155000 audit[3460]: AVC avc: denied { bpf } for pid=3460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:19.155000 audit: BPF prog-id=156 op=LOAD Feb 12 19:48:19.155000 audit[3460]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00027c4f8 items=0 ppid=2807 pid=3460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:19.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238373538313761363133383030386435306365663162343663613862 Feb 12 19:48:19.251673 env[1106]: time="2024-02-12T19:48:19.251599954Z" level=info msg="StartContainer for \"b875817a6138008d50cef1b46ca8b3a8517ed48ccd9cae3df843a4247a92b868\" returns successfully" Feb 12 19:48:19.394444 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 19:48:19.394682 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 19:48:19.595392 kubelet[2029]: E0212 19:48:19.595342 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:48:19.635645 kubelet[2029]: I0212 19:48:19.635591 2029 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-27czq" podStartSLOduration=-9.223372014221792e+09 pod.CreationTimestamp="2024-02-12 19:47:57 +0000 UTC" firstStartedPulling="2024-02-12 19:47:58.447759534 +0000 UTC m=+28.825950417" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:48:19.631371682 +0000 UTC m=+50.009562583" watchObservedRunningTime="2024-02-12 19:48:19.632982959 +0000 UTC m=+50.011173848" Feb 12 19:48:21.168000 audit[3566]: AVC avc: denied { write } for pid=3566 comm="tee" name="fd" dev="proc" ino=25459 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:48:21.168000 audit[3566]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd354bc96e a2=241 a3=1b6 items=1 ppid=3543 pid=3566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:21.168000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 19:48:21.168000 audit: PATH item=0 name="/dev/fd/63" inode=26449 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:48:21.168000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:48:21.174000 audit[3562]: AVC avc: denied { write } for pid=3562 comm="tee" name="fd" dev="proc" ino=26455 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:48:21.174000 audit[3562]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffddc04b970 a2=241 a3=1b6 items=1 ppid=3529 pid=3562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:21.174000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 19:48:21.174000 audit: PATH item=0 name="/dev/fd/63" inode=26444 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:48:21.174000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:48:21.177000 audit[3569]: AVC avc: denied { write } for pid=3569 comm="tee" name="fd" dev="proc" ino=25465 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:48:21.177000 audit[3569]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcd507895f a2=241 a3=1b6 items=1 ppid=3527 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:21.177000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 19:48:21.177000 audit: PATH item=0 name="/dev/fd/63" inode=25452 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:48:21.189000 audit[3573]: AVC avc: denied { write } for pid=3573 comm="tee" name="fd" dev="proc" ino=25472 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:48:21.189000 audit[3573]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe0b44495e a2=241 a3=1b6 items=1 ppid=3535 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:21.189000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 19:48:21.189000 audit: PATH item=0 name="/dev/fd/63" inode=26450 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:48:21.189000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:48:21.177000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:48:21.232000 audit[3576]: AVC avc: denied { write } for pid=3576 comm="tee" name="fd" dev="proc" ino=26471 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:48:21.234000 audit[3582]: AVC avc: denied { write } for pid=3582 comm="tee" name="fd" dev="proc" ino=26476 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:48:21.234000 audit[3582]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd356a896e a2=241 a3=1b6 items=1 ppid=3531 pid=3582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:21.234000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 19:48:21.234000 audit: PATH item=0 name="/dev/fd/63" inode=26454 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:48:21.234000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:48:21.232000 audit[3576]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc0aef296e a2=241 a3=1b6 items=1 ppid=3540 pid=3576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:21.232000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 19:48:21.232000 audit: PATH item=0 name="/dev/fd/63" inode=26451 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:48:21.232000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:48:21.254000 audit[3603]: AVC avc: denied { write } for pid=3603 comm="tee" name="fd" dev="proc" ino=25477 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:48:21.254000 audit[3603]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc5105096f a2=241 a3=1b6 items=1 ppid=3533 pid=3603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:21.254000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 19:48:21.254000 audit: PATH item=0 name="/dev/fd/63" inode=25474 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:48:21.254000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:48:21.921000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.921000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.921000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.921000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.921000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.921000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.921000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.921000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.921000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.921000 audit: BPF prog-id=157 op=LOAD Feb 12 19:48:21.921000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdfe84afb0 a2=70 a3=7f41b704c000 items=0 ppid=3541 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:21.921000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:48:21.924000 audit: BPF prog-id=157 op=UNLOAD Feb 12 19:48:21.924000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.924000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.924000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.924000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.924000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.924000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.924000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.924000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.924000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.924000 audit: BPF prog-id=158 op=LOAD Feb 12 19:48:21.924000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdfe84afb0 a2=70 a3=6e items=0 ppid=3541 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:21.924000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:48:21.925000 audit: BPF prog-id=158 op=UNLOAD Feb 12 19:48:21.925000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.925000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdfe84af60 a2=70 a3=7ffdfe84afb0 items=0 ppid=3541 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:21.925000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:48:21.925000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.925000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.925000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.925000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.925000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.925000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.925000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.925000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.925000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.925000 audit: BPF prog-id=159 op=LOAD Feb 12 19:48:21.925000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffdfe84af40 a2=70 a3=7ffdfe84afb0 items=0 ppid=3541 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:21.925000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:48:21.925000 audit: BPF prog-id=159 op=UNLOAD Feb 12 19:48:21.925000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.925000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdfe84b020 a2=70 a3=0 items=0 ppid=3541 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:21.925000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:48:21.925000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.925000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdfe84b010 a2=70 a3=0 items=0 ppid=3541 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:21.925000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:48:21.925000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.925000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffdfe84b050 a2=70 a3=0 items=0 ppid=3541 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:21.925000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:48:21.926000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.926000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.926000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.926000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.926000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.926000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.926000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.926000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.926000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.926000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.926000 audit: BPF prog-id=160 op=LOAD Feb 12 19:48:21.926000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffdfe84af70 a2=70 a3=ffffffff items=0 ppid=3541 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:21.926000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:48:21.944000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.944000 audit[3669]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd850267b0 a2=70 a3=fff80800 items=0 ppid=3541 pid=3669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:21.944000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:48:21.959000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:21.959000 audit[3669]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd85026680 a2=70 a3=3 items=0 ppid=3541 pid=3669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:21.959000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:48:21.974000 audit: BPF prog-id=160 op=UNLOAD Feb 12 19:48:22.103000 audit[3692]: NETFILTER_CFG table=raw:117 family=2 entries=19 op=nft_register_chain pid=3692 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:48:22.103000 audit[3692]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffdb3e8bca0 a2=0 a3=7ffdb3e8bc8c items=0 ppid=3541 pid=3692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:22.103000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:48:22.109000 audit[3693]: NETFILTER_CFG table=nat:118 family=2 entries=16 op=nft_register_chain pid=3693 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:48:22.109000 audit[3693]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffe9297d7b0 a2=0 a3=563df7e80000 items=0 ppid=3541 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:22.109000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:48:22.111000 audit[3695]: NETFILTER_CFG table=mangle:119 family=2 entries=19 op=nft_register_chain pid=3695 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:48:22.111000 audit[3695]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffca55f8800 a2=0 a3=55904fe30000 items=0 ppid=3541 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:22.111000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:48:22.115000 audit[3697]: NETFILTER_CFG table=filter:120 family=2 entries=39 op=nft_register_chain pid=3697 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:48:22.115000 audit[3697]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffeacfe3960 a2=0 a3=557329ebd000 items=0 ppid=3541 pid=3697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:22.115000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:48:22.187000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:22.187000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000ee1a80 a2=fc6 a3=0 items=0 ppid=1727 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 key=(null) Feb 12 19:48:22.187000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:48:22.187000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:22.187000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0006c1da0 a2=fc6 a3=0 items=0 ppid=1727 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 key=(null) Feb 12 19:48:22.187000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:48:22.293032 env[1106]: time="2024-02-12T19:48:22.291353660Z" level=info msg="StopPodSandbox for \"1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b\"" Feb 12 19:48:22.609621 systemd-networkd[998]: vxlan.calico: Link UP Feb 12 19:48:22.609633 systemd-networkd[998]: vxlan.calico: Gained carrier Feb 12 19:48:22.649759 env[1106]: 2024-02-12 19:48:22.426 [INFO][3716] k8s.go 578: Cleaning up netns ContainerID="1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" Feb 12 19:48:22.649759 env[1106]: 2024-02-12 19:48:22.427 [INFO][3716] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" iface="eth0" netns="/var/run/netns/cni-5ff4d45e-ab68-a8e6-66d8-d24bf02ec30d" Feb 12 19:48:22.649759 env[1106]: 2024-02-12 19:48:22.428 [INFO][3716] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" iface="eth0" netns="/var/run/netns/cni-5ff4d45e-ab68-a8e6-66d8-d24bf02ec30d" Feb 12 19:48:22.649759 env[1106]: 2024-02-12 19:48:22.429 [INFO][3716] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" iface="eth0" netns="/var/run/netns/cni-5ff4d45e-ab68-a8e6-66d8-d24bf02ec30d" Feb 12 19:48:22.649759 env[1106]: 2024-02-12 19:48:22.429 [INFO][3716] k8s.go 585: Releasing IP address(es) ContainerID="1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" Feb 12 19:48:22.649759 env[1106]: 2024-02-12 19:48:22.429 [INFO][3716] utils.go 188: Calico CNI releasing IP address ContainerID="1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" Feb 12 19:48:22.649759 env[1106]: 2024-02-12 19:48:22.615 [INFO][3722] ipam_plugin.go 415: Releasing address using handleID ContainerID="1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" HandleID="k8s-pod-network.1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" Workload="ci--3510.3.2--d--344270592c-k8s-calico--kube--controllers--5cffbfd69f--dlhss-eth0" Feb 12 19:48:22.649759 env[1106]: 2024-02-12 19:48:22.617 [INFO][3722] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:22.649759 env[1106]: 2024-02-12 19:48:22.617 [INFO][3722] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:22.649759 env[1106]: 2024-02-12 19:48:22.639 [WARNING][3722] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" HandleID="k8s-pod-network.1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" Workload="ci--3510.3.2--d--344270592c-k8s-calico--kube--controllers--5cffbfd69f--dlhss-eth0" Feb 12 19:48:22.649759 env[1106]: 2024-02-12 19:48:22.639 [INFO][3722] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" HandleID="k8s-pod-network.1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" Workload="ci--3510.3.2--d--344270592c-k8s-calico--kube--controllers--5cffbfd69f--dlhss-eth0" Feb 12 19:48:22.649759 env[1106]: 2024-02-12 19:48:22.643 [INFO][3722] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:22.649759 env[1106]: 2024-02-12 19:48:22.646 [INFO][3716] k8s.go 591: Teardown processing complete. ContainerID="1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" Feb 12 19:48:22.653660 systemd[1]: run-netns-cni\x2d5ff4d45e\x2dab68\x2da8e6\x2d66d8\x2dd24bf02ec30d.mount: Deactivated successfully. Feb 12 19:48:22.655024 env[1106]: time="2024-02-12T19:48:22.654951990Z" level=info msg="TearDown network for sandbox \"1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b\" successfully" Feb 12 19:48:22.655175 env[1106]: time="2024-02-12T19:48:22.655021235Z" level=info msg="StopPodSandbox for \"1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b\" returns successfully" Feb 12 19:48:22.656171 env[1106]: time="2024-02-12T19:48:22.656098169Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5cffbfd69f-dlhss,Uid:5e9cad69-faf3-454a-be31-c3424451d07d,Namespace:calico-system,Attempt:1,}" Feb 12 19:48:22.917311 systemd-networkd[998]: califc22a6ac562: Link UP Feb 12 19:48:22.918781 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califc22a6ac562: link becomes ready Feb 12 19:48:22.919006 systemd-networkd[998]: califc22a6ac562: Gained carrier Feb 12 19:48:22.943472 env[1106]: 2024-02-12 19:48:22.767 [INFO][3730] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--d--344270592c-k8s-calico--kube--controllers--5cffbfd69f--dlhss-eth0 calico-kube-controllers-5cffbfd69f- calico-system 5e9cad69-faf3-454a-be31-c3424451d07d 816 0 2024-02-12 19:47:51 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5cffbfd69f projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.2-d-344270592c calico-kube-controllers-5cffbfd69f-dlhss eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] califc22a6ac562 [] []}} ContainerID="afbfbe2133869dcc98c93bf9aeca5669464002eecde194ffc57eb04bc76726a5" Namespace="calico-system" Pod="calico-kube-controllers-5cffbfd69f-dlhss" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-calico--kube--controllers--5cffbfd69f--dlhss-" Feb 12 19:48:22.943472 env[1106]: 2024-02-12 19:48:22.768 [INFO][3730] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="afbfbe2133869dcc98c93bf9aeca5669464002eecde194ffc57eb04bc76726a5" Namespace="calico-system" Pod="calico-kube-controllers-5cffbfd69f-dlhss" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-calico--kube--controllers--5cffbfd69f--dlhss-eth0" Feb 12 19:48:22.943472 env[1106]: 2024-02-12 19:48:22.835 [INFO][3742] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="afbfbe2133869dcc98c93bf9aeca5669464002eecde194ffc57eb04bc76726a5" HandleID="k8s-pod-network.afbfbe2133869dcc98c93bf9aeca5669464002eecde194ffc57eb04bc76726a5" Workload="ci--3510.3.2--d--344270592c-k8s-calico--kube--controllers--5cffbfd69f--dlhss-eth0" Feb 12 19:48:22.943472 env[1106]: 2024-02-12 19:48:22.852 [INFO][3742] ipam_plugin.go 268: Auto assigning IP ContainerID="afbfbe2133869dcc98c93bf9aeca5669464002eecde194ffc57eb04bc76726a5" HandleID="k8s-pod-network.afbfbe2133869dcc98c93bf9aeca5669464002eecde194ffc57eb04bc76726a5" Workload="ci--3510.3.2--d--344270592c-k8s-calico--kube--controllers--5cffbfd69f--dlhss-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002bea90), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-d-344270592c", "pod":"calico-kube-controllers-5cffbfd69f-dlhss", "timestamp":"2024-02-12 19:48:22.835149185 +0000 UTC"}, Hostname:"ci-3510.3.2-d-344270592c", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:48:22.943472 env[1106]: 2024-02-12 19:48:22.853 [INFO][3742] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:22.943472 env[1106]: 2024-02-12 19:48:22.853 [INFO][3742] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:22.943472 env[1106]: 2024-02-12 19:48:22.853 [INFO][3742] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-d-344270592c' Feb 12 19:48:22.943472 env[1106]: 2024-02-12 19:48:22.858 [INFO][3742] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.afbfbe2133869dcc98c93bf9aeca5669464002eecde194ffc57eb04bc76726a5" host="ci-3510.3.2-d-344270592c" Feb 12 19:48:22.943472 env[1106]: 2024-02-12 19:48:22.871 [INFO][3742] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-d-344270592c" Feb 12 19:48:22.943472 env[1106]: 2024-02-12 19:48:22.879 [INFO][3742] ipam.go 489: Trying affinity for 192.168.21.0/26 host="ci-3510.3.2-d-344270592c" Feb 12 19:48:22.943472 env[1106]: 2024-02-12 19:48:22.884 [INFO][3742] ipam.go 155: Attempting to load block cidr=192.168.21.0/26 host="ci-3510.3.2-d-344270592c" Feb 12 19:48:22.943472 env[1106]: 2024-02-12 19:48:22.888 [INFO][3742] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.21.0/26 host="ci-3510.3.2-d-344270592c" Feb 12 19:48:22.943472 env[1106]: 2024-02-12 19:48:22.888 [INFO][3742] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.21.0/26 handle="k8s-pod-network.afbfbe2133869dcc98c93bf9aeca5669464002eecde194ffc57eb04bc76726a5" host="ci-3510.3.2-d-344270592c" Feb 12 19:48:22.943472 env[1106]: 2024-02-12 19:48:22.891 [INFO][3742] ipam.go 1682: Creating new handle: k8s-pod-network.afbfbe2133869dcc98c93bf9aeca5669464002eecde194ffc57eb04bc76726a5 Feb 12 19:48:22.943472 env[1106]: 2024-02-12 19:48:22.898 [INFO][3742] ipam.go 1203: Writing block in order to claim IPs block=192.168.21.0/26 handle="k8s-pod-network.afbfbe2133869dcc98c93bf9aeca5669464002eecde194ffc57eb04bc76726a5" host="ci-3510.3.2-d-344270592c" Feb 12 19:48:22.943472 env[1106]: 2024-02-12 19:48:22.906 [INFO][3742] ipam.go 1216: Successfully claimed IPs: [192.168.21.1/26] block=192.168.21.0/26 handle="k8s-pod-network.afbfbe2133869dcc98c93bf9aeca5669464002eecde194ffc57eb04bc76726a5" host="ci-3510.3.2-d-344270592c" Feb 12 19:48:22.943472 env[1106]: 2024-02-12 19:48:22.906 [INFO][3742] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.21.1/26] handle="k8s-pod-network.afbfbe2133869dcc98c93bf9aeca5669464002eecde194ffc57eb04bc76726a5" host="ci-3510.3.2-d-344270592c" Feb 12 19:48:22.943472 env[1106]: 2024-02-12 19:48:22.907 [INFO][3742] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:22.943472 env[1106]: 2024-02-12 19:48:22.907 [INFO][3742] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.21.1/26] IPv6=[] ContainerID="afbfbe2133869dcc98c93bf9aeca5669464002eecde194ffc57eb04bc76726a5" HandleID="k8s-pod-network.afbfbe2133869dcc98c93bf9aeca5669464002eecde194ffc57eb04bc76726a5" Workload="ci--3510.3.2--d--344270592c-k8s-calico--kube--controllers--5cffbfd69f--dlhss-eth0" Feb 12 19:48:22.944390 env[1106]: 2024-02-12 19:48:22.910 [INFO][3730] k8s.go 385: Populated endpoint ContainerID="afbfbe2133869dcc98c93bf9aeca5669464002eecde194ffc57eb04bc76726a5" Namespace="calico-system" Pod="calico-kube-controllers-5cffbfd69f-dlhss" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-calico--kube--controllers--5cffbfd69f--dlhss-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--d--344270592c-k8s-calico--kube--controllers--5cffbfd69f--dlhss-eth0", GenerateName:"calico-kube-controllers-5cffbfd69f-", Namespace:"calico-system", SelfLink:"", UID:"5e9cad69-faf3-454a-be31-c3424451d07d", ResourceVersion:"816", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 47, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5cffbfd69f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-d-344270592c", ContainerID:"", Pod:"calico-kube-controllers-5cffbfd69f-dlhss", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.21.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califc22a6ac562", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:22.944390 env[1106]: 2024-02-12 19:48:22.911 [INFO][3730] k8s.go 386: Calico CNI using IPs: [192.168.21.1/32] ContainerID="afbfbe2133869dcc98c93bf9aeca5669464002eecde194ffc57eb04bc76726a5" Namespace="calico-system" Pod="calico-kube-controllers-5cffbfd69f-dlhss" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-calico--kube--controllers--5cffbfd69f--dlhss-eth0" Feb 12 19:48:22.944390 env[1106]: 2024-02-12 19:48:22.911 [INFO][3730] dataplane_linux.go 68: Setting the host side veth name to califc22a6ac562 ContainerID="afbfbe2133869dcc98c93bf9aeca5669464002eecde194ffc57eb04bc76726a5" Namespace="calico-system" Pod="calico-kube-controllers-5cffbfd69f-dlhss" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-calico--kube--controllers--5cffbfd69f--dlhss-eth0" Feb 12 19:48:22.944390 env[1106]: 2024-02-12 19:48:22.915 [INFO][3730] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="afbfbe2133869dcc98c93bf9aeca5669464002eecde194ffc57eb04bc76726a5" Namespace="calico-system" Pod="calico-kube-controllers-5cffbfd69f-dlhss" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-calico--kube--controllers--5cffbfd69f--dlhss-eth0" Feb 12 19:48:22.944390 env[1106]: 2024-02-12 19:48:22.927 [INFO][3730] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="afbfbe2133869dcc98c93bf9aeca5669464002eecde194ffc57eb04bc76726a5" Namespace="calico-system" Pod="calico-kube-controllers-5cffbfd69f-dlhss" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-calico--kube--controllers--5cffbfd69f--dlhss-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--d--344270592c-k8s-calico--kube--controllers--5cffbfd69f--dlhss-eth0", GenerateName:"calico-kube-controllers-5cffbfd69f-", Namespace:"calico-system", SelfLink:"", UID:"5e9cad69-faf3-454a-be31-c3424451d07d", ResourceVersion:"816", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 47, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5cffbfd69f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-d-344270592c", ContainerID:"afbfbe2133869dcc98c93bf9aeca5669464002eecde194ffc57eb04bc76726a5", Pod:"calico-kube-controllers-5cffbfd69f-dlhss", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.21.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califc22a6ac562", MAC:"d2:83:a3:af:aa:8e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:22.944390 env[1106]: 2024-02-12 19:48:22.940 [INFO][3730] k8s.go 491: Wrote updated endpoint to datastore ContainerID="afbfbe2133869dcc98c93bf9aeca5669464002eecde194ffc57eb04bc76726a5" Namespace="calico-system" Pod="calico-kube-controllers-5cffbfd69f-dlhss" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-calico--kube--controllers--5cffbfd69f--dlhss-eth0" Feb 12 19:48:22.980652 env[1106]: time="2024-02-12T19:48:22.978812512Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:48:22.980652 env[1106]: time="2024-02-12T19:48:22.978876877Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:48:22.980652 env[1106]: time="2024-02-12T19:48:22.978887446Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:48:22.980652 env[1106]: time="2024-02-12T19:48:22.979030686Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/afbfbe2133869dcc98c93bf9aeca5669464002eecde194ffc57eb04bc76726a5 pid=3765 runtime=io.containerd.runc.v2 Feb 12 19:48:23.034841 systemd[1]: Started cri-containerd-afbfbe2133869dcc98c93bf9aeca5669464002eecde194ffc57eb04bc76726a5.scope. Feb 12 19:48:23.042000 audit[3784]: NETFILTER_CFG table=filter:121 family=2 entries=36 op=nft_register_chain pid=3784 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:48:23.042000 audit[3784]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7fff9dc7f9b0 a2=0 a3=7fff9dc7f99c items=0 ppid=3541 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:23.042000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:48:23.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.067000 audit: BPF prog-id=161 op=LOAD Feb 12 19:48:23.070000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.070000 audit[3777]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3765 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:23.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166626662653231333338363964636339386339336266396165636135 Feb 12 19:48:23.070000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.070000 audit[3777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3765 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:23.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166626662653231333338363964636339386339336266396165636135 Feb 12 19:48:23.070000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.070000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.070000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.070000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.070000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.070000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.070000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.070000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.070000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.070000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.070000 audit: BPF prog-id=162 op=LOAD Feb 12 19:48:23.070000 audit[3777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002a03e0 items=0 ppid=3765 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:23.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166626662653231333338363964636339386339336266396165636135 Feb 12 19:48:23.071000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.071000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.071000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.071000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.071000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.071000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.071000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.071000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.071000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.071000 audit: BPF prog-id=163 op=LOAD Feb 12 19:48:23.071000 audit[3777]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002a0428 items=0 ppid=3765 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:23.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166626662653231333338363964636339386339336266396165636135 Feb 12 19:48:23.072000 audit: BPF prog-id=163 op=UNLOAD Feb 12 19:48:23.072000 audit: BPF prog-id=162 op=UNLOAD Feb 12 19:48:23.072000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.072000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.072000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.072000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.072000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.072000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.072000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.072000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.072000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.072000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.072000 audit: BPF prog-id=164 op=LOAD Feb 12 19:48:23.072000 audit[3777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002a0838 items=0 ppid=3765 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:23.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166626662653231333338363964636339386339336266396165636135 Feb 12 19:48:23.118400 env[1106]: time="2024-02-12T19:48:23.118340054Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5cffbfd69f-dlhss,Uid:5e9cad69-faf3-454a-be31-c3424451d07d,Namespace:calico-system,Attempt:1,} returns sandbox id \"afbfbe2133869dcc98c93bf9aeca5669464002eecde194ffc57eb04bc76726a5\"" Feb 12 19:48:23.120675 env[1106]: time="2024-02-12T19:48:23.120570426Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 12 19:48:23.289784 env[1106]: time="2024-02-12T19:48:23.289684017Z" level=info msg="StopPodSandbox for \"955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41\"" Feb 12 19:48:23.433365 env[1106]: 2024-02-12 19:48:23.378 [INFO][3821] k8s.go 578: Cleaning up netns ContainerID="955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" Feb 12 19:48:23.433365 env[1106]: 2024-02-12 19:48:23.379 [INFO][3821] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" iface="eth0" netns="/var/run/netns/cni-707dfcd2-bd47-a753-301a-effcb7cb761c" Feb 12 19:48:23.433365 env[1106]: 2024-02-12 19:48:23.379 [INFO][3821] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" iface="eth0" netns="/var/run/netns/cni-707dfcd2-bd47-a753-301a-effcb7cb761c" Feb 12 19:48:23.433365 env[1106]: 2024-02-12 19:48:23.379 [INFO][3821] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" iface="eth0" netns="/var/run/netns/cni-707dfcd2-bd47-a753-301a-effcb7cb761c" Feb 12 19:48:23.433365 env[1106]: 2024-02-12 19:48:23.379 [INFO][3821] k8s.go 585: Releasing IP address(es) ContainerID="955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" Feb 12 19:48:23.433365 env[1106]: 2024-02-12 19:48:23.380 [INFO][3821] utils.go 188: Calico CNI releasing IP address ContainerID="955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" Feb 12 19:48:23.433365 env[1106]: 2024-02-12 19:48:23.413 [INFO][3827] ipam_plugin.go 415: Releasing address using handleID ContainerID="955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" HandleID="k8s-pod-network.955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" Workload="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--wqwhf-eth0" Feb 12 19:48:23.433365 env[1106]: 2024-02-12 19:48:23.413 [INFO][3827] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:23.433365 env[1106]: 2024-02-12 19:48:23.413 [INFO][3827] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:23.433365 env[1106]: 2024-02-12 19:48:23.424 [WARNING][3827] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" HandleID="k8s-pod-network.955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" Workload="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--wqwhf-eth0" Feb 12 19:48:23.433365 env[1106]: 2024-02-12 19:48:23.424 [INFO][3827] ipam_plugin.go 443: Releasing address using workloadID ContainerID="955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" HandleID="k8s-pod-network.955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" Workload="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--wqwhf-eth0" Feb 12 19:48:23.433365 env[1106]: 2024-02-12 19:48:23.428 [INFO][3827] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:23.433365 env[1106]: 2024-02-12 19:48:23.430 [INFO][3821] k8s.go 591: Teardown processing complete. ContainerID="955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" Feb 12 19:48:23.434345 env[1106]: time="2024-02-12T19:48:23.433583710Z" level=info msg="TearDown network for sandbox \"955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41\" successfully" Feb 12 19:48:23.434345 env[1106]: time="2024-02-12T19:48:23.433637919Z" level=info msg="StopPodSandbox for \"955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41\" returns successfully" Feb 12 19:48:23.435343 kubelet[2029]: E0212 19:48:23.434776 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:48:23.439196 env[1106]: time="2024-02-12T19:48:23.438483677Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-wqwhf,Uid:b6f10a97-6a15-4fe6-aa96-1b867b822576,Namespace:kube-system,Attempt:1,}" Feb 12 19:48:23.654871 systemd[1]: run-netns-cni\x2d707dfcd2\x2dbd47\x2da753\x2d301a\x2deffcb7cb761c.mount: Deactivated successfully. Feb 12 19:48:23.851531 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali68b136ec3e4: link becomes ready Feb 12 19:48:23.853625 systemd-networkd[998]: cali68b136ec3e4: Link UP Feb 12 19:48:23.856107 systemd-networkd[998]: cali68b136ec3e4: Gained carrier Feb 12 19:48:23.881075 env[1106]: 2024-02-12 19:48:23.536 [INFO][3833] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--wqwhf-eth0 coredns-787d4945fb- kube-system b6f10a97-6a15-4fe6-aa96-1b867b822576 823 0 2024-02-12 19:47:42 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-d-344270592c coredns-787d4945fb-wqwhf eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali68b136ec3e4 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="36817ce8b86f4b12b4178af2ac14165b7089ac5c71487fd5186a16495c7cccaf" Namespace="kube-system" Pod="coredns-787d4945fb-wqwhf" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--wqwhf-" Feb 12 19:48:23.881075 env[1106]: 2024-02-12 19:48:23.537 [INFO][3833] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="36817ce8b86f4b12b4178af2ac14165b7089ac5c71487fd5186a16495c7cccaf" Namespace="kube-system" Pod="coredns-787d4945fb-wqwhf" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--wqwhf-eth0" Feb 12 19:48:23.881075 env[1106]: 2024-02-12 19:48:23.617 [INFO][3845] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="36817ce8b86f4b12b4178af2ac14165b7089ac5c71487fd5186a16495c7cccaf" HandleID="k8s-pod-network.36817ce8b86f4b12b4178af2ac14165b7089ac5c71487fd5186a16495c7cccaf" Workload="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--wqwhf-eth0" Feb 12 19:48:23.881075 env[1106]: 2024-02-12 19:48:23.712 [INFO][3845] ipam_plugin.go 268: Auto assigning IP ContainerID="36817ce8b86f4b12b4178af2ac14165b7089ac5c71487fd5186a16495c7cccaf" HandleID="k8s-pod-network.36817ce8b86f4b12b4178af2ac14165b7089ac5c71487fd5186a16495c7cccaf" Workload="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--wqwhf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002bea90), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-d-344270592c", "pod":"coredns-787d4945fb-wqwhf", "timestamp":"2024-02-12 19:48:23.617564659 +0000 UTC"}, Hostname:"ci-3510.3.2-d-344270592c", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:48:23.881075 env[1106]: 2024-02-12 19:48:23.713 [INFO][3845] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:23.881075 env[1106]: 2024-02-12 19:48:23.713 [INFO][3845] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:23.881075 env[1106]: 2024-02-12 19:48:23.713 [INFO][3845] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-d-344270592c' Feb 12 19:48:23.881075 env[1106]: 2024-02-12 19:48:23.717 [INFO][3845] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.36817ce8b86f4b12b4178af2ac14165b7089ac5c71487fd5186a16495c7cccaf" host="ci-3510.3.2-d-344270592c" Feb 12 19:48:23.881075 env[1106]: 2024-02-12 19:48:23.751 [INFO][3845] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-d-344270592c" Feb 12 19:48:23.881075 env[1106]: 2024-02-12 19:48:23.769 [INFO][3845] ipam.go 489: Trying affinity for 192.168.21.0/26 host="ci-3510.3.2-d-344270592c" Feb 12 19:48:23.881075 env[1106]: 2024-02-12 19:48:23.776 [INFO][3845] ipam.go 155: Attempting to load block cidr=192.168.21.0/26 host="ci-3510.3.2-d-344270592c" Feb 12 19:48:23.881075 env[1106]: 2024-02-12 19:48:23.794 [INFO][3845] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.21.0/26 host="ci-3510.3.2-d-344270592c" Feb 12 19:48:23.881075 env[1106]: 2024-02-12 19:48:23.795 [INFO][3845] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.21.0/26 handle="k8s-pod-network.36817ce8b86f4b12b4178af2ac14165b7089ac5c71487fd5186a16495c7cccaf" host="ci-3510.3.2-d-344270592c" Feb 12 19:48:23.881075 env[1106]: 2024-02-12 19:48:23.802 [INFO][3845] ipam.go 1682: Creating new handle: k8s-pod-network.36817ce8b86f4b12b4178af2ac14165b7089ac5c71487fd5186a16495c7cccaf Feb 12 19:48:23.881075 env[1106]: 2024-02-12 19:48:23.823 [INFO][3845] ipam.go 1203: Writing block in order to claim IPs block=192.168.21.0/26 handle="k8s-pod-network.36817ce8b86f4b12b4178af2ac14165b7089ac5c71487fd5186a16495c7cccaf" host="ci-3510.3.2-d-344270592c" Feb 12 19:48:23.881075 env[1106]: 2024-02-12 19:48:23.842 [INFO][3845] ipam.go 1216: Successfully claimed IPs: [192.168.21.2/26] block=192.168.21.0/26 handle="k8s-pod-network.36817ce8b86f4b12b4178af2ac14165b7089ac5c71487fd5186a16495c7cccaf" host="ci-3510.3.2-d-344270592c" Feb 12 19:48:23.881075 env[1106]: 2024-02-12 19:48:23.843 [INFO][3845] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.21.2/26] handle="k8s-pod-network.36817ce8b86f4b12b4178af2ac14165b7089ac5c71487fd5186a16495c7cccaf" host="ci-3510.3.2-d-344270592c" Feb 12 19:48:23.881075 env[1106]: 2024-02-12 19:48:23.843 [INFO][3845] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:23.881075 env[1106]: 2024-02-12 19:48:23.843 [INFO][3845] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.21.2/26] IPv6=[] ContainerID="36817ce8b86f4b12b4178af2ac14165b7089ac5c71487fd5186a16495c7cccaf" HandleID="k8s-pod-network.36817ce8b86f4b12b4178af2ac14165b7089ac5c71487fd5186a16495c7cccaf" Workload="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--wqwhf-eth0" Feb 12 19:48:23.882310 env[1106]: 2024-02-12 19:48:23.846 [INFO][3833] k8s.go 385: Populated endpoint ContainerID="36817ce8b86f4b12b4178af2ac14165b7089ac5c71487fd5186a16495c7cccaf" Namespace="kube-system" Pod="coredns-787d4945fb-wqwhf" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--wqwhf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--wqwhf-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"b6f10a97-6a15-4fe6-aa96-1b867b822576", ResourceVersion:"823", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 47, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-d-344270592c", ContainerID:"", Pod:"coredns-787d4945fb-wqwhf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali68b136ec3e4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:23.882310 env[1106]: 2024-02-12 19:48:23.847 [INFO][3833] k8s.go 386: Calico CNI using IPs: [192.168.21.2/32] ContainerID="36817ce8b86f4b12b4178af2ac14165b7089ac5c71487fd5186a16495c7cccaf" Namespace="kube-system" Pod="coredns-787d4945fb-wqwhf" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--wqwhf-eth0" Feb 12 19:48:23.882310 env[1106]: 2024-02-12 19:48:23.847 [INFO][3833] dataplane_linux.go 68: Setting the host side veth name to cali68b136ec3e4 ContainerID="36817ce8b86f4b12b4178af2ac14165b7089ac5c71487fd5186a16495c7cccaf" Namespace="kube-system" Pod="coredns-787d4945fb-wqwhf" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--wqwhf-eth0" Feb 12 19:48:23.882310 env[1106]: 2024-02-12 19:48:23.849 [INFO][3833] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="36817ce8b86f4b12b4178af2ac14165b7089ac5c71487fd5186a16495c7cccaf" Namespace="kube-system" Pod="coredns-787d4945fb-wqwhf" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--wqwhf-eth0" Feb 12 19:48:23.882310 env[1106]: 2024-02-12 19:48:23.858 [INFO][3833] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="36817ce8b86f4b12b4178af2ac14165b7089ac5c71487fd5186a16495c7cccaf" Namespace="kube-system" Pod="coredns-787d4945fb-wqwhf" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--wqwhf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--wqwhf-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"b6f10a97-6a15-4fe6-aa96-1b867b822576", ResourceVersion:"823", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 47, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-d-344270592c", ContainerID:"36817ce8b86f4b12b4178af2ac14165b7089ac5c71487fd5186a16495c7cccaf", Pod:"coredns-787d4945fb-wqwhf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali68b136ec3e4", MAC:"9e:bf:da:f7:97:63", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:23.882310 env[1106]: 2024-02-12 19:48:23.876 [INFO][3833] k8s.go 491: Wrote updated endpoint to datastore ContainerID="36817ce8b86f4b12b4178af2ac14165b7089ac5c71487fd5186a16495c7cccaf" Namespace="kube-system" Pod="coredns-787d4945fb-wqwhf" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--wqwhf-eth0" Feb 12 19:48:23.906895 env[1106]: time="2024-02-12T19:48:23.905160380Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:48:23.906895 env[1106]: time="2024-02-12T19:48:23.905255801Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:48:23.906895 env[1106]: time="2024-02-12T19:48:23.905275122Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:48:23.909166 env[1106]: time="2024-02-12T19:48:23.909014805Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/36817ce8b86f4b12b4178af2ac14165b7089ac5c71487fd5186a16495c7cccaf pid=3872 runtime=io.containerd.runc.v2 Feb 12 19:48:23.948022 systemd[1]: run-containerd-runc-k8s.io-36817ce8b86f4b12b4178af2ac14165b7089ac5c71487fd5186a16495c7cccaf-runc.gCn7RC.mount: Deactivated successfully. Feb 12 19:48:23.953255 systemd[1]: Started cri-containerd-36817ce8b86f4b12b4178af2ac14165b7089ac5c71487fd5186a16495c7cccaf.scope. Feb 12 19:48:23.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.984000 audit: BPF prog-id=165 op=LOAD Feb 12 19:48:23.986000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.986000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3872 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:23.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336383137636538623836663462313262343137386166326163313431 Feb 12 19:48:23.986000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.986000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3872 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:23.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336383137636538623836663462313262343137386166326163313431 Feb 12 19:48:23.986000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.986000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.986000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.986000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.986000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.986000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.986000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.986000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.986000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.986000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.986000 audit: BPF prog-id=166 op=LOAD Feb 12 19:48:23.986000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a0510 items=0 ppid=3872 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:23.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336383137636538623836663462313262343137386166326163313431 Feb 12 19:48:23.987000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.987000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.987000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.987000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.987000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.987000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.987000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.987000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.987000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.987000 audit: BPF prog-id=167 op=LOAD Feb 12 19:48:23.987000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a0558 items=0 ppid=3872 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:23.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336383137636538623836663462313262343137386166326163313431 Feb 12 19:48:23.988000 audit: BPF prog-id=167 op=UNLOAD Feb 12 19:48:23.988000 audit: BPF prog-id=166 op=UNLOAD Feb 12 19:48:23.988000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.988000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.988000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.988000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.988000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.988000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.988000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.988000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.988000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.988000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.988000 audit: BPF prog-id=168 op=LOAD Feb 12 19:48:23.988000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a0968 items=0 ppid=3872 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:23.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336383137636538623836663462313262343137386166326163313431 Feb 12 19:48:23.990000 audit[3891]: NETFILTER_CFG table=filter:122 family=2 entries=40 op=nft_register_chain pid=3891 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:48:23.990000 audit[3891]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7ffdf846f4f0 a2=0 a3=7ffdf846f4dc items=0 ppid=3541 pid=3891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:23.990000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:48:24.039162 env[1106]: time="2024-02-12T19:48:24.039096116Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-wqwhf,Uid:b6f10a97-6a15-4fe6-aa96-1b867b822576,Namespace:kube-system,Attempt:1,} returns sandbox id \"36817ce8b86f4b12b4178af2ac14165b7089ac5c71487fd5186a16495c7cccaf\"" Feb 12 19:48:24.041655 kubelet[2029]: E0212 19:48:24.040571 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:48:24.047479 env[1106]: time="2024-02-12T19:48:24.046808503Z" level=info msg="CreateContainer within sandbox \"36817ce8b86f4b12b4178af2ac14165b7089ac5c71487fd5186a16495c7cccaf\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 19:48:24.076065 env[1106]: time="2024-02-12T19:48:24.075970802Z" level=info msg="CreateContainer within sandbox \"36817ce8b86f4b12b4178af2ac14165b7089ac5c71487fd5186a16495c7cccaf\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"33f3b3732a89a15343721d117eb3a8f541f611b82946ae7002acce5ede6de36e\"" Feb 12 19:48:24.077577 env[1106]: time="2024-02-12T19:48:24.077514961Z" level=info msg="StartContainer for \"33f3b3732a89a15343721d117eb3a8f541f611b82946ae7002acce5ede6de36e\"" Feb 12 19:48:24.111924 systemd[1]: Started cri-containerd-33f3b3732a89a15343721d117eb3a8f541f611b82946ae7002acce5ede6de36e.scope. Feb 12 19:48:24.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.138000 audit: BPF prog-id=169 op=LOAD Feb 12 19:48:24.141000 audit[3916]: AVC avc: denied { bpf } for pid=3916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.141000 audit[3916]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3872 pid=3916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:24.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333663362333733326138396131353334333732316431313765623361 Feb 12 19:48:24.141000 audit[3916]: AVC avc: denied { perfmon } for pid=3916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.141000 audit[3916]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3872 pid=3916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:24.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333663362333733326138396131353334333732316431313765623361 Feb 12 19:48:24.141000 audit[3916]: AVC avc: denied { bpf } for pid=3916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.141000 audit[3916]: AVC avc: denied { bpf } for pid=3916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.141000 audit[3916]: AVC avc: denied { bpf } for pid=3916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.141000 audit[3916]: AVC avc: denied { perfmon } for pid=3916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.141000 audit[3916]: AVC avc: denied { perfmon } for pid=3916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.141000 audit[3916]: AVC avc: denied { perfmon } for pid=3916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.141000 audit[3916]: AVC avc: denied { perfmon } for pid=3916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.141000 audit[3916]: AVC avc: denied { perfmon } for pid=3916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.141000 audit[3916]: AVC avc: denied { bpf } for pid=3916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.141000 audit[3916]: AVC avc: denied { bpf } for pid=3916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.141000 audit: BPF prog-id=170 op=LOAD Feb 12 19:48:24.141000 audit[3916]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000298f20 items=0 ppid=3872 pid=3916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:24.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333663362333733326138396131353334333732316431313765623361 Feb 12 19:48:24.141000 audit[3916]: AVC avc: denied { bpf } for pid=3916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.141000 audit[3916]: AVC avc: denied { bpf } for pid=3916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.141000 audit[3916]: AVC avc: denied { perfmon } for pid=3916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.141000 audit[3916]: AVC avc: denied { perfmon } for pid=3916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.141000 audit[3916]: AVC avc: denied { perfmon } for pid=3916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.141000 audit[3916]: AVC avc: denied { perfmon } for pid=3916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.141000 audit[3916]: AVC avc: denied { perfmon } for pid=3916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.141000 audit[3916]: AVC avc: denied { bpf } for pid=3916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.141000 audit[3916]: AVC avc: denied { bpf } for pid=3916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.141000 audit: BPF prog-id=171 op=LOAD Feb 12 19:48:24.141000 audit[3916]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000298f68 items=0 ppid=3872 pid=3916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:24.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333663362333733326138396131353334333732316431313765623361 Feb 12 19:48:24.142000 audit: BPF prog-id=171 op=UNLOAD Feb 12 19:48:24.142000 audit: BPF prog-id=170 op=UNLOAD Feb 12 19:48:24.142000 audit[3916]: AVC avc: denied { bpf } for pid=3916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.142000 audit[3916]: AVC avc: denied { bpf } for pid=3916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.142000 audit[3916]: AVC avc: denied { bpf } for pid=3916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.142000 audit[3916]: AVC avc: denied { perfmon } for pid=3916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.142000 audit[3916]: AVC avc: denied { perfmon } for pid=3916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.142000 audit[3916]: AVC avc: denied { perfmon } for pid=3916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.142000 audit[3916]: AVC avc: denied { perfmon } for pid=3916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.142000 audit[3916]: AVC avc: denied { perfmon } for pid=3916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.142000 audit[3916]: AVC avc: denied { bpf } for pid=3916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.142000 audit[3916]: AVC avc: denied { bpf } for pid=3916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:24.142000 audit: BPF prog-id=172 op=LOAD Feb 12 19:48:24.142000 audit[3916]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000299378 items=0 ppid=3872 pid=3916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:24.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333663362333733326138396131353334333732316431313765623361 Feb 12 19:48:24.176640 env[1106]: time="2024-02-12T19:48:24.176425367Z" level=info msg="StartContainer for \"33f3b3732a89a15343721d117eb3a8f541f611b82946ae7002acce5ede6de36e\" returns successfully" Feb 12 19:48:24.289166 env[1106]: time="2024-02-12T19:48:24.289099741Z" level=info msg="StopPodSandbox for \"e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e\"" Feb 12 19:48:24.485935 env[1106]: 2024-02-12 19:48:24.396 [INFO][3956] k8s.go 578: Cleaning up netns ContainerID="e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" Feb 12 19:48:24.485935 env[1106]: 2024-02-12 19:48:24.396 [INFO][3956] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" iface="eth0" netns="/var/run/netns/cni-f61b369f-601c-68d6-f46f-0d9812eb52fb" Feb 12 19:48:24.485935 env[1106]: 2024-02-12 19:48:24.396 [INFO][3956] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" iface="eth0" netns="/var/run/netns/cni-f61b369f-601c-68d6-f46f-0d9812eb52fb" Feb 12 19:48:24.485935 env[1106]: 2024-02-12 19:48:24.397 [INFO][3956] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" iface="eth0" netns="/var/run/netns/cni-f61b369f-601c-68d6-f46f-0d9812eb52fb" Feb 12 19:48:24.485935 env[1106]: 2024-02-12 19:48:24.397 [INFO][3956] k8s.go 585: Releasing IP address(es) ContainerID="e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" Feb 12 19:48:24.485935 env[1106]: 2024-02-12 19:48:24.397 [INFO][3956] utils.go 188: Calico CNI releasing IP address ContainerID="e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" Feb 12 19:48:24.485935 env[1106]: 2024-02-12 19:48:24.455 [INFO][3964] ipam_plugin.go 415: Releasing address using handleID ContainerID="e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" HandleID="k8s-pod-network.e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" Workload="ci--3510.3.2--d--344270592c-k8s-csi--node--driver--bp7zv-eth0" Feb 12 19:48:24.485935 env[1106]: 2024-02-12 19:48:24.456 [INFO][3964] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:24.485935 env[1106]: 2024-02-12 19:48:24.456 [INFO][3964] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:24.485935 env[1106]: 2024-02-12 19:48:24.473 [WARNING][3964] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" HandleID="k8s-pod-network.e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" Workload="ci--3510.3.2--d--344270592c-k8s-csi--node--driver--bp7zv-eth0" Feb 12 19:48:24.485935 env[1106]: 2024-02-12 19:48:24.473 [INFO][3964] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" HandleID="k8s-pod-network.e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" Workload="ci--3510.3.2--d--344270592c-k8s-csi--node--driver--bp7zv-eth0" Feb 12 19:48:24.485935 env[1106]: 2024-02-12 19:48:24.477 [INFO][3964] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:24.485935 env[1106]: 2024-02-12 19:48:24.481 [INFO][3956] k8s.go 591: Teardown processing complete. ContainerID="e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" Feb 12 19:48:24.487930 env[1106]: time="2024-02-12T19:48:24.487874043Z" level=info msg="TearDown network for sandbox \"e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e\" successfully" Feb 12 19:48:24.488181 env[1106]: time="2024-02-12T19:48:24.488155675Z" level=info msg="StopPodSandbox for \"e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e\" returns successfully" Feb 12 19:48:24.489570 env[1106]: time="2024-02-12T19:48:24.489525029Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bp7zv,Uid:1b086c16-44ff-4ae2-8b8c-0804a979d643,Namespace:calico-system,Attempt:1,}" Feb 12 19:48:24.548051 systemd-networkd[998]: vxlan.calico: Gained IPv6LL Feb 12 19:48:24.629497 kubelet[2029]: E0212 19:48:24.629458 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:48:24.656891 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1982558732.mount: Deactivated successfully. Feb 12 19:48:24.657088 systemd[1]: run-netns-cni\x2df61b369f\x2d601c\x2d68d6\x2df46f\x2d0d9812eb52fb.mount: Deactivated successfully. Feb 12 19:48:24.689163 kubelet[2029]: I0212 19:48:24.689088 2029 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-wqwhf" podStartSLOduration=42.689008439 pod.CreationTimestamp="2024-02-12 19:47:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:48:24.688536329 +0000 UTC m=+55.066727235" watchObservedRunningTime="2024-02-12 19:48:24.689008439 +0000 UTC m=+55.067199343" Feb 12 19:48:24.768174 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1063188973.mount: Deactivated successfully. Feb 12 19:48:24.877343 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:48:24.877490 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1ee40940031: link becomes ready Feb 12 19:48:24.874757 systemd-networkd[998]: cali1ee40940031: Link UP Feb 12 19:48:24.878485 systemd-networkd[998]: cali1ee40940031: Gained carrier Feb 12 19:48:24.916439 env[1106]: 2024-02-12 19:48:24.601 [INFO][3971] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--d--344270592c-k8s-csi--node--driver--bp7zv-eth0 csi-node-driver- calico-system 1b086c16-44ff-4ae2-8b8c-0804a979d643 835 0 2024-02-12 19:47:50 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.2-d-344270592c csi-node-driver-bp7zv eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali1ee40940031 [] []}} ContainerID="596c63aa6f4f1d320e027b4e38f278a5503d761e34d504da79c87917039d1a7b" Namespace="calico-system" Pod="csi-node-driver-bp7zv" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-csi--node--driver--bp7zv-" Feb 12 19:48:24.916439 env[1106]: 2024-02-12 19:48:24.602 [INFO][3971] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="596c63aa6f4f1d320e027b4e38f278a5503d761e34d504da79c87917039d1a7b" Namespace="calico-system" Pod="csi-node-driver-bp7zv" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-csi--node--driver--bp7zv-eth0" Feb 12 19:48:24.916439 env[1106]: 2024-02-12 19:48:24.752 [INFO][3985] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="596c63aa6f4f1d320e027b4e38f278a5503d761e34d504da79c87917039d1a7b" HandleID="k8s-pod-network.596c63aa6f4f1d320e027b4e38f278a5503d761e34d504da79c87917039d1a7b" Workload="ci--3510.3.2--d--344270592c-k8s-csi--node--driver--bp7zv-eth0" Feb 12 19:48:24.916439 env[1106]: 2024-02-12 19:48:24.800 [INFO][3985] ipam_plugin.go 268: Auto assigning IP ContainerID="596c63aa6f4f1d320e027b4e38f278a5503d761e34d504da79c87917039d1a7b" HandleID="k8s-pod-network.596c63aa6f4f1d320e027b4e38f278a5503d761e34d504da79c87917039d1a7b" Workload="ci--3510.3.2--d--344270592c-k8s-csi--node--driver--bp7zv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002beb30), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-d-344270592c", "pod":"csi-node-driver-bp7zv", "timestamp":"2024-02-12 19:48:24.752214605 +0000 UTC"}, Hostname:"ci-3510.3.2-d-344270592c", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:48:24.916439 env[1106]: 2024-02-12 19:48:24.800 [INFO][3985] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:24.916439 env[1106]: 2024-02-12 19:48:24.800 [INFO][3985] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:24.916439 env[1106]: 2024-02-12 19:48:24.800 [INFO][3985] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-d-344270592c' Feb 12 19:48:24.916439 env[1106]: 2024-02-12 19:48:24.805 [INFO][3985] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.596c63aa6f4f1d320e027b4e38f278a5503d761e34d504da79c87917039d1a7b" host="ci-3510.3.2-d-344270592c" Feb 12 19:48:24.916439 env[1106]: 2024-02-12 19:48:24.823 [INFO][3985] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-d-344270592c" Feb 12 19:48:24.916439 env[1106]: 2024-02-12 19:48:24.832 [INFO][3985] ipam.go 489: Trying affinity for 192.168.21.0/26 host="ci-3510.3.2-d-344270592c" Feb 12 19:48:24.916439 env[1106]: 2024-02-12 19:48:24.840 [INFO][3985] ipam.go 155: Attempting to load block cidr=192.168.21.0/26 host="ci-3510.3.2-d-344270592c" Feb 12 19:48:24.916439 env[1106]: 2024-02-12 19:48:24.845 [INFO][3985] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.21.0/26 host="ci-3510.3.2-d-344270592c" Feb 12 19:48:24.916439 env[1106]: 2024-02-12 19:48:24.845 [INFO][3985] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.21.0/26 handle="k8s-pod-network.596c63aa6f4f1d320e027b4e38f278a5503d761e34d504da79c87917039d1a7b" host="ci-3510.3.2-d-344270592c" Feb 12 19:48:24.916439 env[1106]: 2024-02-12 19:48:24.850 [INFO][3985] ipam.go 1682: Creating new handle: k8s-pod-network.596c63aa6f4f1d320e027b4e38f278a5503d761e34d504da79c87917039d1a7b Feb 12 19:48:24.916439 env[1106]: 2024-02-12 19:48:24.858 [INFO][3985] ipam.go 1203: Writing block in order to claim IPs block=192.168.21.0/26 handle="k8s-pod-network.596c63aa6f4f1d320e027b4e38f278a5503d761e34d504da79c87917039d1a7b" host="ci-3510.3.2-d-344270592c" Feb 12 19:48:24.916439 env[1106]: 2024-02-12 19:48:24.865 [INFO][3985] ipam.go 1216: Successfully claimed IPs: [192.168.21.3/26] block=192.168.21.0/26 handle="k8s-pod-network.596c63aa6f4f1d320e027b4e38f278a5503d761e34d504da79c87917039d1a7b" host="ci-3510.3.2-d-344270592c" Feb 12 19:48:24.916439 env[1106]: 2024-02-12 19:48:24.865 [INFO][3985] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.21.3/26] handle="k8s-pod-network.596c63aa6f4f1d320e027b4e38f278a5503d761e34d504da79c87917039d1a7b" host="ci-3510.3.2-d-344270592c" Feb 12 19:48:24.916439 env[1106]: 2024-02-12 19:48:24.865 [INFO][3985] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:24.916439 env[1106]: 2024-02-12 19:48:24.866 [INFO][3985] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.21.3/26] IPv6=[] ContainerID="596c63aa6f4f1d320e027b4e38f278a5503d761e34d504da79c87917039d1a7b" HandleID="k8s-pod-network.596c63aa6f4f1d320e027b4e38f278a5503d761e34d504da79c87917039d1a7b" Workload="ci--3510.3.2--d--344270592c-k8s-csi--node--driver--bp7zv-eth0" Feb 12 19:48:24.917350 env[1106]: 2024-02-12 19:48:24.868 [INFO][3971] k8s.go 385: Populated endpoint ContainerID="596c63aa6f4f1d320e027b4e38f278a5503d761e34d504da79c87917039d1a7b" Namespace="calico-system" Pod="csi-node-driver-bp7zv" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-csi--node--driver--bp7zv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--d--344270592c-k8s-csi--node--driver--bp7zv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1b086c16-44ff-4ae2-8b8c-0804a979d643", ResourceVersion:"835", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 47, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-d-344270592c", ContainerID:"", Pod:"csi-node-driver-bp7zv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali1ee40940031", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:24.917350 env[1106]: 2024-02-12 19:48:24.869 [INFO][3971] k8s.go 386: Calico CNI using IPs: [192.168.21.3/32] ContainerID="596c63aa6f4f1d320e027b4e38f278a5503d761e34d504da79c87917039d1a7b" Namespace="calico-system" Pod="csi-node-driver-bp7zv" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-csi--node--driver--bp7zv-eth0" Feb 12 19:48:24.917350 env[1106]: 2024-02-12 19:48:24.869 [INFO][3971] dataplane_linux.go 68: Setting the host side veth name to cali1ee40940031 ContainerID="596c63aa6f4f1d320e027b4e38f278a5503d761e34d504da79c87917039d1a7b" Namespace="calico-system" Pod="csi-node-driver-bp7zv" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-csi--node--driver--bp7zv-eth0" Feb 12 19:48:24.917350 env[1106]: 2024-02-12 19:48:24.874 [INFO][3971] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="596c63aa6f4f1d320e027b4e38f278a5503d761e34d504da79c87917039d1a7b" Namespace="calico-system" Pod="csi-node-driver-bp7zv" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-csi--node--driver--bp7zv-eth0" Feb 12 19:48:24.917350 env[1106]: 2024-02-12 19:48:24.879 [INFO][3971] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="596c63aa6f4f1d320e027b4e38f278a5503d761e34d504da79c87917039d1a7b" Namespace="calico-system" Pod="csi-node-driver-bp7zv" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-csi--node--driver--bp7zv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--d--344270592c-k8s-csi--node--driver--bp7zv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1b086c16-44ff-4ae2-8b8c-0804a979d643", ResourceVersion:"835", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 47, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-d-344270592c", ContainerID:"596c63aa6f4f1d320e027b4e38f278a5503d761e34d504da79c87917039d1a7b", Pod:"csi-node-driver-bp7zv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali1ee40940031", MAC:"62:a5:3b:74:5a:a1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:24.917350 env[1106]: 2024-02-12 19:48:24.910 [INFO][3971] k8s.go 491: Wrote updated endpoint to datastore ContainerID="596c63aa6f4f1d320e027b4e38f278a5503d761e34d504da79c87917039d1a7b" Namespace="calico-system" Pod="csi-node-driver-bp7zv" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-csi--node--driver--bp7zv-eth0" Feb 12 19:48:24.932587 systemd-networkd[998]: califc22a6ac562: Gained IPv6LL Feb 12 19:48:24.964899 env[1106]: time="2024-02-12T19:48:24.964522926Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:48:24.964899 env[1106]: time="2024-02-12T19:48:24.964567233Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:48:24.964899 env[1106]: time="2024-02-12T19:48:24.964591678Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:48:24.965294 env[1106]: time="2024-02-12T19:48:24.964974874Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/596c63aa6f4f1d320e027b4e38f278a5503d761e34d504da79c87917039d1a7b pid=4024 runtime=io.containerd.runc.v2 Feb 12 19:48:25.007370 systemd[1]: Started cri-containerd-596c63aa6f4f1d320e027b4e38f278a5503d761e34d504da79c87917039d1a7b.scope. Feb 12 19:48:25.057802 kernel: kauditd_printk_skb: 334 callbacks suppressed Feb 12 19:48:25.057952 kernel: audit: type=1400 audit(1707767305.050:1292): avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:25.057993 kernel: audit: type=1400 audit(1707767305.051:1293): avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:25.050000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:25.051000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:25.051000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00908a5a0 a2=fc6 a3=0 items=0 ppid=1741 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 key=(null) Feb 12 19:48:25.071794 kernel: audit: type=1300 audit(1707767305.051:1293): arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00908a5a0 a2=fc6 a3=0 items=0 ppid=1741 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 key=(null) Feb 12 19:48:25.071991 kernel: audit: type=1327 audit(1707767305.051:1293): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135372E313235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F Feb 12 19:48:25.051000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135372E313235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F Feb 12 19:48:25.075989 kernel: audit: type=1400 audit(1707767305.051:1294): avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:25.051000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:25.051000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c010d44560 a2=fc6 a3=0 items=0 ppid=1741 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 key=(null) Feb 12 19:48:25.051000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135372E313235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F Feb 12 19:48:25.098588 kernel: audit: type=1300 audit(1707767305.051:1294): arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c010d44560 a2=fc6 a3=0 items=0 ppid=1741 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 key=(null) Feb 12 19:48:25.098784 kernel: audit: type=1327 audit(1707767305.051:1294): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135372E313235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F Feb 12 19:48:25.050000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c008894c60 a2=fc6 a3=0 items=0 ppid=1741 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 key=(null) Feb 12 19:48:25.108262 kernel: audit: type=1300 audit(1707767305.050:1292): arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c008894c60 a2=fc6 a3=0 items=0 ppid=1741 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 key=(null) Feb 12 19:48:25.108485 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 19:48:25.108545 kernel: audit: type=1327 audit(1707767305.050:1292): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135372E313235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F Feb 12 19:48:25.050000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135372E313235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F Feb 12 19:48:25.057000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:25.057000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c008894c90 a2=fc6 a3=0 items=0 ppid=1741 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 key=(null) Feb 12 19:48:25.057000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135372E313235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F Feb 12 19:48:25.060000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:25.060000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c008894cf0 a2=fc6 a3=0 items=0 ppid=1741 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 key=(null) Feb 12 19:48:25.060000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135372E313235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F Feb 12 19:48:25.060000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:25.060000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c010d4a540 a2=fc6 a3=0 items=0 ppid=1741 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 key=(null) Feb 12 19:48:25.060000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135372E313235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F Feb 12 19:48:25.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.062000 audit: BPF prog-id=173 op=LOAD Feb 12 19:48:25.062000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.062000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4024 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539366336336161366634663164333230653032376234653338663237 Feb 12 19:48:25.062000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.062000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=4024 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539366336336161366634663164333230653032376234653338663237 Feb 12 19:48:25.062000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.062000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.062000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.062000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.062000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.062000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.062000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.062000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.062000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.062000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.062000 audit: BPF prog-id=174 op=LOAD Feb 12 19:48:25.062000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00019ad10 items=0 ppid=4024 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539366336336161366634663164333230653032376234653338663237 Feb 12 19:48:25.063000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.063000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.063000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.063000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.063000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.063000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.063000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.063000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.063000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.063000 audit: BPF prog-id=175 op=LOAD Feb 12 19:48:25.063000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00019ad58 items=0 ppid=4024 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539366336336161366634663164333230653032376234653338663237 Feb 12 19:48:25.099000 audit: BPF prog-id=175 op=UNLOAD Feb 12 19:48:25.099000 audit: BPF prog-id=174 op=UNLOAD Feb 12 19:48:25.099000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.099000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.099000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.099000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.099000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00019b168 items=0 ppid=4024 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539366336336161366634663164333230653032376234653338663237 Feb 12 19:48:25.068000 audit[4059]: NETFILTER_CFG table=filter:123 family=2 entries=38 op=nft_register_chain pid=4059 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:48:25.068000 audit[4059]: SYSCALL arch=c000003e syscall=46 success=yes exit=19508 a0=3 a1=7ffc06d91d40 a2=0 a3=7ffc06d91d2c items=0 ppid=3541 pid=4059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.068000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:48:25.188385 systemd-networkd[998]: cali68b136ec3e4: Gained IPv6LL Feb 12 19:48:25.195000 audit[4075]: NETFILTER_CFG table=filter:124 family=2 entries=12 op=nft_register_rule pid=4075 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:25.195000 audit[4075]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffee19277a0 a2=0 a3=7ffee192778c items=0 ppid=2189 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.195000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:25.196000 audit[4075]: NETFILTER_CFG table=nat:125 family=2 entries=30 op=nft_register_rule pid=4075 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:25.196000 audit[4075]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffee19277a0 a2=0 a3=7ffee192778c items=0 ppid=2189 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:25.196000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:25.215477 env[1106]: time="2024-02-12T19:48:25.215417914Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bp7zv,Uid:1b086c16-44ff-4ae2-8b8c-0804a979d643,Namespace:calico-system,Attempt:1,} returns sandbox id \"596c63aa6f4f1d320e027b4e38f278a5503d761e34d504da79c87917039d1a7b\"" Feb 12 19:48:25.289213 env[1106]: time="2024-02-12T19:48:25.289168692Z" level=info msg="StopPodSandbox for \"2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169\"" Feb 12 19:48:25.490586 env[1106]: 2024-02-12 19:48:25.409 [INFO][4090] k8s.go 578: Cleaning up netns ContainerID="2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" Feb 12 19:48:25.490586 env[1106]: 2024-02-12 19:48:25.409 [INFO][4090] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" iface="eth0" netns="/var/run/netns/cni-86969bb4-c759-5974-e5d2-5ffdb5b3d77e" Feb 12 19:48:25.490586 env[1106]: 2024-02-12 19:48:25.410 [INFO][4090] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" iface="eth0" netns="/var/run/netns/cni-86969bb4-c759-5974-e5d2-5ffdb5b3d77e" Feb 12 19:48:25.490586 env[1106]: 2024-02-12 19:48:25.410 [INFO][4090] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" iface="eth0" netns="/var/run/netns/cni-86969bb4-c759-5974-e5d2-5ffdb5b3d77e" Feb 12 19:48:25.490586 env[1106]: 2024-02-12 19:48:25.410 [INFO][4090] k8s.go 585: Releasing IP address(es) ContainerID="2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" Feb 12 19:48:25.490586 env[1106]: 2024-02-12 19:48:25.410 [INFO][4090] utils.go 188: Calico CNI releasing IP address ContainerID="2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" Feb 12 19:48:25.490586 env[1106]: 2024-02-12 19:48:25.469 [INFO][4096] ipam_plugin.go 415: Releasing address using handleID ContainerID="2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" HandleID="k8s-pod-network.2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" Workload="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--flv9z-eth0" Feb 12 19:48:25.490586 env[1106]: 2024-02-12 19:48:25.469 [INFO][4096] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:25.490586 env[1106]: 2024-02-12 19:48:25.469 [INFO][4096] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:25.490586 env[1106]: 2024-02-12 19:48:25.483 [WARNING][4096] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" HandleID="k8s-pod-network.2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" Workload="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--flv9z-eth0" Feb 12 19:48:25.490586 env[1106]: 2024-02-12 19:48:25.483 [INFO][4096] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" HandleID="k8s-pod-network.2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" Workload="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--flv9z-eth0" Feb 12 19:48:25.490586 env[1106]: 2024-02-12 19:48:25.486 [INFO][4096] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:25.490586 env[1106]: 2024-02-12 19:48:25.488 [INFO][4090] k8s.go 591: Teardown processing complete. ContainerID="2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" Feb 12 19:48:25.495100 env[1106]: time="2024-02-12T19:48:25.495038843Z" level=info msg="TearDown network for sandbox \"2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169\" successfully" Feb 12 19:48:25.495474 env[1106]: time="2024-02-12T19:48:25.495445569Z" level=info msg="StopPodSandbox for \"2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169\" returns successfully" Feb 12 19:48:25.496966 kubelet[2029]: E0212 19:48:25.496099 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:48:25.497493 env[1106]: time="2024-02-12T19:48:25.497445474Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-flv9z,Uid:9035b034-9c8e-4b17-b971-e692c700076a,Namespace:kube-system,Attempt:1,}" Feb 12 19:48:25.633537 kubelet[2029]: E0212 19:48:25.633119 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:48:25.656477 systemd[1]: run-containerd-runc-k8s.io-596c63aa6f4f1d320e027b4e38f278a5503d761e34d504da79c87917039d1a7b-runc.1UvWVp.mount: Deactivated successfully. Feb 12 19:48:25.656640 systemd[1]: run-netns-cni\x2d86969bb4\x2dc759\x2d5974\x2de5d2\x2d5ffdb5b3d77e.mount: Deactivated successfully. Feb 12 19:48:25.950423 systemd-networkd[998]: cali2566fb57ce5: Link UP Feb 12 19:48:25.957115 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:48:25.957284 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2566fb57ce5: link becomes ready Feb 12 19:48:25.956679 systemd-networkd[998]: cali2566fb57ce5: Gained carrier Feb 12 19:48:26.002697 env[1106]: 2024-02-12 19:48:25.587 [INFO][4102] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--flv9z-eth0 coredns-787d4945fb- kube-system 9035b034-9c8e-4b17-b971-e692c700076a 847 0 2024-02-12 19:47:42 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-d-344270592c coredns-787d4945fb-flv9z eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali2566fb57ce5 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="95f53c2aef59ecdcf7b195b3b16507053481b10d3104ece8128d6ec4b411cd94" Namespace="kube-system" Pod="coredns-787d4945fb-flv9z" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--flv9z-" Feb 12 19:48:26.002697 env[1106]: 2024-02-12 19:48:25.587 [INFO][4102] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="95f53c2aef59ecdcf7b195b3b16507053481b10d3104ece8128d6ec4b411cd94" Namespace="kube-system" Pod="coredns-787d4945fb-flv9z" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--flv9z-eth0" Feb 12 19:48:26.002697 env[1106]: 2024-02-12 19:48:25.816 [INFO][4113] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="95f53c2aef59ecdcf7b195b3b16507053481b10d3104ece8128d6ec4b411cd94" HandleID="k8s-pod-network.95f53c2aef59ecdcf7b195b3b16507053481b10d3104ece8128d6ec4b411cd94" Workload="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--flv9z-eth0" Feb 12 19:48:26.002697 env[1106]: 2024-02-12 19:48:25.844 [INFO][4113] ipam_plugin.go 268: Auto assigning IP ContainerID="95f53c2aef59ecdcf7b195b3b16507053481b10d3104ece8128d6ec4b411cd94" HandleID="k8s-pod-network.95f53c2aef59ecdcf7b195b3b16507053481b10d3104ece8128d6ec4b411cd94" Workload="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--flv9z-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027c840), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-d-344270592c", "pod":"coredns-787d4945fb-flv9z", "timestamp":"2024-02-12 19:48:25.816098948 +0000 UTC"}, Hostname:"ci-3510.3.2-d-344270592c", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:48:26.002697 env[1106]: 2024-02-12 19:48:25.844 [INFO][4113] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:26.002697 env[1106]: 2024-02-12 19:48:25.844 [INFO][4113] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:26.002697 env[1106]: 2024-02-12 19:48:25.844 [INFO][4113] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-d-344270592c' Feb 12 19:48:26.002697 env[1106]: 2024-02-12 19:48:25.849 [INFO][4113] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.95f53c2aef59ecdcf7b195b3b16507053481b10d3104ece8128d6ec4b411cd94" host="ci-3510.3.2-d-344270592c" Feb 12 19:48:26.002697 env[1106]: 2024-02-12 19:48:25.861 [INFO][4113] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-d-344270592c" Feb 12 19:48:26.002697 env[1106]: 2024-02-12 19:48:25.879 [INFO][4113] ipam.go 489: Trying affinity for 192.168.21.0/26 host="ci-3510.3.2-d-344270592c" Feb 12 19:48:26.002697 env[1106]: 2024-02-12 19:48:25.887 [INFO][4113] ipam.go 155: Attempting to load block cidr=192.168.21.0/26 host="ci-3510.3.2-d-344270592c" Feb 12 19:48:26.002697 env[1106]: 2024-02-12 19:48:25.899 [INFO][4113] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.21.0/26 host="ci-3510.3.2-d-344270592c" Feb 12 19:48:26.002697 env[1106]: 2024-02-12 19:48:25.899 [INFO][4113] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.21.0/26 handle="k8s-pod-network.95f53c2aef59ecdcf7b195b3b16507053481b10d3104ece8128d6ec4b411cd94" host="ci-3510.3.2-d-344270592c" Feb 12 19:48:26.002697 env[1106]: 2024-02-12 19:48:25.906 [INFO][4113] ipam.go 1682: Creating new handle: k8s-pod-network.95f53c2aef59ecdcf7b195b3b16507053481b10d3104ece8128d6ec4b411cd94 Feb 12 19:48:26.002697 env[1106]: 2024-02-12 19:48:25.923 [INFO][4113] ipam.go 1203: Writing block in order to claim IPs block=192.168.21.0/26 handle="k8s-pod-network.95f53c2aef59ecdcf7b195b3b16507053481b10d3104ece8128d6ec4b411cd94" host="ci-3510.3.2-d-344270592c" Feb 12 19:48:26.002697 env[1106]: 2024-02-12 19:48:25.936 [INFO][4113] ipam.go 1216: Successfully claimed IPs: [192.168.21.4/26] block=192.168.21.0/26 handle="k8s-pod-network.95f53c2aef59ecdcf7b195b3b16507053481b10d3104ece8128d6ec4b411cd94" host="ci-3510.3.2-d-344270592c" Feb 12 19:48:26.002697 env[1106]: 2024-02-12 19:48:25.936 [INFO][4113] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.21.4/26] handle="k8s-pod-network.95f53c2aef59ecdcf7b195b3b16507053481b10d3104ece8128d6ec4b411cd94" host="ci-3510.3.2-d-344270592c" Feb 12 19:48:26.002697 env[1106]: 2024-02-12 19:48:25.936 [INFO][4113] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:26.002697 env[1106]: 2024-02-12 19:48:25.936 [INFO][4113] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.21.4/26] IPv6=[] ContainerID="95f53c2aef59ecdcf7b195b3b16507053481b10d3104ece8128d6ec4b411cd94" HandleID="k8s-pod-network.95f53c2aef59ecdcf7b195b3b16507053481b10d3104ece8128d6ec4b411cd94" Workload="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--flv9z-eth0" Feb 12 19:48:26.004177 env[1106]: 2024-02-12 19:48:25.939 [INFO][4102] k8s.go 385: Populated endpoint ContainerID="95f53c2aef59ecdcf7b195b3b16507053481b10d3104ece8128d6ec4b411cd94" Namespace="kube-system" Pod="coredns-787d4945fb-flv9z" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--flv9z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--flv9z-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"9035b034-9c8e-4b17-b971-e692c700076a", ResourceVersion:"847", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 47, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-d-344270592c", ContainerID:"", Pod:"coredns-787d4945fb-flv9z", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2566fb57ce5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:26.004177 env[1106]: 2024-02-12 19:48:25.940 [INFO][4102] k8s.go 386: Calico CNI using IPs: [192.168.21.4/32] ContainerID="95f53c2aef59ecdcf7b195b3b16507053481b10d3104ece8128d6ec4b411cd94" Namespace="kube-system" Pod="coredns-787d4945fb-flv9z" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--flv9z-eth0" Feb 12 19:48:26.004177 env[1106]: 2024-02-12 19:48:25.940 [INFO][4102] dataplane_linux.go 68: Setting the host side veth name to cali2566fb57ce5 ContainerID="95f53c2aef59ecdcf7b195b3b16507053481b10d3104ece8128d6ec4b411cd94" Namespace="kube-system" Pod="coredns-787d4945fb-flv9z" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--flv9z-eth0" Feb 12 19:48:26.004177 env[1106]: 2024-02-12 19:48:25.958 [INFO][4102] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="95f53c2aef59ecdcf7b195b3b16507053481b10d3104ece8128d6ec4b411cd94" Namespace="kube-system" Pod="coredns-787d4945fb-flv9z" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--flv9z-eth0" Feb 12 19:48:26.004177 env[1106]: 2024-02-12 19:48:25.960 [INFO][4102] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="95f53c2aef59ecdcf7b195b3b16507053481b10d3104ece8128d6ec4b411cd94" Namespace="kube-system" Pod="coredns-787d4945fb-flv9z" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--flv9z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--flv9z-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"9035b034-9c8e-4b17-b971-e692c700076a", ResourceVersion:"847", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 47, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-d-344270592c", ContainerID:"95f53c2aef59ecdcf7b195b3b16507053481b10d3104ece8128d6ec4b411cd94", Pod:"coredns-787d4945fb-flv9z", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2566fb57ce5", MAC:"3a:9c:9d:d3:78:17", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:26.004177 env[1106]: 2024-02-12 19:48:25.998 [INFO][4102] k8s.go 491: Wrote updated endpoint to datastore ContainerID="95f53c2aef59ecdcf7b195b3b16507053481b10d3104ece8128d6ec4b411cd94" Namespace="kube-system" Pod="coredns-787d4945fb-flv9z" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--flv9z-eth0" Feb 12 19:48:26.049776 env[1106]: time="2024-02-12T19:48:26.049514491Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:48:26.050090 env[1106]: time="2024-02-12T19:48:26.050043280Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:48:26.050286 env[1106]: time="2024-02-12T19:48:26.050253475Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:48:26.050797 env[1106]: time="2024-02-12T19:48:26.050708160Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/95f53c2aef59ecdcf7b195b3b16507053481b10d3104ece8128d6ec4b411cd94 pid=4159 runtime=io.containerd.runc.v2 Feb 12 19:48:26.086999 systemd[1]: run-containerd-runc-k8s.io-95f53c2aef59ecdcf7b195b3b16507053481b10d3104ece8128d6ec4b411cd94-runc.ik9i9F.mount: Deactivated successfully. Feb 12 19:48:26.098469 systemd[1]: Started cri-containerd-95f53c2aef59ecdcf7b195b3b16507053481b10d3104ece8128d6ec4b411cd94.scope. Feb 12 19:48:26.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.135000 audit: BPF prog-id=177 op=LOAD Feb 12 19:48:26.136000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.136000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4159 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:26.136000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935663533633261656635396563646366376231393562336231363530 Feb 12 19:48:26.136000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.136000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4159 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:26.136000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935663533633261656635396563646366376231393562336231363530 Feb 12 19:48:26.136000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.136000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.136000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.136000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.136000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.136000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.136000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.136000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.136000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.136000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.136000 audit: BPF prog-id=178 op=LOAD Feb 12 19:48:26.136000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000321210 items=0 ppid=4159 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:26.136000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935663533633261656635396563646366376231393562336231363530 Feb 12 19:48:26.136000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.136000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.136000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.136000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.136000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.136000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.136000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.136000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.136000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.136000 audit: BPF prog-id=179 op=LOAD Feb 12 19:48:26.136000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000321258 items=0 ppid=4159 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:26.136000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935663533633261656635396563646366376231393562336231363530 Feb 12 19:48:26.137000 audit: BPF prog-id=179 op=UNLOAD Feb 12 19:48:26.137000 audit: BPF prog-id=178 op=UNLOAD Feb 12 19:48:26.137000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.137000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.137000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.137000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.137000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.137000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.137000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.137000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.137000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.137000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.137000 audit: BPF prog-id=180 op=LOAD Feb 12 19:48:26.137000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000321668 items=0 ppid=4159 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:26.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935663533633261656635396563646366376231393562336231363530 Feb 12 19:48:26.150000 audit[4190]: NETFILTER_CFG table=filter:126 family=2 entries=38 op=nft_register_chain pid=4190 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:48:26.150000 audit[4190]: SYSCALL arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7ffd1a22e290 a2=0 a3=7ffd1a22e27c items=0 ppid=3541 pid=4190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:26.150000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:48:26.174000 audit[4194]: NETFILTER_CFG table=filter:127 family=2 entries=9 op=nft_register_rule pid=4194 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:26.174000 audit[4194]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffd4e8fc390 a2=0 a3=7ffd4e8fc37c items=0 ppid=2189 pid=4194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:26.174000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:26.177000 audit[4194]: NETFILTER_CFG table=nat:128 family=2 entries=51 op=nft_register_chain pid=4194 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:26.177000 audit[4194]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffd4e8fc390 a2=0 a3=7ffd4e8fc37c items=0 ppid=2189 pid=4194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:26.177000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:26.246349 env[1106]: time="2024-02-12T19:48:26.246187267Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-flv9z,Uid:9035b034-9c8e-4b17-b971-e692c700076a,Namespace:kube-system,Attempt:1,} returns sandbox id \"95f53c2aef59ecdcf7b195b3b16507053481b10d3104ece8128d6ec4b411cd94\"" Feb 12 19:48:26.250264 kubelet[2029]: E0212 19:48:26.249303 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:48:26.260076 env[1106]: time="2024-02-12T19:48:26.259999512Z" level=info msg="CreateContainer within sandbox \"95f53c2aef59ecdcf7b195b3b16507053481b10d3104ece8128d6ec4b411cd94\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 19:48:26.322765 env[1106]: time="2024-02-12T19:48:26.319903232Z" level=info msg="CreateContainer within sandbox \"95f53c2aef59ecdcf7b195b3b16507053481b10d3104ece8128d6ec4b411cd94\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"448e566acd63470a7b5c66e74667f4da6b0f71faadf36ccaa301034fcb10951c\"" Feb 12 19:48:26.326101 env[1106]: time="2024-02-12T19:48:26.324926211Z" level=info msg="StartContainer for \"448e566acd63470a7b5c66e74667f4da6b0f71faadf36ccaa301034fcb10951c\"" Feb 12 19:48:26.390895 systemd[1]: Started cri-containerd-448e566acd63470a7b5c66e74667f4da6b0f71faadf36ccaa301034fcb10951c.scope. Feb 12 19:48:26.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.459000 audit: BPF prog-id=181 op=LOAD Feb 12 19:48:26.461000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.461000 audit[4211]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4159 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:26.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434386535363661636436333437306137623563363665373436363766 Feb 12 19:48:26.461000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.461000 audit[4211]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4159 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:26.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434386535363661636436333437306137623563363665373436363766 Feb 12 19:48:26.462000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.462000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.462000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.462000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.462000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.462000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.462000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.462000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.462000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.462000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.462000 audit: BPF prog-id=182 op=LOAD Feb 12 19:48:26.462000 audit[4211]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003b0870 items=0 ppid=4159 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:26.462000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434386535363661636436333437306137623563363665373436363766 Feb 12 19:48:26.463000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.463000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.463000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.463000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.463000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.463000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.463000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.463000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.463000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.463000 audit: BPF prog-id=183 op=LOAD Feb 12 19:48:26.463000 audit[4211]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003b08b8 items=0 ppid=4159 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:26.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434386535363661636436333437306137623563363665373436363766 Feb 12 19:48:26.466000 audit: BPF prog-id=183 op=UNLOAD Feb 12 19:48:26.467000 audit: BPF prog-id=182 op=UNLOAD Feb 12 19:48:26.467000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.467000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.467000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.467000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.467000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.467000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.467000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.467000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.467000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.467000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.467000 audit: BPF prog-id=184 op=LOAD Feb 12 19:48:26.467000 audit[4211]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003b0cc8 items=0 ppid=4159 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:26.467000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434386535363661636436333437306137623563363665373436363766 Feb 12 19:48:26.526782 env[1106]: time="2024-02-12T19:48:26.526576371Z" level=info msg="StartContainer for \"448e566acd63470a7b5c66e74667f4da6b0f71faadf36ccaa301034fcb10951c\" returns successfully" Feb 12 19:48:26.640175 kubelet[2029]: E0212 19:48:26.639539 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:48:26.642645 kubelet[2029]: E0212 19:48:26.642608 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:48:26.695845 kubelet[2029]: I0212 19:48:26.695366 2029 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-flv9z" podStartSLOduration=44.695320193 pod.CreationTimestamp="2024-02-12 19:47:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:48:26.695061001 +0000 UTC m=+57.073251894" watchObservedRunningTime="2024-02-12 19:48:26.695320193 +0000 UTC m=+57.073511091" Feb 12 19:48:26.794932 systemd-networkd[998]: cali1ee40940031: Gained IPv6LL Feb 12 19:48:26.979945 systemd-networkd[998]: cali2566fb57ce5: Gained IPv6LL Feb 12 19:48:27.401000 audit[4272]: NETFILTER_CFG table=filter:129 family=2 entries=6 op=nft_register_rule pid=4272 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:27.401000 audit[4272]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffcbf12a9b0 a2=0 a3=7ffcbf12a99c items=0 ppid=2189 pid=4272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:27.401000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:27.417000 audit[4272]: NETFILTER_CFG table=nat:130 family=2 entries=60 op=nft_register_rule pid=4272 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:27.417000 audit[4272]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffcbf12a9b0 a2=0 a3=7ffcbf12a99c items=0 ppid=2189 pid=4272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:27.417000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:27.511881 env[1106]: time="2024-02-12T19:48:27.511823234Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:27.516977 env[1106]: time="2024-02-12T19:48:27.516920577Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:27.522191 env[1106]: time="2024-02-12T19:48:27.522138995Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:27.527066 env[1106]: time="2024-02-12T19:48:27.526976211Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:27.531137 env[1106]: time="2024-02-12T19:48:27.529562693Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 12 19:48:27.533218 env[1106]: time="2024-02-12T19:48:27.533164695Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 19:48:27.557690 env[1106]: time="2024-02-12T19:48:27.557397050Z" level=info msg="CreateContainer within sandbox \"afbfbe2133869dcc98c93bf9aeca5669464002eecde194ffc57eb04bc76726a5\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 12 19:48:27.589706 env[1106]: time="2024-02-12T19:48:27.589638091Z" level=info msg="CreateContainer within sandbox \"afbfbe2133869dcc98c93bf9aeca5669464002eecde194ffc57eb04bc76726a5\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"2223747516a29bb53dcc858bf2a2f2a8e423434175021303f17e5f74647f2136\"" Feb 12 19:48:27.591005 env[1106]: time="2024-02-12T19:48:27.590967662Z" level=info msg="StartContainer for \"2223747516a29bb53dcc858bf2a2f2a8e423434175021303f17e5f74647f2136\"" Feb 12 19:48:27.624012 systemd[1]: Started cri-containerd-2223747516a29bb53dcc858bf2a2f2a8e423434175021303f17e5f74647f2136.scope. Feb 12 19:48:27.639444 kubelet[2029]: I0212 19:48:27.639410 2029 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:48:27.640270 kubelet[2029]: E0212 19:48:27.640206 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:48:27.647129 kubelet[2029]: E0212 19:48:27.647095 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:48:27.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.703000 audit: BPF prog-id=185 op=LOAD Feb 12 19:48:27.706000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.706000 audit[4283]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3765 pid=4283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:27.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232323337343735313661323962623533646363383538626632613266 Feb 12 19:48:27.706000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.706000 audit[4283]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3765 pid=4283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:27.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232323337343735313661323962623533646363383538626632613266 Feb 12 19:48:27.706000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.706000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.706000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.706000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.706000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.706000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.706000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.706000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.706000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.706000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.706000 audit: BPF prog-id=186 op=LOAD Feb 12 19:48:27.706000 audit[4283]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000363b70 items=0 ppid=3765 pid=4283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:27.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232323337343735313661323962623533646363383538626632613266 Feb 12 19:48:27.706000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.706000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.706000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.706000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.706000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.706000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.706000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.706000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.706000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.706000 audit: BPF prog-id=187 op=LOAD Feb 12 19:48:27.706000 audit[4283]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000363bb8 items=0 ppid=3765 pid=4283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:27.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232323337343735313661323962623533646363383538626632613266 Feb 12 19:48:27.706000 audit: BPF prog-id=187 op=UNLOAD Feb 12 19:48:27.707000 audit: BPF prog-id=186 op=UNLOAD Feb 12 19:48:27.707000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.707000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.707000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.707000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.707000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.707000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.707000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.707000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.707000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.707000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.707000 audit: BPF prog-id=188 op=LOAD Feb 12 19:48:27.707000 audit[4283]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000363fc8 items=0 ppid=3765 pid=4283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:27.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232323337343735313661323962623533646363383538626632613266 Feb 12 19:48:27.845693 env[1106]: time="2024-02-12T19:48:27.845619617Z" level=info msg="StartContainer for \"2223747516a29bb53dcc858bf2a2f2a8e423434175021303f17e5f74647f2136\" returns successfully" Feb 12 19:48:27.973000 audit[4353]: NETFILTER_CFG table=filter:131 family=2 entries=6 op=nft_register_rule pid=4353 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:27.973000 audit[4353]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffcc92e7f90 a2=0 a3=7ffcc92e7f7c items=0 ppid=2189 pid=4353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:27.973000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:28.000000 audit[4353]: NETFILTER_CFG table=nat:132 family=2 entries=72 op=nft_register_chain pid=4353 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:28.000000 audit[4353]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffcc92e7f90 a2=0 a3=7ffcc92e7f7c items=0 ppid=2189 pid=4353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:28.000000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:28.655111 kubelet[2029]: E0212 19:48:28.655055 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:48:28.656277 kubelet[2029]: E0212 19:48:28.656239 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:48:28.735172 systemd[1]: run-containerd-runc-k8s.io-2223747516a29bb53dcc858bf2a2f2a8e423434175021303f17e5f74647f2136-runc.aK50H9.mount: Deactivated successfully. Feb 12 19:48:28.834994 kubelet[2029]: I0212 19:48:28.834952 2029 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5cffbfd69f-dlhss" podStartSLOduration=-9.223371999019882e+09 pod.CreationTimestamp="2024-02-12 19:47:51 +0000 UTC" firstStartedPulling="2024-02-12 19:48:23.120145372 +0000 UTC m=+53.498336246" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:48:28.719144556 +0000 UTC m=+59.097335455" watchObservedRunningTime="2024-02-12 19:48:28.8348939 +0000 UTC m=+59.213084796" Feb 12 19:48:29.362652 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3528854127.mount: Deactivated successfully. Feb 12 19:48:29.578000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:29.578000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d34140 a2=fc6 a3=0 items=0 ppid=1727 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 key=(null) Feb 12 19:48:29.578000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:48:29.607000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:29.607000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ddf560 a2=fc6 a3=0 items=0 ppid=1727 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 key=(null) Feb 12 19:48:29.607000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:48:29.615000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:29.615000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:29.615000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000d34260 a2=fc6 a3=0 items=0 ppid=1727 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 key=(null) Feb 12 19:48:29.615000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:48:29.615000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ddf5a0 a2=fc6 a3=0 items=0 ppid=1727 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 key=(null) Feb 12 19:48:29.615000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:48:30.002821 env[1106]: time="2024-02-12T19:48:30.002404337Z" level=info msg="StopPodSandbox for \"361d5d9f662e7b52528d5f59b2d76df27bf7f90ad995ef45ae9072f0aa2bed91\"" Feb 12 19:48:30.002821 env[1106]: time="2024-02-12T19:48:30.002551961Z" level=info msg="TearDown network for sandbox \"361d5d9f662e7b52528d5f59b2d76df27bf7f90ad995ef45ae9072f0aa2bed91\" successfully" Feb 12 19:48:30.002821 env[1106]: time="2024-02-12T19:48:30.002607539Z" level=info msg="StopPodSandbox for \"361d5d9f662e7b52528d5f59b2d76df27bf7f90ad995ef45ae9072f0aa2bed91\" returns successfully" Feb 12 19:48:30.006440 env[1106]: time="2024-02-12T19:48:30.004077297Z" level=info msg="RemovePodSandbox for \"361d5d9f662e7b52528d5f59b2d76df27bf7f90ad995ef45ae9072f0aa2bed91\"" Feb 12 19:48:30.006440 env[1106]: time="2024-02-12T19:48:30.004131637Z" level=info msg="Forcibly stopping sandbox \"361d5d9f662e7b52528d5f59b2d76df27bf7f90ad995ef45ae9072f0aa2bed91\"" Feb 12 19:48:30.006440 env[1106]: time="2024-02-12T19:48:30.004263388Z" level=info msg="TearDown network for sandbox \"361d5d9f662e7b52528d5f59b2d76df27bf7f90ad995ef45ae9072f0aa2bed91\" successfully" Feb 12 19:48:30.026539 env[1106]: time="2024-02-12T19:48:30.026476744Z" level=info msg="RemovePodSandbox \"361d5d9f662e7b52528d5f59b2d76df27bf7f90ad995ef45ae9072f0aa2bed91\" returns successfully" Feb 12 19:48:30.029200 env[1106]: time="2024-02-12T19:48:30.029138698Z" level=info msg="StopPodSandbox for \"9acdc21f152cabfb8101a758ea9ab4ca678df037951e5e975e4381de102440d0\"" Feb 12 19:48:30.029636 env[1106]: time="2024-02-12T19:48:30.029567469Z" level=info msg="TearDown network for sandbox \"9acdc21f152cabfb8101a758ea9ab4ca678df037951e5e975e4381de102440d0\" successfully" Feb 12 19:48:30.029930 env[1106]: time="2024-02-12T19:48:30.029895775Z" level=info msg="StopPodSandbox for \"9acdc21f152cabfb8101a758ea9ab4ca678df037951e5e975e4381de102440d0\" returns successfully" Feb 12 19:48:30.030792 env[1106]: time="2024-02-12T19:48:30.030754735Z" level=info msg="RemovePodSandbox for \"9acdc21f152cabfb8101a758ea9ab4ca678df037951e5e975e4381de102440d0\"" Feb 12 19:48:30.031021 env[1106]: time="2024-02-12T19:48:30.030968360Z" level=info msg="Forcibly stopping sandbox \"9acdc21f152cabfb8101a758ea9ab4ca678df037951e5e975e4381de102440d0\"" Feb 12 19:48:30.031219 env[1106]: time="2024-02-12T19:48:30.031194470Z" level=info msg="TearDown network for sandbox \"9acdc21f152cabfb8101a758ea9ab4ca678df037951e5e975e4381de102440d0\" successfully" Feb 12 19:48:30.051258 env[1106]: time="2024-02-12T19:48:30.051188558Z" level=info msg="RemovePodSandbox \"9acdc21f152cabfb8101a758ea9ab4ca678df037951e5e975e4381de102440d0\" returns successfully" Feb 12 19:48:30.054289 env[1106]: time="2024-02-12T19:48:30.054230999Z" level=info msg="StopPodSandbox for \"e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e\"" Feb 12 19:48:30.500161 env[1106]: 2024-02-12 19:48:30.307 [WARNING][4411] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--d--344270592c-k8s-csi--node--driver--bp7zv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1b086c16-44ff-4ae2-8b8c-0804a979d643", ResourceVersion:"844", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 47, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-d-344270592c", ContainerID:"596c63aa6f4f1d320e027b4e38f278a5503d761e34d504da79c87917039d1a7b", Pod:"csi-node-driver-bp7zv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali1ee40940031", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:30.500161 env[1106]: 2024-02-12 19:48:30.308 [INFO][4411] k8s.go 578: Cleaning up netns ContainerID="e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" Feb 12 19:48:30.500161 env[1106]: 2024-02-12 19:48:30.308 [INFO][4411] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" iface="eth0" netns="" Feb 12 19:48:30.500161 env[1106]: 2024-02-12 19:48:30.308 [INFO][4411] k8s.go 585: Releasing IP address(es) ContainerID="e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" Feb 12 19:48:30.500161 env[1106]: 2024-02-12 19:48:30.308 [INFO][4411] utils.go 188: Calico CNI releasing IP address ContainerID="e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" Feb 12 19:48:30.500161 env[1106]: 2024-02-12 19:48:30.443 [INFO][4419] ipam_plugin.go 415: Releasing address using handleID ContainerID="e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" HandleID="k8s-pod-network.e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" Workload="ci--3510.3.2--d--344270592c-k8s-csi--node--driver--bp7zv-eth0" Feb 12 19:48:30.500161 env[1106]: 2024-02-12 19:48:30.444 [INFO][4419] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:30.500161 env[1106]: 2024-02-12 19:48:30.444 [INFO][4419] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:30.500161 env[1106]: 2024-02-12 19:48:30.476 [WARNING][4419] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" HandleID="k8s-pod-network.e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" Workload="ci--3510.3.2--d--344270592c-k8s-csi--node--driver--bp7zv-eth0" Feb 12 19:48:30.500161 env[1106]: 2024-02-12 19:48:30.476 [INFO][4419] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" HandleID="k8s-pod-network.e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" Workload="ci--3510.3.2--d--344270592c-k8s-csi--node--driver--bp7zv-eth0" Feb 12 19:48:30.500161 env[1106]: 2024-02-12 19:48:30.482 [INFO][4419] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:30.500161 env[1106]: 2024-02-12 19:48:30.487 [INFO][4411] k8s.go 591: Teardown processing complete. ContainerID="e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" Feb 12 19:48:30.501644 env[1106]: time="2024-02-12T19:48:30.500221952Z" level=info msg="TearDown network for sandbox \"e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e\" successfully" Feb 12 19:48:30.501644 env[1106]: time="2024-02-12T19:48:30.500320316Z" level=info msg="StopPodSandbox for \"e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e\" returns successfully" Feb 12 19:48:30.502786 env[1106]: time="2024-02-12T19:48:30.502668397Z" level=info msg="RemovePodSandbox for \"e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e\"" Feb 12 19:48:30.503224 env[1106]: time="2024-02-12T19:48:30.503079430Z" level=info msg="Forcibly stopping sandbox \"e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e\"" Feb 12 19:48:30.568262 env[1106]: time="2024-02-12T19:48:30.568174073Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:30.574983 env[1106]: time="2024-02-12T19:48:30.574916499Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:30.582229 env[1106]: time="2024-02-12T19:48:30.582173829Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:30.606106 env[1106]: time="2024-02-12T19:48:30.606039937Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:30.607143 env[1106]: time="2024-02-12T19:48:30.607088617Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 12 19:48:30.613578 env[1106]: time="2024-02-12T19:48:30.613469811Z" level=info msg="CreateContainer within sandbox \"596c63aa6f4f1d320e027b4e38f278a5503d761e34d504da79c87917039d1a7b\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 19:48:30.659121 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1984349002.mount: Deactivated successfully. Feb 12 19:48:30.670257 env[1106]: time="2024-02-12T19:48:30.670197221Z" level=info msg="CreateContainer within sandbox \"596c63aa6f4f1d320e027b4e38f278a5503d761e34d504da79c87917039d1a7b\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"edc87c51afab0a84f502721a45de086006062fc5a5ac94c60eac374965af7471\"" Feb 12 19:48:30.671597 env[1106]: time="2024-02-12T19:48:30.671536606Z" level=info msg="StartContainer for \"edc87c51afab0a84f502721a45de086006062fc5a5ac94c60eac374965af7471\"" Feb 12 19:48:30.744394 systemd[1]: Started cri-containerd-edc87c51afab0a84f502721a45de086006062fc5a5ac94c60eac374965af7471.scope. Feb 12 19:48:30.876000 audit[4456]: AVC avc: denied { perfmon } for pid=4456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.878153 kernel: kauditd_printk_skb: 292 callbacks suppressed Feb 12 19:48:30.878312 kernel: audit: type=1400 audit(1707767310.876:1384): avc: denied { perfmon } for pid=4456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.876000 audit[4456]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4024 pid=4456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:30.888042 kernel: audit: type=1300 audit(1707767310.876:1384): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4024 pid=4456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:30.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564633837633531616661623061383466353032373231613435646530 Feb 12 19:48:30.895045 kernel: audit: type=1327 audit(1707767310.876:1384): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564633837633531616661623061383466353032373231613435646530 Feb 12 19:48:30.876000 audit[4456]: AVC avc: denied { bpf } for pid=4456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.876000 audit[4456]: AVC avc: denied { bpf } for pid=4456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.902836 env[1106]: 2024-02-12 19:48:30.658 [WARNING][4439] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--d--344270592c-k8s-csi--node--driver--bp7zv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1b086c16-44ff-4ae2-8b8c-0804a979d643", ResourceVersion:"844", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 47, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-d-344270592c", ContainerID:"596c63aa6f4f1d320e027b4e38f278a5503d761e34d504da79c87917039d1a7b", Pod:"csi-node-driver-bp7zv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali1ee40940031", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:30.902836 env[1106]: 2024-02-12 19:48:30.659 [INFO][4439] k8s.go 578: Cleaning up netns ContainerID="e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" Feb 12 19:48:30.902836 env[1106]: 2024-02-12 19:48:30.659 [INFO][4439] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" iface="eth0" netns="" Feb 12 19:48:30.902836 env[1106]: 2024-02-12 19:48:30.660 [INFO][4439] k8s.go 585: Releasing IP address(es) ContainerID="e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" Feb 12 19:48:30.902836 env[1106]: 2024-02-12 19:48:30.660 [INFO][4439] utils.go 188: Calico CNI releasing IP address ContainerID="e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" Feb 12 19:48:30.902836 env[1106]: 2024-02-12 19:48:30.799 [INFO][4445] ipam_plugin.go 415: Releasing address using handleID ContainerID="e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" HandleID="k8s-pod-network.e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" Workload="ci--3510.3.2--d--344270592c-k8s-csi--node--driver--bp7zv-eth0" Feb 12 19:48:30.902836 env[1106]: 2024-02-12 19:48:30.799 [INFO][4445] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:30.902836 env[1106]: 2024-02-12 19:48:30.800 [INFO][4445] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:30.902836 env[1106]: 2024-02-12 19:48:30.846 [WARNING][4445] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" HandleID="k8s-pod-network.e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" Workload="ci--3510.3.2--d--344270592c-k8s-csi--node--driver--bp7zv-eth0" Feb 12 19:48:30.902836 env[1106]: 2024-02-12 19:48:30.846 [INFO][4445] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" HandleID="k8s-pod-network.e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" Workload="ci--3510.3.2--d--344270592c-k8s-csi--node--driver--bp7zv-eth0" Feb 12 19:48:30.902836 env[1106]: 2024-02-12 19:48:30.887 [INFO][4445] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:30.902836 env[1106]: 2024-02-12 19:48:30.895 [INFO][4439] k8s.go 591: Teardown processing complete. ContainerID="e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e" Feb 12 19:48:30.903617 kernel: audit: type=1400 audit(1707767310.876:1385): avc: denied { bpf } for pid=4456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.903691 kernel: audit: type=1400 audit(1707767310.876:1385): avc: denied { bpf } for pid=4456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.903771 kernel: audit: type=1400 audit(1707767310.876:1385): avc: denied { bpf } for pid=4456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.876000 audit[4456]: AVC avc: denied { bpf } for pid=4456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.904272 env[1106]: time="2024-02-12T19:48:30.904210254Z" level=info msg="TearDown network for sandbox \"e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e\" successfully" Feb 12 19:48:30.912890 kernel: audit: type=1400 audit(1707767310.876:1385): avc: denied { perfmon } for pid=4456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.876000 audit[4456]: AVC avc: denied { perfmon } for pid=4456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.876000 audit[4456]: AVC avc: denied { perfmon } for pid=4456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.876000 audit[4456]: AVC avc: denied { perfmon } for pid=4456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.923223 kernel: audit: type=1400 audit(1707767310.876:1385): avc: denied { perfmon } for pid=4456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.923435 kernel: audit: type=1400 audit(1707767310.876:1385): avc: denied { perfmon } for pid=4456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.923481 kernel: audit: type=1400 audit(1707767310.876:1385): avc: denied { perfmon } for pid=4456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.876000 audit[4456]: AVC avc: denied { perfmon } for pid=4456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.876000 audit[4456]: AVC avc: denied { perfmon } for pid=4456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.876000 audit[4456]: AVC avc: denied { bpf } for pid=4456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.876000 audit[4456]: AVC avc: denied { bpf } for pid=4456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.876000 audit: BPF prog-id=189 op=LOAD Feb 12 19:48:30.876000 audit[4456]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002186a0 items=0 ppid=4024 pid=4456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:30.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564633837633531616661623061383466353032373231613435646530 Feb 12 19:48:30.906000 audit[4456]: AVC avc: denied { bpf } for pid=4456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.906000 audit[4456]: AVC avc: denied { bpf } for pid=4456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.906000 audit[4456]: AVC avc: denied { perfmon } for pid=4456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.906000 audit[4456]: AVC avc: denied { perfmon } for pid=4456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.906000 audit[4456]: AVC avc: denied { perfmon } for pid=4456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.906000 audit[4456]: AVC avc: denied { perfmon } for pid=4456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.906000 audit[4456]: AVC avc: denied { perfmon } for pid=4456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.906000 audit[4456]: AVC avc: denied { bpf } for pid=4456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.906000 audit[4456]: AVC avc: denied { bpf } for pid=4456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.906000 audit: BPF prog-id=190 op=LOAD Feb 12 19:48:30.906000 audit[4456]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002186e8 items=0 ppid=4024 pid=4456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:30.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564633837633531616661623061383466353032373231613435646530 Feb 12 19:48:30.913000 audit: BPF prog-id=190 op=UNLOAD Feb 12 19:48:30.913000 audit: BPF prog-id=189 op=UNLOAD Feb 12 19:48:30.913000 audit[4456]: AVC avc: denied { bpf } for pid=4456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.913000 audit[4456]: AVC avc: denied { bpf } for pid=4456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.913000 audit[4456]: AVC avc: denied { bpf } for pid=4456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.913000 audit[4456]: AVC avc: denied { perfmon } for pid=4456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.913000 audit[4456]: AVC avc: denied { perfmon } for pid=4456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.913000 audit[4456]: AVC avc: denied { perfmon } for pid=4456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.913000 audit[4456]: AVC avc: denied { perfmon } for pid=4456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.913000 audit[4456]: AVC avc: denied { perfmon } for pid=4456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.913000 audit[4456]: AVC avc: denied { bpf } for pid=4456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.913000 audit[4456]: AVC avc: denied { bpf } for pid=4456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.913000 audit: BPF prog-id=191 op=LOAD Feb 12 19:48:30.913000 audit[4456]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000218778 items=0 ppid=4024 pid=4456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:30.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564633837633531616661623061383466353032373231613435646530 Feb 12 19:48:30.931354 env[1106]: time="2024-02-12T19:48:30.931286813Z" level=info msg="RemovePodSandbox \"e8034d0eb784201bb3f405ecf80ec95b2e0e45ee909ef21a524391aaa63d111e\" returns successfully" Feb 12 19:48:30.934817 env[1106]: time="2024-02-12T19:48:30.932278144Z" level=info msg="StopPodSandbox for \"2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169\"" Feb 12 19:48:31.010289 kubelet[2029]: I0212 19:48:31.009017 2029 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:48:31.029710 systemd[1]: Created slice kubepods-besteffort-pod1ce7d214_815b_4d42_bb40_d9353d0e85ce.slice. Feb 12 19:48:31.030253 kubelet[2029]: W0212 19:48:31.030158 2029 reflector.go:424] object-"calico-apiserver"/"calico-apiserver-certs": failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510.3.2-d-344270592c" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.2-d-344270592c' and this object Feb 12 19:48:31.032326 kubelet[2029]: W0212 19:48:31.030164 2029 reflector.go:424] object-"calico-apiserver"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.2-d-344270592c" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.2-d-344270592c' and this object Feb 12 19:48:31.033069 kubelet[2029]: E0212 19:48:31.033041 2029 reflector.go:140] object-"calico-apiserver"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.2-d-344270592c" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.2-d-344270592c' and this object Feb 12 19:48:31.033984 kubelet[2029]: E0212 19:48:31.033959 2029 reflector.go:140] object-"calico-apiserver"/"calico-apiserver-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510.3.2-d-344270592c" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.2-d-344270592c' and this object Feb 12 19:48:31.046491 env[1106]: time="2024-02-12T19:48:31.046396918Z" level=info msg="StartContainer for \"edc87c51afab0a84f502721a45de086006062fc5a5ac94c60eac374965af7471\" returns successfully" Feb 12 19:48:31.049486 env[1106]: time="2024-02-12T19:48:31.048690409Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 19:48:31.050812 kubelet[2029]: I0212 19:48:31.050776 2029 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:48:31.063705 systemd[1]: Created slice kubepods-besteffort-podc0f03d70_2590_4737_83b0_6420d8a99ec9.slice. Feb 12 19:48:31.111082 kubelet[2029]: I0212 19:48:31.110895 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/c0f03d70-2590-4737-83b0-6420d8a99ec9-calico-apiserver-certs\") pod \"calico-apiserver-77fb866796-j5gzw\" (UID: \"c0f03d70-2590-4737-83b0-6420d8a99ec9\") " pod="calico-apiserver/calico-apiserver-77fb866796-j5gzw" Feb 12 19:48:31.111082 kubelet[2029]: I0212 19:48:31.111035 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fhm7b\" (UniqueName: \"kubernetes.io/projected/c0f03d70-2590-4737-83b0-6420d8a99ec9-kube-api-access-fhm7b\") pod \"calico-apiserver-77fb866796-j5gzw\" (UID: \"c0f03d70-2590-4737-83b0-6420d8a99ec9\") " pod="calico-apiserver/calico-apiserver-77fb866796-j5gzw" Feb 12 19:48:31.111685 kubelet[2029]: I0212 19:48:31.111603 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/1ce7d214-815b-4d42-bb40-d9353d0e85ce-calico-apiserver-certs\") pod \"calico-apiserver-77fb866796-q7qfv\" (UID: \"1ce7d214-815b-4d42-bb40-d9353d0e85ce\") " pod="calico-apiserver/calico-apiserver-77fb866796-q7qfv" Feb 12 19:48:31.111685 kubelet[2029]: I0212 19:48:31.111649 2029 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w446g\" (UniqueName: \"kubernetes.io/projected/1ce7d214-815b-4d42-bb40-d9353d0e85ce-kube-api-access-w446g\") pod \"calico-apiserver-77fb866796-q7qfv\" (UID: \"1ce7d214-815b-4d42-bb40-d9353d0e85ce\") " pod="calico-apiserver/calico-apiserver-77fb866796-q7qfv" Feb 12 19:48:31.205953 env[1106]: 2024-02-12 19:48:31.114 [WARNING][4490] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--flv9z-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"9035b034-9c8e-4b17-b971-e692c700076a", ResourceVersion:"877", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 47, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-d-344270592c", ContainerID:"95f53c2aef59ecdcf7b195b3b16507053481b10d3104ece8128d6ec4b411cd94", Pod:"coredns-787d4945fb-flv9z", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2566fb57ce5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:31.205953 env[1106]: 2024-02-12 19:48:31.114 [INFO][4490] k8s.go 578: Cleaning up netns ContainerID="2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" Feb 12 19:48:31.205953 env[1106]: 2024-02-12 19:48:31.114 [INFO][4490] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" iface="eth0" netns="" Feb 12 19:48:31.205953 env[1106]: 2024-02-12 19:48:31.114 [INFO][4490] k8s.go 585: Releasing IP address(es) ContainerID="2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" Feb 12 19:48:31.205953 env[1106]: 2024-02-12 19:48:31.114 [INFO][4490] utils.go 188: Calico CNI releasing IP address ContainerID="2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" Feb 12 19:48:31.205953 env[1106]: 2024-02-12 19:48:31.178 [INFO][4507] ipam_plugin.go 415: Releasing address using handleID ContainerID="2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" HandleID="k8s-pod-network.2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" Workload="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--flv9z-eth0" Feb 12 19:48:31.205953 env[1106]: 2024-02-12 19:48:31.178 [INFO][4507] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:31.205953 env[1106]: 2024-02-12 19:48:31.178 [INFO][4507] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:31.205953 env[1106]: 2024-02-12 19:48:31.194 [WARNING][4507] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" HandleID="k8s-pod-network.2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" Workload="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--flv9z-eth0" Feb 12 19:48:31.205953 env[1106]: 2024-02-12 19:48:31.194 [INFO][4507] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" HandleID="k8s-pod-network.2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" Workload="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--flv9z-eth0" Feb 12 19:48:31.205953 env[1106]: 2024-02-12 19:48:31.200 [INFO][4507] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:31.205953 env[1106]: 2024-02-12 19:48:31.202 [INFO][4490] k8s.go 591: Teardown processing complete. ContainerID="2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" Feb 12 19:48:31.209003 env[1106]: time="2024-02-12T19:48:31.205905263Z" level=info msg="TearDown network for sandbox \"2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169\" successfully" Feb 12 19:48:31.209185 env[1106]: time="2024-02-12T19:48:31.209034502Z" level=info msg="StopPodSandbox for \"2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169\" returns successfully" Feb 12 19:48:31.209934 env[1106]: time="2024-02-12T19:48:31.209891832Z" level=info msg="RemovePodSandbox for \"2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169\"" Feb 12 19:48:31.210475 env[1106]: time="2024-02-12T19:48:31.210415902Z" level=info msg="Forcibly stopping sandbox \"2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169\"" Feb 12 19:48:31.382000 audit[4561]: NETFILTER_CFG table=filter:133 family=2 entries=7 op=nft_register_rule pid=4561 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:31.382000 audit[4561]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fff7452ce10 a2=0 a3=7fff7452cdfc items=0 ppid=2189 pid=4561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:31.382000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:31.391000 audit[4561]: NETFILTER_CFG table=nat:134 family=2 entries=78 op=nft_register_rule pid=4561 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:31.391000 audit[4561]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff7452ce10 a2=0 a3=7fff7452cdfc items=0 ppid=2189 pid=4561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:31.391000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:31.401711 env[1106]: 2024-02-12 19:48:31.305 [WARNING][4542] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--flv9z-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"9035b034-9c8e-4b17-b971-e692c700076a", ResourceVersion:"877", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 47, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-d-344270592c", ContainerID:"95f53c2aef59ecdcf7b195b3b16507053481b10d3104ece8128d6ec4b411cd94", Pod:"coredns-787d4945fb-flv9z", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2566fb57ce5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:31.401711 env[1106]: 2024-02-12 19:48:31.306 [INFO][4542] k8s.go 578: Cleaning up netns ContainerID="2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" Feb 12 19:48:31.401711 env[1106]: 2024-02-12 19:48:31.306 [INFO][4542] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" iface="eth0" netns="" Feb 12 19:48:31.401711 env[1106]: 2024-02-12 19:48:31.306 [INFO][4542] k8s.go 585: Releasing IP address(es) ContainerID="2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" Feb 12 19:48:31.401711 env[1106]: 2024-02-12 19:48:31.306 [INFO][4542] utils.go 188: Calico CNI releasing IP address ContainerID="2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" Feb 12 19:48:31.401711 env[1106]: 2024-02-12 19:48:31.380 [INFO][4556] ipam_plugin.go 415: Releasing address using handleID ContainerID="2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" HandleID="k8s-pod-network.2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" Workload="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--flv9z-eth0" Feb 12 19:48:31.401711 env[1106]: 2024-02-12 19:48:31.381 [INFO][4556] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:31.401711 env[1106]: 2024-02-12 19:48:31.381 [INFO][4556] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:31.401711 env[1106]: 2024-02-12 19:48:31.393 [WARNING][4556] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" HandleID="k8s-pod-network.2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" Workload="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--flv9z-eth0" Feb 12 19:48:31.401711 env[1106]: 2024-02-12 19:48:31.393 [INFO][4556] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" HandleID="k8s-pod-network.2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" Workload="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--flv9z-eth0" Feb 12 19:48:31.401711 env[1106]: 2024-02-12 19:48:31.397 [INFO][4556] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:31.401711 env[1106]: 2024-02-12 19:48:31.399 [INFO][4542] k8s.go 591: Teardown processing complete. ContainerID="2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169" Feb 12 19:48:31.402777 env[1106]: time="2024-02-12T19:48:31.401762543Z" level=info msg="TearDown network for sandbox \"2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169\" successfully" Feb 12 19:48:31.406628 env[1106]: time="2024-02-12T19:48:31.406549162Z" level=info msg="RemovePodSandbox \"2f7e5d19d64fef371bda4c30e0df3be1bc5eb1689eb8232c636e263cb52cf169\" returns successfully" Feb 12 19:48:31.407375 env[1106]: time="2024-02-12T19:48:31.407332026Z" level=info msg="StopPodSandbox for \"1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b\"" Feb 12 19:48:31.591864 env[1106]: 2024-02-12 19:48:31.496 [WARNING][4580] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--d--344270592c-k8s-calico--kube--controllers--5cffbfd69f--dlhss-eth0", GenerateName:"calico-kube-controllers-5cffbfd69f-", Namespace:"calico-system", SelfLink:"", UID:"5e9cad69-faf3-454a-be31-c3424451d07d", ResourceVersion:"899", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 47, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5cffbfd69f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-d-344270592c", ContainerID:"afbfbe2133869dcc98c93bf9aeca5669464002eecde194ffc57eb04bc76726a5", Pod:"calico-kube-controllers-5cffbfd69f-dlhss", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.21.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califc22a6ac562", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:31.591864 env[1106]: 2024-02-12 19:48:31.497 [INFO][4580] k8s.go 578: Cleaning up netns ContainerID="1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" Feb 12 19:48:31.591864 env[1106]: 2024-02-12 19:48:31.497 [INFO][4580] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" iface="eth0" netns="" Feb 12 19:48:31.591864 env[1106]: 2024-02-12 19:48:31.498 [INFO][4580] k8s.go 585: Releasing IP address(es) ContainerID="1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" Feb 12 19:48:31.591864 env[1106]: 2024-02-12 19:48:31.498 [INFO][4580] utils.go 188: Calico CNI releasing IP address ContainerID="1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" Feb 12 19:48:31.591864 env[1106]: 2024-02-12 19:48:31.568 [INFO][4589] ipam_plugin.go 415: Releasing address using handleID ContainerID="1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" HandleID="k8s-pod-network.1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" Workload="ci--3510.3.2--d--344270592c-k8s-calico--kube--controllers--5cffbfd69f--dlhss-eth0" Feb 12 19:48:31.591864 env[1106]: 2024-02-12 19:48:31.569 [INFO][4589] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:31.591864 env[1106]: 2024-02-12 19:48:31.569 [INFO][4589] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:31.591864 env[1106]: 2024-02-12 19:48:31.583 [WARNING][4589] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" HandleID="k8s-pod-network.1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" Workload="ci--3510.3.2--d--344270592c-k8s-calico--kube--controllers--5cffbfd69f--dlhss-eth0" Feb 12 19:48:31.591864 env[1106]: 2024-02-12 19:48:31.583 [INFO][4589] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" HandleID="k8s-pod-network.1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" Workload="ci--3510.3.2--d--344270592c-k8s-calico--kube--controllers--5cffbfd69f--dlhss-eth0" Feb 12 19:48:31.591864 env[1106]: 2024-02-12 19:48:31.587 [INFO][4589] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:31.591864 env[1106]: 2024-02-12 19:48:31.589 [INFO][4580] k8s.go 591: Teardown processing complete. ContainerID="1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" Feb 12 19:48:31.592597 env[1106]: time="2024-02-12T19:48:31.592523615Z" level=info msg="TearDown network for sandbox \"1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b\" successfully" Feb 12 19:48:31.592786 env[1106]: time="2024-02-12T19:48:31.592717304Z" level=info msg="StopPodSandbox for \"1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b\" returns successfully" Feb 12 19:48:31.593496 env[1106]: time="2024-02-12T19:48:31.593460684Z" level=info msg="RemovePodSandbox for \"1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b\"" Feb 12 19:48:31.593836 env[1106]: time="2024-02-12T19:48:31.593781215Z" level=info msg="Forcibly stopping sandbox \"1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b\"" Feb 12 19:48:31.645451 systemd[1]: run-containerd-runc-k8s.io-edc87c51afab0a84f502721a45de086006062fc5a5ac94c60eac374965af7471-runc.e3zJhW.mount: Deactivated successfully. Feb 12 19:48:31.766986 env[1106]: 2024-02-12 19:48:31.681 [WARNING][4619] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--d--344270592c-k8s-calico--kube--controllers--5cffbfd69f--dlhss-eth0", GenerateName:"calico-kube-controllers-5cffbfd69f-", Namespace:"calico-system", SelfLink:"", UID:"5e9cad69-faf3-454a-be31-c3424451d07d", ResourceVersion:"899", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 47, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5cffbfd69f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-d-344270592c", ContainerID:"afbfbe2133869dcc98c93bf9aeca5669464002eecde194ffc57eb04bc76726a5", Pod:"calico-kube-controllers-5cffbfd69f-dlhss", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.21.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califc22a6ac562", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:31.766986 env[1106]: 2024-02-12 19:48:31.682 [INFO][4619] k8s.go 578: Cleaning up netns ContainerID="1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" Feb 12 19:48:31.766986 env[1106]: 2024-02-12 19:48:31.682 [INFO][4619] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" iface="eth0" netns="" Feb 12 19:48:31.766986 env[1106]: 2024-02-12 19:48:31.682 [INFO][4619] k8s.go 585: Releasing IP address(es) ContainerID="1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" Feb 12 19:48:31.766986 env[1106]: 2024-02-12 19:48:31.682 [INFO][4619] utils.go 188: Calico CNI releasing IP address ContainerID="1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" Feb 12 19:48:31.766986 env[1106]: 2024-02-12 19:48:31.746 [INFO][4628] ipam_plugin.go 415: Releasing address using handleID ContainerID="1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" HandleID="k8s-pod-network.1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" Workload="ci--3510.3.2--d--344270592c-k8s-calico--kube--controllers--5cffbfd69f--dlhss-eth0" Feb 12 19:48:31.766986 env[1106]: 2024-02-12 19:48:31.746 [INFO][4628] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:31.766986 env[1106]: 2024-02-12 19:48:31.746 [INFO][4628] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:31.766986 env[1106]: 2024-02-12 19:48:31.756 [WARNING][4628] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" HandleID="k8s-pod-network.1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" Workload="ci--3510.3.2--d--344270592c-k8s-calico--kube--controllers--5cffbfd69f--dlhss-eth0" Feb 12 19:48:31.766986 env[1106]: 2024-02-12 19:48:31.756 [INFO][4628] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" HandleID="k8s-pod-network.1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" Workload="ci--3510.3.2--d--344270592c-k8s-calico--kube--controllers--5cffbfd69f--dlhss-eth0" Feb 12 19:48:31.766986 env[1106]: 2024-02-12 19:48:31.760 [INFO][4628] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:31.766986 env[1106]: 2024-02-12 19:48:31.764 [INFO][4619] k8s.go 591: Teardown processing complete. ContainerID="1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b" Feb 12 19:48:31.768049 env[1106]: time="2024-02-12T19:48:31.767275076Z" level=info msg="TearDown network for sandbox \"1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b\" successfully" Feb 12 19:48:31.770000 audit[4638]: NETFILTER_CFG table=filter:135 family=2 entries=8 op=nft_register_rule pid=4638 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:31.770000 audit[4638]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fff94ff0910 a2=0 a3=7fff94ff08fc items=0 ppid=2189 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:31.770000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:31.774000 audit[4638]: NETFILTER_CFG table=nat:136 family=2 entries=78 op=nft_register_rule pid=4638 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:31.774000 audit[4638]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff94ff0910 a2=0 a3=7fff94ff08fc items=0 ppid=2189 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:31.774000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:31.776585 env[1106]: time="2024-02-12T19:48:31.776483843Z" level=info msg="RemovePodSandbox \"1a184d71ca7f4e1f37104ceabafbd17a80b1613eba07008697258a14be0c6e6b\" returns successfully" Feb 12 19:48:31.779893 env[1106]: time="2024-02-12T19:48:31.779794567Z" level=info msg="StopPodSandbox for \"955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41\"" Feb 12 19:48:31.924307 env[1106]: 2024-02-12 19:48:31.859 [WARNING][4653] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--wqwhf-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"b6f10a97-6a15-4fe6-aa96-1b867b822576", ResourceVersion:"850", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 47, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-d-344270592c", ContainerID:"36817ce8b86f4b12b4178af2ac14165b7089ac5c71487fd5186a16495c7cccaf", Pod:"coredns-787d4945fb-wqwhf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali68b136ec3e4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:31.924307 env[1106]: 2024-02-12 19:48:31.859 [INFO][4653] k8s.go 578: Cleaning up netns ContainerID="955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" Feb 12 19:48:31.924307 env[1106]: 2024-02-12 19:48:31.860 [INFO][4653] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" iface="eth0" netns="" Feb 12 19:48:31.924307 env[1106]: 2024-02-12 19:48:31.860 [INFO][4653] k8s.go 585: Releasing IP address(es) ContainerID="955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" Feb 12 19:48:31.924307 env[1106]: 2024-02-12 19:48:31.860 [INFO][4653] utils.go 188: Calico CNI releasing IP address ContainerID="955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" Feb 12 19:48:31.924307 env[1106]: 2024-02-12 19:48:31.905 [INFO][4660] ipam_plugin.go 415: Releasing address using handleID ContainerID="955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" HandleID="k8s-pod-network.955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" Workload="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--wqwhf-eth0" Feb 12 19:48:31.924307 env[1106]: 2024-02-12 19:48:31.906 [INFO][4660] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:31.924307 env[1106]: 2024-02-12 19:48:31.906 [INFO][4660] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:31.924307 env[1106]: 2024-02-12 19:48:31.914 [WARNING][4660] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" HandleID="k8s-pod-network.955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" Workload="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--wqwhf-eth0" Feb 12 19:48:31.924307 env[1106]: 2024-02-12 19:48:31.914 [INFO][4660] ipam_plugin.go 443: Releasing address using workloadID ContainerID="955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" HandleID="k8s-pod-network.955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" Workload="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--wqwhf-eth0" Feb 12 19:48:31.924307 env[1106]: 2024-02-12 19:48:31.918 [INFO][4660] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:31.924307 env[1106]: 2024-02-12 19:48:31.921 [INFO][4653] k8s.go 591: Teardown processing complete. ContainerID="955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" Feb 12 19:48:31.924307 env[1106]: time="2024-02-12T19:48:31.924246991Z" level=info msg="TearDown network for sandbox \"955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41\" successfully" Feb 12 19:48:31.924307 env[1106]: time="2024-02-12T19:48:31.924281729Z" level=info msg="StopPodSandbox for \"955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41\" returns successfully" Feb 12 19:48:31.925482 env[1106]: time="2024-02-12T19:48:31.925058553Z" level=info msg="RemovePodSandbox for \"955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41\"" Feb 12 19:48:31.925482 env[1106]: time="2024-02-12T19:48:31.925119887Z" level=info msg="Forcibly stopping sandbox \"955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41\"" Feb 12 19:48:32.116697 env[1106]: 2024-02-12 19:48:32.022 [WARNING][4679] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--wqwhf-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"b6f10a97-6a15-4fe6-aa96-1b867b822576", ResourceVersion:"850", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 47, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-d-344270592c", ContainerID:"36817ce8b86f4b12b4178af2ac14165b7089ac5c71487fd5186a16495c7cccaf", Pod:"coredns-787d4945fb-wqwhf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali68b136ec3e4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:32.116697 env[1106]: 2024-02-12 19:48:32.022 [INFO][4679] k8s.go 578: Cleaning up netns ContainerID="955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" Feb 12 19:48:32.116697 env[1106]: 2024-02-12 19:48:32.022 [INFO][4679] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" iface="eth0" netns="" Feb 12 19:48:32.116697 env[1106]: 2024-02-12 19:48:32.022 [INFO][4679] k8s.go 585: Releasing IP address(es) ContainerID="955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" Feb 12 19:48:32.116697 env[1106]: 2024-02-12 19:48:32.022 [INFO][4679] utils.go 188: Calico CNI releasing IP address ContainerID="955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" Feb 12 19:48:32.116697 env[1106]: 2024-02-12 19:48:32.089 [INFO][4685] ipam_plugin.go 415: Releasing address using handleID ContainerID="955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" HandleID="k8s-pod-network.955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" Workload="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--wqwhf-eth0" Feb 12 19:48:32.116697 env[1106]: 2024-02-12 19:48:32.089 [INFO][4685] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:32.116697 env[1106]: 2024-02-12 19:48:32.089 [INFO][4685] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:32.116697 env[1106]: 2024-02-12 19:48:32.104 [WARNING][4685] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" HandleID="k8s-pod-network.955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" Workload="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--wqwhf-eth0" Feb 12 19:48:32.116697 env[1106]: 2024-02-12 19:48:32.104 [INFO][4685] ipam_plugin.go 443: Releasing address using workloadID ContainerID="955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" HandleID="k8s-pod-network.955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" Workload="ci--3510.3.2--d--344270592c-k8s-coredns--787d4945fb--wqwhf-eth0" Feb 12 19:48:32.116697 env[1106]: 2024-02-12 19:48:32.108 [INFO][4685] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:32.116697 env[1106]: 2024-02-12 19:48:32.110 [INFO][4679] k8s.go 591: Teardown processing complete. ContainerID="955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41" Feb 12 19:48:32.118125 env[1106]: time="2024-02-12T19:48:32.116762036Z" level=info msg="TearDown network for sandbox \"955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41\" successfully" Feb 12 19:48:32.126234 env[1106]: time="2024-02-12T19:48:32.126156267Z" level=info msg="RemovePodSandbox \"955b6d809e9fad6b2b35de32937f453cda3f3caacb041eae8985f41b12557d41\" returns successfully" Feb 12 19:48:32.214620 kubelet[2029]: E0212 19:48:32.214450 2029 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: failed to sync secret cache: timed out waiting for the condition Feb 12 19:48:32.215430 kubelet[2029]: E0212 19:48:32.214454 2029 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: failed to sync secret cache: timed out waiting for the condition Feb 12 19:48:32.216218 kubelet[2029]: E0212 19:48:32.216131 2029 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/c0f03d70-2590-4737-83b0-6420d8a99ec9-calico-apiserver-certs podName:c0f03d70-2590-4737-83b0-6420d8a99ec9 nodeName:}" failed. No retries permitted until 2024-02-12 19:48:32.715372502 +0000 UTC m=+63.093563395 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/c0f03d70-2590-4737-83b0-6420d8a99ec9-calico-apiserver-certs") pod "calico-apiserver-77fb866796-j5gzw" (UID: "c0f03d70-2590-4737-83b0-6420d8a99ec9") : failed to sync secret cache: timed out waiting for the condition Feb 12 19:48:32.216218 kubelet[2029]: E0212 19:48:32.216188 2029 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/1ce7d214-815b-4d42-bb40-d9353d0e85ce-calico-apiserver-certs podName:1ce7d214-815b-4d42-bb40-d9353d0e85ce nodeName:}" failed. No retries permitted until 2024-02-12 19:48:32.716164007 +0000 UTC m=+63.094354898 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/1ce7d214-815b-4d42-bb40-d9353d0e85ce-calico-apiserver-certs") pod "calico-apiserver-77fb866796-q7qfv" (UID: "1ce7d214-815b-4d42-bb40-d9353d0e85ce") : failed to sync secret cache: timed out waiting for the condition Feb 12 19:48:32.234969 kubelet[2029]: E0212 19:48:32.234778 2029 projected.go:292] Couldn't get configMap calico-apiserver/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Feb 12 19:48:32.235406 kubelet[2029]: E0212 19:48:32.234782 2029 projected.go:292] Couldn't get configMap calico-apiserver/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Feb 12 19:48:32.236231 kubelet[2029]: E0212 19:48:32.234877 2029 projected.go:198] Error preparing data for projected volume kube-api-access-fhm7b for pod calico-apiserver/calico-apiserver-77fb866796-j5gzw: failed to sync configmap cache: timed out waiting for the condition Feb 12 19:48:32.236231 kubelet[2029]: E0212 19:48:32.235907 2029 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/c0f03d70-2590-4737-83b0-6420d8a99ec9-kube-api-access-fhm7b podName:c0f03d70-2590-4737-83b0-6420d8a99ec9 nodeName:}" failed. No retries permitted until 2024-02-12 19:48:32.735873306 +0000 UTC m=+63.114064207 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-fhm7b" (UniqueName: "kubernetes.io/projected/c0f03d70-2590-4737-83b0-6420d8a99ec9-kube-api-access-fhm7b") pod "calico-apiserver-77fb866796-j5gzw" (UID: "c0f03d70-2590-4737-83b0-6420d8a99ec9") : failed to sync configmap cache: timed out waiting for the condition Feb 12 19:48:32.236710 kubelet[2029]: E0212 19:48:32.235388 2029 projected.go:198] Error preparing data for projected volume kube-api-access-w446g for pod calico-apiserver/calico-apiserver-77fb866796-q7qfv: failed to sync configmap cache: timed out waiting for the condition Feb 12 19:48:32.237081 kubelet[2029]: E0212 19:48:32.237058 2029 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/1ce7d214-815b-4d42-bb40-d9353d0e85ce-kube-api-access-w446g podName:1ce7d214-815b-4d42-bb40-d9353d0e85ce nodeName:}" failed. No retries permitted until 2024-02-12 19:48:32.73699907 +0000 UTC m=+63.115189969 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-w446g" (UniqueName: "kubernetes.io/projected/1ce7d214-815b-4d42-bb40-d9353d0e85ce-kube-api-access-w446g") pod "calico-apiserver-77fb866796-q7qfv" (UID: "1ce7d214-815b-4d42-bb40-d9353d0e85ce") : failed to sync configmap cache: timed out waiting for the condition Feb 12 19:48:32.870325 env[1106]: time="2024-02-12T19:48:32.870264253Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-77fb866796-j5gzw,Uid:c0f03d70-2590-4737-83b0-6420d8a99ec9,Namespace:calico-apiserver,Attempt:0,}" Feb 12 19:48:33.099834 systemd-networkd[998]: califcba3612cff: Link UP Feb 12 19:48:33.105757 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:48:33.105942 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califcba3612cff: link becomes ready Feb 12 19:48:33.106873 systemd-networkd[998]: califcba3612cff: Gained carrier Feb 12 19:48:33.138130 env[1106]: 2024-02-12 19:48:32.955 [INFO][4702] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--d--344270592c-k8s-calico--apiserver--77fb866796--j5gzw-eth0 calico-apiserver-77fb866796- calico-apiserver c0f03d70-2590-4737-83b0-6420d8a99ec9 955 0 2024-02-12 19:48:30 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:77fb866796 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-d-344270592c calico-apiserver-77fb866796-j5gzw eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] califcba3612cff [] []}} ContainerID="64e0a80418095661f93d545876963b99e326d3f2850ca0428b8c9ee500efa4e6" Namespace="calico-apiserver" Pod="calico-apiserver-77fb866796-j5gzw" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-calico--apiserver--77fb866796--j5gzw-" Feb 12 19:48:33.138130 env[1106]: 2024-02-12 19:48:32.955 [INFO][4702] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="64e0a80418095661f93d545876963b99e326d3f2850ca0428b8c9ee500efa4e6" Namespace="calico-apiserver" Pod="calico-apiserver-77fb866796-j5gzw" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-calico--apiserver--77fb866796--j5gzw-eth0" Feb 12 19:48:33.138130 env[1106]: 2024-02-12 19:48:33.014 [INFO][4714] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="64e0a80418095661f93d545876963b99e326d3f2850ca0428b8c9ee500efa4e6" HandleID="k8s-pod-network.64e0a80418095661f93d545876963b99e326d3f2850ca0428b8c9ee500efa4e6" Workload="ci--3510.3.2--d--344270592c-k8s-calico--apiserver--77fb866796--j5gzw-eth0" Feb 12 19:48:33.138130 env[1106]: 2024-02-12 19:48:33.035 [INFO][4714] ipam_plugin.go 268: Auto assigning IP ContainerID="64e0a80418095661f93d545876963b99e326d3f2850ca0428b8c9ee500efa4e6" HandleID="k8s-pod-network.64e0a80418095661f93d545876963b99e326d3f2850ca0428b8c9ee500efa4e6" Workload="ci--3510.3.2--d--344270592c-k8s-calico--apiserver--77fb866796--j5gzw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00023d950), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-d-344270592c", "pod":"calico-apiserver-77fb866796-j5gzw", "timestamp":"2024-02-12 19:48:33.014317014 +0000 UTC"}, Hostname:"ci-3510.3.2-d-344270592c", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:48:33.138130 env[1106]: 2024-02-12 19:48:33.035 [INFO][4714] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:33.138130 env[1106]: 2024-02-12 19:48:33.035 [INFO][4714] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:33.138130 env[1106]: 2024-02-12 19:48:33.035 [INFO][4714] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-d-344270592c' Feb 12 19:48:33.138130 env[1106]: 2024-02-12 19:48:33.039 [INFO][4714] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.64e0a80418095661f93d545876963b99e326d3f2850ca0428b8c9ee500efa4e6" host="ci-3510.3.2-d-344270592c" Feb 12 19:48:33.138130 env[1106]: 2024-02-12 19:48:33.047 [INFO][4714] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-d-344270592c" Feb 12 19:48:33.138130 env[1106]: 2024-02-12 19:48:33.056 [INFO][4714] ipam.go 489: Trying affinity for 192.168.21.0/26 host="ci-3510.3.2-d-344270592c" Feb 12 19:48:33.138130 env[1106]: 2024-02-12 19:48:33.060 [INFO][4714] ipam.go 155: Attempting to load block cidr=192.168.21.0/26 host="ci-3510.3.2-d-344270592c" Feb 12 19:48:33.138130 env[1106]: 2024-02-12 19:48:33.066 [INFO][4714] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.21.0/26 host="ci-3510.3.2-d-344270592c" Feb 12 19:48:33.138130 env[1106]: 2024-02-12 19:48:33.066 [INFO][4714] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.21.0/26 handle="k8s-pod-network.64e0a80418095661f93d545876963b99e326d3f2850ca0428b8c9ee500efa4e6" host="ci-3510.3.2-d-344270592c" Feb 12 19:48:33.138130 env[1106]: 2024-02-12 19:48:33.070 [INFO][4714] ipam.go 1682: Creating new handle: k8s-pod-network.64e0a80418095661f93d545876963b99e326d3f2850ca0428b8c9ee500efa4e6 Feb 12 19:48:33.138130 env[1106]: 2024-02-12 19:48:33.077 [INFO][4714] ipam.go 1203: Writing block in order to claim IPs block=192.168.21.0/26 handle="k8s-pod-network.64e0a80418095661f93d545876963b99e326d3f2850ca0428b8c9ee500efa4e6" host="ci-3510.3.2-d-344270592c" Feb 12 19:48:33.138130 env[1106]: 2024-02-12 19:48:33.089 [INFO][4714] ipam.go 1216: Successfully claimed IPs: [192.168.21.5/26] block=192.168.21.0/26 handle="k8s-pod-network.64e0a80418095661f93d545876963b99e326d3f2850ca0428b8c9ee500efa4e6" host="ci-3510.3.2-d-344270592c" Feb 12 19:48:33.138130 env[1106]: 2024-02-12 19:48:33.089 [INFO][4714] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.21.5/26] handle="k8s-pod-network.64e0a80418095661f93d545876963b99e326d3f2850ca0428b8c9ee500efa4e6" host="ci-3510.3.2-d-344270592c" Feb 12 19:48:33.138130 env[1106]: 2024-02-12 19:48:33.089 [INFO][4714] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:33.138130 env[1106]: 2024-02-12 19:48:33.089 [INFO][4714] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.21.5/26] IPv6=[] ContainerID="64e0a80418095661f93d545876963b99e326d3f2850ca0428b8c9ee500efa4e6" HandleID="k8s-pod-network.64e0a80418095661f93d545876963b99e326d3f2850ca0428b8c9ee500efa4e6" Workload="ci--3510.3.2--d--344270592c-k8s-calico--apiserver--77fb866796--j5gzw-eth0" Feb 12 19:48:33.139350 env[1106]: 2024-02-12 19:48:33.092 [INFO][4702] k8s.go 385: Populated endpoint ContainerID="64e0a80418095661f93d545876963b99e326d3f2850ca0428b8c9ee500efa4e6" Namespace="calico-apiserver" Pod="calico-apiserver-77fb866796-j5gzw" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-calico--apiserver--77fb866796--j5gzw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--d--344270592c-k8s-calico--apiserver--77fb866796--j5gzw-eth0", GenerateName:"calico-apiserver-77fb866796-", Namespace:"calico-apiserver", SelfLink:"", UID:"c0f03d70-2590-4737-83b0-6420d8a99ec9", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 48, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"77fb866796", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-d-344270592c", ContainerID:"", Pod:"calico-apiserver-77fb866796-j5gzw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.21.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"califcba3612cff", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:33.139350 env[1106]: 2024-02-12 19:48:33.092 [INFO][4702] k8s.go 386: Calico CNI using IPs: [192.168.21.5/32] ContainerID="64e0a80418095661f93d545876963b99e326d3f2850ca0428b8c9ee500efa4e6" Namespace="calico-apiserver" Pod="calico-apiserver-77fb866796-j5gzw" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-calico--apiserver--77fb866796--j5gzw-eth0" Feb 12 19:48:33.139350 env[1106]: 2024-02-12 19:48:33.093 [INFO][4702] dataplane_linux.go 68: Setting the host side veth name to califcba3612cff ContainerID="64e0a80418095661f93d545876963b99e326d3f2850ca0428b8c9ee500efa4e6" Namespace="calico-apiserver" Pod="calico-apiserver-77fb866796-j5gzw" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-calico--apiserver--77fb866796--j5gzw-eth0" Feb 12 19:48:33.139350 env[1106]: 2024-02-12 19:48:33.109 [INFO][4702] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="64e0a80418095661f93d545876963b99e326d3f2850ca0428b8c9ee500efa4e6" Namespace="calico-apiserver" Pod="calico-apiserver-77fb866796-j5gzw" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-calico--apiserver--77fb866796--j5gzw-eth0" Feb 12 19:48:33.139350 env[1106]: 2024-02-12 19:48:33.109 [INFO][4702] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="64e0a80418095661f93d545876963b99e326d3f2850ca0428b8c9ee500efa4e6" Namespace="calico-apiserver" Pod="calico-apiserver-77fb866796-j5gzw" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-calico--apiserver--77fb866796--j5gzw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--d--344270592c-k8s-calico--apiserver--77fb866796--j5gzw-eth0", GenerateName:"calico-apiserver-77fb866796-", Namespace:"calico-apiserver", SelfLink:"", UID:"c0f03d70-2590-4737-83b0-6420d8a99ec9", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 48, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"77fb866796", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-d-344270592c", ContainerID:"64e0a80418095661f93d545876963b99e326d3f2850ca0428b8c9ee500efa4e6", Pod:"calico-apiserver-77fb866796-j5gzw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.21.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"califcba3612cff", MAC:"e2:10:20:11:cb:ce", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:33.139350 env[1106]: 2024-02-12 19:48:33.132 [INFO][4702] k8s.go 491: Wrote updated endpoint to datastore ContainerID="64e0a80418095661f93d545876963b99e326d3f2850ca0428b8c9ee500efa4e6" Namespace="calico-apiserver" Pod="calico-apiserver-77fb866796-j5gzw" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-calico--apiserver--77fb866796--j5gzw-eth0" Feb 12 19:48:33.153813 env[1106]: time="2024-02-12T19:48:33.153707322Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-77fb866796-q7qfv,Uid:1ce7d214-815b-4d42-bb40-d9353d0e85ce,Namespace:calico-apiserver,Attempt:0,}" Feb 12 19:48:33.231855 env[1106]: time="2024-02-12T19:48:33.228898738Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:48:33.231855 env[1106]: time="2024-02-12T19:48:33.228987870Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:48:33.231855 env[1106]: time="2024-02-12T19:48:33.229005990Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:48:33.231855 env[1106]: time="2024-02-12T19:48:33.229306450Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/64e0a80418095661f93d545876963b99e326d3f2850ca0428b8c9ee500efa4e6 pid=4755 runtime=io.containerd.runc.v2 Feb 12 19:48:33.282000 audit[4772]: NETFILTER_CFG table=filter:137 family=2 entries=65 op=nft_register_chain pid=4772 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:48:33.282000 audit[4772]: SYSCALL arch=c000003e syscall=46 success=yes exit=32144 a0=3 a1=7fff65f18520 a2=0 a3=7fff65f1850c items=0 ppid=3541 pid=4772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.282000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:48:33.286267 systemd[1]: Started cri-containerd-64e0a80418095661f93d545876963b99e326d3f2850ca0428b8c9ee500efa4e6.scope. Feb 12 19:48:33.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.353000 audit: BPF prog-id=192 op=LOAD Feb 12 19:48:33.358000 audit[4767]: AVC avc: denied { bpf } for pid=4767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.358000 audit[4767]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4755 pid=4767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634653061383034313830393536363166393364353435383736393633 Feb 12 19:48:33.358000 audit[4767]: AVC avc: denied { perfmon } for pid=4767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.358000 audit[4767]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4755 pid=4767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634653061383034313830393536363166393364353435383736393633 Feb 12 19:48:33.358000 audit[4767]: AVC avc: denied { bpf } for pid=4767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.358000 audit[4767]: AVC avc: denied { bpf } for pid=4767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.358000 audit[4767]: AVC avc: denied { bpf } for pid=4767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.358000 audit[4767]: AVC avc: denied { perfmon } for pid=4767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.358000 audit[4767]: AVC avc: denied { perfmon } for pid=4767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.358000 audit[4767]: AVC avc: denied { perfmon } for pid=4767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.358000 audit[4767]: AVC avc: denied { perfmon } for pid=4767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.358000 audit[4767]: AVC avc: denied { perfmon } for pid=4767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.358000 audit[4767]: AVC avc: denied { bpf } for pid=4767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.358000 audit[4767]: AVC avc: denied { bpf } for pid=4767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.358000 audit: BPF prog-id=193 op=LOAD Feb 12 19:48:33.358000 audit[4767]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0002184e0 items=0 ppid=4755 pid=4767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634653061383034313830393536363166393364353435383736393633 Feb 12 19:48:33.363000 audit[4767]: AVC avc: denied { bpf } for pid=4767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.363000 audit[4767]: AVC avc: denied { bpf } for pid=4767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.363000 audit[4767]: AVC avc: denied { perfmon } for pid=4767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.363000 audit[4767]: AVC avc: denied { perfmon } for pid=4767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.363000 audit[4767]: AVC avc: denied { perfmon } for pid=4767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.363000 audit[4767]: AVC avc: denied { perfmon } for pid=4767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.363000 audit[4767]: AVC avc: denied { perfmon } for pid=4767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.363000 audit[4767]: AVC avc: denied { bpf } for pid=4767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.363000 audit[4767]: AVC avc: denied { bpf } for pid=4767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.363000 audit: BPF prog-id=194 op=LOAD Feb 12 19:48:33.363000 audit[4767]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000218528 items=0 ppid=4755 pid=4767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634653061383034313830393536363166393364353435383736393633 Feb 12 19:48:33.365000 audit: BPF prog-id=194 op=UNLOAD Feb 12 19:48:33.365000 audit: BPF prog-id=193 op=UNLOAD Feb 12 19:48:33.365000 audit[4767]: AVC avc: denied { bpf } for pid=4767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.365000 audit[4767]: AVC avc: denied { bpf } for pid=4767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.365000 audit[4767]: AVC avc: denied { bpf } for pid=4767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.365000 audit[4767]: AVC avc: denied { perfmon } for pid=4767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.365000 audit[4767]: AVC avc: denied { perfmon } for pid=4767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.365000 audit[4767]: AVC avc: denied { perfmon } for pid=4767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.365000 audit[4767]: AVC avc: denied { perfmon } for pid=4767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.365000 audit[4767]: AVC avc: denied { perfmon } for pid=4767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.365000 audit[4767]: AVC avc: denied { bpf } for pid=4767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.365000 audit[4767]: AVC avc: denied { bpf } for pid=4767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.365000 audit: BPF prog-id=195 op=LOAD Feb 12 19:48:33.365000 audit[4767]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000218938 items=0 ppid=4755 pid=4767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634653061383034313830393536363166393364353435383736393633 Feb 12 19:48:33.440961 env[1106]: time="2024-02-12T19:48:33.440747110Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:33.460671 env[1106]: time="2024-02-12T19:48:33.460568126Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:33.463804 env[1106]: time="2024-02-12T19:48:33.463755043Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:33.478164 env[1106]: time="2024-02-12T19:48:33.478097417Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:33.480834 env[1106]: time="2024-02-12T19:48:33.480763939Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 12 19:48:33.495368 env[1106]: time="2024-02-12T19:48:33.495310674Z" level=info msg="CreateContainer within sandbox \"596c63aa6f4f1d320e027b4e38f278a5503d761e34d504da79c87917039d1a7b\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 19:48:33.508246 env[1106]: time="2024-02-12T19:48:33.508185775Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-77fb866796-j5gzw,Uid:c0f03d70-2590-4737-83b0-6420d8a99ec9,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"64e0a80418095661f93d545876963b99e326d3f2850ca0428b8c9ee500efa4e6\"" Feb 12 19:48:33.510678 env[1106]: time="2024-02-12T19:48:33.510630435Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 19:48:33.540013 env[1106]: time="2024-02-12T19:48:33.539916401Z" level=info msg="CreateContainer within sandbox \"596c63aa6f4f1d320e027b4e38f278a5503d761e34d504da79c87917039d1a7b\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"841cba59eaa1fd30c45cb4143e67b53657256713c6675ee4300770bdd3dc6547\"" Feb 12 19:48:33.542194 env[1106]: time="2024-02-12T19:48:33.542104880Z" level=info msg="StartContainer for \"841cba59eaa1fd30c45cb4143e67b53657256713c6675ee4300770bdd3dc6547\"" Feb 12 19:48:33.586190 systemd-networkd[998]: cali445822f5e7c: Link UP Feb 12 19:48:33.592651 systemd-networkd[998]: cali445822f5e7c: Gained carrier Feb 12 19:48:33.593017 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali445822f5e7c: link becomes ready Feb 12 19:48:33.624894 systemd[1]: Started cri-containerd-841cba59eaa1fd30c45cb4143e67b53657256713c6675ee4300770bdd3dc6547.scope. Feb 12 19:48:33.642040 env[1106]: 2024-02-12 19:48:33.342 [INFO][4735] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--d--344270592c-k8s-calico--apiserver--77fb866796--q7qfv-eth0 calico-apiserver-77fb866796- calico-apiserver 1ce7d214-815b-4d42-bb40-d9353d0e85ce 951 0 2024-02-12 19:48:30 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:77fb866796 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-d-344270592c calico-apiserver-77fb866796-q7qfv eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali445822f5e7c [] []}} ContainerID="9df552a268e35ce33702a1b07c2bfff97073019f5b8f07eaca7bb6f0488029be" Namespace="calico-apiserver" Pod="calico-apiserver-77fb866796-q7qfv" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-calico--apiserver--77fb866796--q7qfv-" Feb 12 19:48:33.642040 env[1106]: 2024-02-12 19:48:33.342 [INFO][4735] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="9df552a268e35ce33702a1b07c2bfff97073019f5b8f07eaca7bb6f0488029be" Namespace="calico-apiserver" Pod="calico-apiserver-77fb866796-q7qfv" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-calico--apiserver--77fb866796--q7qfv-eth0" Feb 12 19:48:33.642040 env[1106]: 2024-02-12 19:48:33.466 [INFO][4787] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9df552a268e35ce33702a1b07c2bfff97073019f5b8f07eaca7bb6f0488029be" HandleID="k8s-pod-network.9df552a268e35ce33702a1b07c2bfff97073019f5b8f07eaca7bb6f0488029be" Workload="ci--3510.3.2--d--344270592c-k8s-calico--apiserver--77fb866796--q7qfv-eth0" Feb 12 19:48:33.642040 env[1106]: 2024-02-12 19:48:33.488 [INFO][4787] ipam_plugin.go 268: Auto assigning IP ContainerID="9df552a268e35ce33702a1b07c2bfff97073019f5b8f07eaca7bb6f0488029be" HandleID="k8s-pod-network.9df552a268e35ce33702a1b07c2bfff97073019f5b8f07eaca7bb6f0488029be" Workload="ci--3510.3.2--d--344270592c-k8s-calico--apiserver--77fb866796--q7qfv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027c840), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-d-344270592c", "pod":"calico-apiserver-77fb866796-q7qfv", "timestamp":"2024-02-12 19:48:33.466620577 +0000 UTC"}, Hostname:"ci-3510.3.2-d-344270592c", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:48:33.642040 env[1106]: 2024-02-12 19:48:33.488 [INFO][4787] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:33.642040 env[1106]: 2024-02-12 19:48:33.488 [INFO][4787] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:33.642040 env[1106]: 2024-02-12 19:48:33.489 [INFO][4787] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-d-344270592c' Feb 12 19:48:33.642040 env[1106]: 2024-02-12 19:48:33.493 [INFO][4787] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9df552a268e35ce33702a1b07c2bfff97073019f5b8f07eaca7bb6f0488029be" host="ci-3510.3.2-d-344270592c" Feb 12 19:48:33.642040 env[1106]: 2024-02-12 19:48:33.508 [INFO][4787] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-d-344270592c" Feb 12 19:48:33.642040 env[1106]: 2024-02-12 19:48:33.529 [INFO][4787] ipam.go 489: Trying affinity for 192.168.21.0/26 host="ci-3510.3.2-d-344270592c" Feb 12 19:48:33.642040 env[1106]: 2024-02-12 19:48:33.534 [INFO][4787] ipam.go 155: Attempting to load block cidr=192.168.21.0/26 host="ci-3510.3.2-d-344270592c" Feb 12 19:48:33.642040 env[1106]: 2024-02-12 19:48:33.541 [INFO][4787] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.21.0/26 host="ci-3510.3.2-d-344270592c" Feb 12 19:48:33.642040 env[1106]: 2024-02-12 19:48:33.542 [INFO][4787] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.21.0/26 handle="k8s-pod-network.9df552a268e35ce33702a1b07c2bfff97073019f5b8f07eaca7bb6f0488029be" host="ci-3510.3.2-d-344270592c" Feb 12 19:48:33.642040 env[1106]: 2024-02-12 19:48:33.548 [INFO][4787] ipam.go 1682: Creating new handle: k8s-pod-network.9df552a268e35ce33702a1b07c2bfff97073019f5b8f07eaca7bb6f0488029be Feb 12 19:48:33.642040 env[1106]: 2024-02-12 19:48:33.560 [INFO][4787] ipam.go 1203: Writing block in order to claim IPs block=192.168.21.0/26 handle="k8s-pod-network.9df552a268e35ce33702a1b07c2bfff97073019f5b8f07eaca7bb6f0488029be" host="ci-3510.3.2-d-344270592c" Feb 12 19:48:33.642040 env[1106]: 2024-02-12 19:48:33.569 [INFO][4787] ipam.go 1216: Successfully claimed IPs: [192.168.21.6/26] block=192.168.21.0/26 handle="k8s-pod-network.9df552a268e35ce33702a1b07c2bfff97073019f5b8f07eaca7bb6f0488029be" host="ci-3510.3.2-d-344270592c" Feb 12 19:48:33.642040 env[1106]: 2024-02-12 19:48:33.570 [INFO][4787] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.21.6/26] handle="k8s-pod-network.9df552a268e35ce33702a1b07c2bfff97073019f5b8f07eaca7bb6f0488029be" host="ci-3510.3.2-d-344270592c" Feb 12 19:48:33.642040 env[1106]: 2024-02-12 19:48:33.570 [INFO][4787] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:33.642040 env[1106]: 2024-02-12 19:48:33.570 [INFO][4787] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.21.6/26] IPv6=[] ContainerID="9df552a268e35ce33702a1b07c2bfff97073019f5b8f07eaca7bb6f0488029be" HandleID="k8s-pod-network.9df552a268e35ce33702a1b07c2bfff97073019f5b8f07eaca7bb6f0488029be" Workload="ci--3510.3.2--d--344270592c-k8s-calico--apiserver--77fb866796--q7qfv-eth0" Feb 12 19:48:33.643531 env[1106]: 2024-02-12 19:48:33.574 [INFO][4735] k8s.go 385: Populated endpoint ContainerID="9df552a268e35ce33702a1b07c2bfff97073019f5b8f07eaca7bb6f0488029be" Namespace="calico-apiserver" Pod="calico-apiserver-77fb866796-q7qfv" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-calico--apiserver--77fb866796--q7qfv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--d--344270592c-k8s-calico--apiserver--77fb866796--q7qfv-eth0", GenerateName:"calico-apiserver-77fb866796-", Namespace:"calico-apiserver", SelfLink:"", UID:"1ce7d214-815b-4d42-bb40-d9353d0e85ce", ResourceVersion:"951", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 48, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"77fb866796", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-d-344270592c", ContainerID:"", Pod:"calico-apiserver-77fb866796-q7qfv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.21.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali445822f5e7c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:33.643531 env[1106]: 2024-02-12 19:48:33.574 [INFO][4735] k8s.go 386: Calico CNI using IPs: [192.168.21.6/32] ContainerID="9df552a268e35ce33702a1b07c2bfff97073019f5b8f07eaca7bb6f0488029be" Namespace="calico-apiserver" Pod="calico-apiserver-77fb866796-q7qfv" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-calico--apiserver--77fb866796--q7qfv-eth0" Feb 12 19:48:33.643531 env[1106]: 2024-02-12 19:48:33.575 [INFO][4735] dataplane_linux.go 68: Setting the host side veth name to cali445822f5e7c ContainerID="9df552a268e35ce33702a1b07c2bfff97073019f5b8f07eaca7bb6f0488029be" Namespace="calico-apiserver" Pod="calico-apiserver-77fb866796-q7qfv" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-calico--apiserver--77fb866796--q7qfv-eth0" Feb 12 19:48:33.643531 env[1106]: 2024-02-12 19:48:33.594 [INFO][4735] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="9df552a268e35ce33702a1b07c2bfff97073019f5b8f07eaca7bb6f0488029be" Namespace="calico-apiserver" Pod="calico-apiserver-77fb866796-q7qfv" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-calico--apiserver--77fb866796--q7qfv-eth0" Feb 12 19:48:33.643531 env[1106]: 2024-02-12 19:48:33.595 [INFO][4735] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="9df552a268e35ce33702a1b07c2bfff97073019f5b8f07eaca7bb6f0488029be" Namespace="calico-apiserver" Pod="calico-apiserver-77fb866796-q7qfv" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-calico--apiserver--77fb866796--q7qfv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--d--344270592c-k8s-calico--apiserver--77fb866796--q7qfv-eth0", GenerateName:"calico-apiserver-77fb866796-", Namespace:"calico-apiserver", SelfLink:"", UID:"1ce7d214-815b-4d42-bb40-d9353d0e85ce", ResourceVersion:"951", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 48, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"77fb866796", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-d-344270592c", ContainerID:"9df552a268e35ce33702a1b07c2bfff97073019f5b8f07eaca7bb6f0488029be", Pod:"calico-apiserver-77fb866796-q7qfv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.21.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali445822f5e7c", MAC:"52:b7:fa:7e:70:b9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:33.643531 env[1106]: 2024-02-12 19:48:33.631 [INFO][4735] k8s.go 491: Wrote updated endpoint to datastore ContainerID="9df552a268e35ce33702a1b07c2bfff97073019f5b8f07eaca7bb6f0488029be" Namespace="calico-apiserver" Pod="calico-apiserver-77fb866796-q7qfv" WorkloadEndpoint="ci--3510.3.2--d--344270592c-k8s-calico--apiserver--77fb866796--q7qfv-eth0" Feb 12 19:48:33.692892 env[1106]: time="2024-02-12T19:48:33.688941382Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:48:33.693428 env[1106]: time="2024-02-12T19:48:33.693312256Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:48:33.693703 env[1106]: time="2024-02-12T19:48:33.693632213Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:48:33.698600 env[1106]: time="2024-02-12T19:48:33.698506644Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9df552a268e35ce33702a1b07c2bfff97073019f5b8f07eaca7bb6f0488029be pid=4843 runtime=io.containerd.runc.v2 Feb 12 19:48:33.706000 audit[4808]: AVC avc: denied { perfmon } for pid=4808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.706000 audit[4808]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4024 pid=4808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834316362613539656161316664333063343563623431343365363762 Feb 12 19:48:33.706000 audit[4808]: AVC avc: denied { bpf } for pid=4808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.706000 audit[4808]: AVC avc: denied { bpf } for pid=4808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.706000 audit[4808]: AVC avc: denied { bpf } for pid=4808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.706000 audit[4808]: AVC avc: denied { perfmon } for pid=4808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.706000 audit[4808]: AVC avc: denied { perfmon } for pid=4808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.706000 audit[4808]: AVC avc: denied { perfmon } for pid=4808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.706000 audit[4808]: AVC avc: denied { perfmon } for pid=4808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.706000 audit[4808]: AVC avc: denied { perfmon } for pid=4808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.706000 audit[4808]: AVC avc: denied { bpf } for pid=4808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.706000 audit[4808]: AVC avc: denied { bpf } for pid=4808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.706000 audit: BPF prog-id=196 op=LOAD Feb 12 19:48:33.706000 audit[4808]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0002852f0 items=0 ppid=4024 pid=4808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834316362613539656161316664333063343563623431343365363762 Feb 12 19:48:33.706000 audit[4808]: AVC avc: denied { bpf } for pid=4808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.706000 audit[4808]: AVC avc: denied { bpf } for pid=4808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.706000 audit[4808]: AVC avc: denied { perfmon } for pid=4808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.706000 audit[4808]: AVC avc: denied { perfmon } for pid=4808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.706000 audit[4808]: AVC avc: denied { perfmon } for pid=4808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.706000 audit[4808]: AVC avc: denied { perfmon } for pid=4808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.706000 audit[4808]: AVC avc: denied { perfmon } for pid=4808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.706000 audit[4808]: AVC avc: denied { bpf } for pid=4808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.706000 audit[4808]: AVC avc: denied { bpf } for pid=4808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.706000 audit: BPF prog-id=197 op=LOAD Feb 12 19:48:33.706000 audit[4808]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000285338 items=0 ppid=4024 pid=4808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834316362613539656161316664333063343563623431343365363762 Feb 12 19:48:33.706000 audit: BPF prog-id=197 op=UNLOAD Feb 12 19:48:33.706000 audit: BPF prog-id=196 op=UNLOAD Feb 12 19:48:33.707000 audit[4808]: AVC avc: denied { bpf } for pid=4808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.707000 audit[4808]: AVC avc: denied { bpf } for pid=4808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.707000 audit[4808]: AVC avc: denied { bpf } for pid=4808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.707000 audit[4808]: AVC avc: denied { perfmon } for pid=4808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.707000 audit[4808]: AVC avc: denied { perfmon } for pid=4808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.707000 audit[4808]: AVC avc: denied { perfmon } for pid=4808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.707000 audit[4808]: AVC avc: denied { perfmon } for pid=4808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.707000 audit[4808]: AVC avc: denied { perfmon } for pid=4808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.707000 audit[4808]: AVC avc: denied { bpf } for pid=4808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.707000 audit[4808]: AVC avc: denied { bpf } for pid=4808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.707000 audit: BPF prog-id=198 op=LOAD Feb 12 19:48:33.707000 audit[4808]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0002853c8 items=0 ppid=4024 pid=4808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834316362613539656161316664333063343563623431343365363762 Feb 12 19:48:33.722000 audit[4852]: NETFILTER_CFG table=filter:138 family=2 entries=46 op=nft_register_chain pid=4852 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:48:33.722000 audit[4852]: SYSCALL arch=c000003e syscall=46 success=yes exit=23292 a0=3 a1=7ffc97199a90 a2=0 a3=7ffc97199a7c items=0 ppid=3541 pid=4852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.722000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:48:33.740234 systemd[1]: Started cri-containerd-9df552a268e35ce33702a1b07c2bfff97073019f5b8f07eaca7bb6f0488029be.scope. Feb 12 19:48:33.774905 env[1106]: time="2024-02-12T19:48:33.774836820Z" level=info msg="StartContainer for \"841cba59eaa1fd30c45cb4143e67b53657256713c6675ee4300770bdd3dc6547\" returns successfully" Feb 12 19:48:33.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.806000 audit: BPF prog-id=199 op=LOAD Feb 12 19:48:33.807000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.807000 audit[4853]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4843 pid=4853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964663535326132363865333563653333373032613162303763326266 Feb 12 19:48:33.807000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.807000 audit[4853]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4843 pid=4853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964663535326132363865333563653333373032613162303763326266 Feb 12 19:48:33.808000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.808000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.808000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.808000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.808000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.808000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.808000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.808000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.808000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.808000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.808000 audit: BPF prog-id=200 op=LOAD Feb 12 19:48:33.808000 audit[4853]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000216f10 items=0 ppid=4843 pid=4853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964663535326132363865333563653333373032613162303763326266 Feb 12 19:48:33.808000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.808000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.808000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.808000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.808000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.808000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.808000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.808000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.808000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.808000 audit: BPF prog-id=201 op=LOAD Feb 12 19:48:33.808000 audit[4853]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000216f58 items=0 ppid=4843 pid=4853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964663535326132363865333563653333373032613162303763326266 Feb 12 19:48:33.808000 audit: BPF prog-id=201 op=UNLOAD Feb 12 19:48:33.808000 audit: BPF prog-id=200 op=UNLOAD Feb 12 19:48:33.808000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.808000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.808000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.808000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.808000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.808000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.808000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.808000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.808000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.808000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:33.808000 audit: BPF prog-id=202 op=LOAD Feb 12 19:48:33.808000 audit[4853]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000217368 items=0 ppid=4843 pid=4853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964663535326132363865333563653333373032613162303763326266 Feb 12 19:48:33.873917 env[1106]: time="2024-02-12T19:48:33.873861769Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-77fb866796-q7qfv,Uid:1ce7d214-815b-4d42-bb40-d9353d0e85ce,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"9df552a268e35ce33702a1b07c2bfff97073019f5b8f07eaca7bb6f0488029be\"" Feb 12 19:48:34.316716 kubelet[2029]: I0212 19:48:34.315843 2029 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 19:48:34.316716 kubelet[2029]: I0212 19:48:34.316341 2029 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 19:48:34.724969 systemd-networkd[998]: califcba3612cff: Gained IPv6LL Feb 12 19:48:34.773586 kubelet[2029]: I0212 19:48:34.773512 2029 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-bp7zv" podStartSLOduration=-9.223371992081335e+09 pod.CreationTimestamp="2024-02-12 19:47:50 +0000 UTC" firstStartedPulling="2024-02-12 19:48:25.218521954 +0000 UTC m=+55.596712828" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:48:34.761748703 +0000 UTC m=+65.139939592" watchObservedRunningTime="2024-02-12 19:48:34.773440122 +0000 UTC m=+65.151631025" Feb 12 19:48:35.044094 systemd-networkd[998]: cali445822f5e7c: Gained IPv6LL Feb 12 19:48:35.243770 systemd[1]: Started sshd@7-146.190.157.125:22-139.178.68.195:36350.service. Feb 12 19:48:35.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-146.190.157.125:22-139.178.68.195:36350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:35.414000 audit[4893]: USER_ACCT pid=4893 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:35.416001 sshd[4893]: Accepted publickey for core from 139.178.68.195 port 36350 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:48:35.418000 audit[4893]: CRED_ACQ pid=4893 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:35.419000 audit[4893]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd7dfa890 a2=3 a3=0 items=0 ppid=1 pid=4893 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:35.419000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:35.425161 sshd[4893]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:35.443928 systemd-logind[1093]: New session 8 of user core. Feb 12 19:48:35.445338 systemd[1]: Started session-8.scope. Feb 12 19:48:35.459000 audit[4893]: USER_START pid=4893 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:35.463000 audit[4895]: CRED_ACQ pid=4895 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:35.999275 sshd[4893]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:36.004000 audit[4893]: USER_END pid=4893 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:36.006745 kernel: kauditd_printk_skb: 216 callbacks suppressed Feb 12 19:48:36.007049 kernel: audit: type=1106 audit(1707767316.004:1444): pid=4893 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:36.014408 systemd[1]: sshd@7-146.190.157.125:22-139.178.68.195:36350.service: Deactivated successfully. Feb 12 19:48:36.016083 systemd[1]: session-8.scope: Deactivated successfully. Feb 12 19:48:36.011000 audit[4893]: CRED_DISP pid=4893 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:36.021906 kernel: audit: type=1104 audit(1707767316.011:1445): pid=4893 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:36.023649 systemd-logind[1093]: Session 8 logged out. Waiting for processes to exit. Feb 12 19:48:36.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-146.190.157.125:22-139.178.68.195:36350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:36.025244 systemd-logind[1093]: Removed session 8. Feb 12 19:48:36.029806 kernel: audit: type=1131 audit(1707767316.014:1446): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-146.190.157.125:22-139.178.68.195:36350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:36.294680 kubelet[2029]: E0212 19:48:36.294645 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:48:39.040639 systemd[1]: run-containerd-runc-k8s.io-2223747516a29bb53dcc858bf2a2f2a8e423434175021303f17e5f74647f2136-runc.SBscgG.mount: Deactivated successfully. Feb 12 19:48:39.663584 env[1106]: time="2024-02-12T19:48:39.663521640Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:39.686614 env[1106]: time="2024-02-12T19:48:39.686543226Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:39.690251 env[1106]: time="2024-02-12T19:48:39.690166415Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:39.697098 env[1106]: time="2024-02-12T19:48:39.696988947Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:39.698635 env[1106]: time="2024-02-12T19:48:39.698473653Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 12 19:48:39.701343 env[1106]: time="2024-02-12T19:48:39.701280168Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 19:48:39.704267 env[1106]: time="2024-02-12T19:48:39.704174347Z" level=info msg="CreateContainer within sandbox \"64e0a80418095661f93d545876963b99e326d3f2850ca0428b8c9ee500efa4e6\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 19:48:39.729214 env[1106]: time="2024-02-12T19:48:39.729112525Z" level=info msg="CreateContainer within sandbox \"64e0a80418095661f93d545876963b99e326d3f2850ca0428b8c9ee500efa4e6\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"3b2dc04642cc7aab6ff9d7d5386b52869d971603da1090157e86674df60fc6ca\"" Feb 12 19:48:39.730616 env[1106]: time="2024-02-12T19:48:39.730556461Z" level=info msg="StartContainer for \"3b2dc04642cc7aab6ff9d7d5386b52869d971603da1090157e86674df60fc6ca\"" Feb 12 19:48:39.791652 systemd[1]: Started cri-containerd-3b2dc04642cc7aab6ff9d7d5386b52869d971603da1090157e86674df60fc6ca.scope. Feb 12 19:48:39.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.864763 kernel: audit: type=1400 audit(1707767319.855:1447): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.864972 kernel: audit: type=1400 audit(1707767319.855:1448): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.865021 kernel: audit: type=1400 audit(1707767319.855:1449): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.871850 kernel: audit: type=1400 audit(1707767319.855:1450): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.876940 kernel: audit: type=1400 audit(1707767319.855:1451): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.882836 kernel: audit: type=1400 audit(1707767319.855:1452): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.888017 kernel: audit: type=1400 audit(1707767319.855:1453): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.859000 audit: BPF prog-id=203 op=LOAD Feb 12 19:48:39.859000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.859000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4755 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:39.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362326463303436343263633761616236666639643764353338366235 Feb 12 19:48:39.859000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.859000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4755 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:39.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362326463303436343263633761616236666639643764353338366235 Feb 12 19:48:39.859000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.859000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.859000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.859000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.859000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.859000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.859000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.859000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.859000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.859000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.859000 audit: BPF prog-id=204 op=LOAD Feb 12 19:48:39.859000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00039ad90 items=0 ppid=4755 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:39.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362326463303436343263633761616236666639643764353338366235 Feb 12 19:48:39.862000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.862000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.862000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.862000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.862000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.862000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.862000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.862000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.862000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.862000 audit: BPF prog-id=205 op=LOAD Feb 12 19:48:39.862000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00039add8 items=0 ppid=4755 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:39.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362326463303436343263633761616236666639643764353338366235 Feb 12 19:48:39.865000 audit: BPF prog-id=205 op=UNLOAD Feb 12 19:48:39.865000 audit: BPF prog-id=204 op=UNLOAD Feb 12 19:48:39.865000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.865000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.865000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.865000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.865000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.865000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.865000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.865000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.865000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.865000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:39.865000 audit: BPF prog-id=206 op=LOAD Feb 12 19:48:39.865000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00039b1e8 items=0 ppid=4755 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:39.865000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362326463303436343263633761616236666639643764353338366235 Feb 12 19:48:39.994850 env[1106]: time="2024-02-12T19:48:39.994637529Z" level=info msg="StartContainer for \"3b2dc04642cc7aab6ff9d7d5386b52869d971603da1090157e86674df60fc6ca\" returns successfully" Feb 12 19:48:40.206805 env[1106]: time="2024-02-12T19:48:40.206710647Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:40.210579 env[1106]: time="2024-02-12T19:48:40.210516529Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:40.214387 env[1106]: time="2024-02-12T19:48:40.214322083Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:40.218248 env[1106]: time="2024-02-12T19:48:40.218183749Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:40.219874 env[1106]: time="2024-02-12T19:48:40.219754140Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 12 19:48:40.223698 env[1106]: time="2024-02-12T19:48:40.223636469Z" level=info msg="CreateContainer within sandbox \"9df552a268e35ce33702a1b07c2bfff97073019f5b8f07eaca7bb6f0488029be\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 19:48:40.259622 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount163622851.mount: Deactivated successfully. Feb 12 19:48:40.267074 env[1106]: time="2024-02-12T19:48:40.266999288Z" level=info msg="CreateContainer within sandbox \"9df552a268e35ce33702a1b07c2bfff97073019f5b8f07eaca7bb6f0488029be\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"9302a378c43fb4df6a97b4ca8212bf023b0cb1086d7c495c7cc0c1c40f245a8c\"" Feb 12 19:48:40.268885 env[1106]: time="2024-02-12T19:48:40.268822572Z" level=info msg="StartContainer for \"9302a378c43fb4df6a97b4ca8212bf023b0cb1086d7c495c7cc0c1c40f245a8c\"" Feb 12 19:48:40.353113 systemd[1]: Started cri-containerd-9302a378c43fb4df6a97b4ca8212bf023b0cb1086d7c495c7cc0c1c40f245a8c.scope. Feb 12 19:48:40.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.411000 audit: BPF prog-id=207 op=LOAD Feb 12 19:48:40.412000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.412000 audit[4971]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4843 pid=4971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:40.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933303261333738633433666234646636613937623463613832313262 Feb 12 19:48:40.412000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.412000 audit[4971]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4843 pid=4971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:40.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933303261333738633433666234646636613937623463613832313262 Feb 12 19:48:40.412000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.412000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.412000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.412000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.412000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.412000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.412000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.412000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.412000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.412000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.412000 audit: BPF prog-id=208 op=LOAD Feb 12 19:48:40.412000 audit[4971]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003088d0 items=0 ppid=4843 pid=4971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:40.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933303261333738633433666234646636613937623463613832313262 Feb 12 19:48:40.412000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.412000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.412000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.412000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.412000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.412000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.412000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.412000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.412000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.412000 audit: BPF prog-id=209 op=LOAD Feb 12 19:48:40.412000 audit[4971]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000308918 items=0 ppid=4843 pid=4971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:40.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933303261333738633433666234646636613937623463613832313262 Feb 12 19:48:40.412000 audit: BPF prog-id=209 op=UNLOAD Feb 12 19:48:40.412000 audit: BPF prog-id=208 op=UNLOAD Feb 12 19:48:40.412000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.412000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.412000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.412000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.412000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.412000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.412000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.412000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.412000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.412000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.412000 audit: BPF prog-id=210 op=LOAD Feb 12 19:48:40.412000 audit[4971]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000308d28 items=0 ppid=4843 pid=4971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:40.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933303261333738633433666234646636613937623463613832313262 Feb 12 19:48:40.619444 env[1106]: time="2024-02-12T19:48:40.619368208Z" level=info msg="StartContainer for \"9302a378c43fb4df6a97b4ca8212bf023b0cb1086d7c495c7cc0c1c40f245a8c\" returns successfully" Feb 12 19:48:40.779907 kubelet[2029]: I0212 19:48:40.779854 2029 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-77fb866796-j5gzw" podStartSLOduration=-9.223372026074993e+09 pod.CreationTimestamp="2024-02-12 19:48:30 +0000 UTC" firstStartedPulling="2024-02-12 19:48:33.510320498 +0000 UTC m=+63.888511387" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:48:40.77313463 +0000 UTC m=+71.151325528" watchObservedRunningTime="2024-02-12 19:48:40.77978208 +0000 UTC m=+71.157972978" Feb 12 19:48:41.020552 systemd[1]: run-containerd-runc-k8s.io-9302a378c43fb4df6a97b4ca8212bf023b0cb1086d7c495c7cc0c1c40f245a8c-runc.t1b1xy.mount: Deactivated successfully. Feb 12 19:48:41.032011 systemd[1]: Started sshd@8-146.190.157.125:22-139.178.68.195:39548.service. Feb 12 19:48:41.040047 kernel: kauditd_printk_skb: 107 callbacks suppressed Feb 12 19:48:41.040256 kernel: audit: type=1130 audit(1707767321.033:1483): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-146.190.157.125:22-139.178.68.195:39548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:41.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-146.190.157.125:22-139.178.68.195:39548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:41.138825 sshd[5014]: Accepted publickey for core from 139.178.68.195 port 39548 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:48:41.137000 audit[5014]: USER_ACCT pid=5014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:41.145115 kernel: audit: type=1101 audit(1707767321.137:1484): pid=5014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:41.144000 audit[5014]: CRED_ACQ pid=5014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:41.151899 kernel: audit: type=1103 audit(1707767321.144:1485): pid=5014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:41.153803 sshd[5014]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:41.157889 kernel: audit: type=1006 audit(1707767321.145:1486): pid=5014 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Feb 12 19:48:41.145000 audit[5014]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff50862590 a2=3 a3=0 items=0 ppid=1 pid=5014 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:41.164186 kernel: audit: type=1300 audit(1707767321.145:1486): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff50862590 a2=3 a3=0 items=0 ppid=1 pid=5014 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:41.145000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:41.168087 kernel: audit: type=1327 audit(1707767321.145:1486): proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:41.177368 systemd-logind[1093]: New session 9 of user core. Feb 12 19:48:41.180548 systemd[1]: Started session-9.scope. Feb 12 19:48:41.197973 kernel: audit: type=1105 audit(1707767321.191:1487): pid=5014 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:41.191000 audit[5014]: USER_START pid=5014 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:41.197000 audit[5025]: CRED_ACQ pid=5025 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:41.202958 kernel: audit: type=1103 audit(1707767321.197:1488): pid=5025 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:41.274000 audit[5033]: NETFILTER_CFG table=filter:139 family=2 entries=8 op=nft_register_rule pid=5033 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:41.283106 kernel: audit: type=1325 audit(1707767321.274:1489): table=filter:139 family=2 entries=8 op=nft_register_rule pid=5033 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:41.274000 audit[5033]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffceafb96b0 a2=0 a3=7ffceafb969c items=0 ppid=2189 pid=5033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:41.290821 kernel: audit: type=1300 audit(1707767321.274:1489): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffceafb96b0 a2=0 a3=7ffceafb969c items=0 ppid=2189 pid=5033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:41.274000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:41.308000 audit[5033]: NETFILTER_CFG table=nat:140 family=2 entries=78 op=nft_register_rule pid=5033 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:41.308000 audit[5033]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffceafb96b0 a2=0 a3=7ffceafb969c items=0 ppid=2189 pid=5033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:41.308000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:41.667809 sshd[5014]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:41.669000 audit[5014]: USER_END pid=5014 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:41.670000 audit[5014]: CRED_DISP pid=5014 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:41.674497 systemd-logind[1093]: Session 9 logged out. Waiting for processes to exit. Feb 12 19:48:41.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-146.190.157.125:22-139.178.68.195:39548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:41.676338 systemd[1]: sshd@8-146.190.157.125:22-139.178.68.195:39548.service: Deactivated successfully. Feb 12 19:48:41.677856 systemd[1]: session-9.scope: Deactivated successfully. Feb 12 19:48:41.681872 systemd-logind[1093]: Removed session 9. Feb 12 19:48:41.879000 audit[5065]: NETFILTER_CFG table=filter:141 family=2 entries=8 op=nft_register_rule pid=5065 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:41.879000 audit[5065]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fff81a062f0 a2=0 a3=7fff81a062dc items=0 ppid=2189 pid=5065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:41.879000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:41.883000 audit[5065]: NETFILTER_CFG table=nat:142 family=2 entries=78 op=nft_register_rule pid=5065 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:41.883000 audit[5065]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff81a062f0 a2=0 a3=7fff81a062dc items=0 ppid=2189 pid=5065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:41.883000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:42.760000 audit[4981]: AVC avc: denied { watch } for pid=4981 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_48_32.3129747315/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c293 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c95,c293 tclass=file permissive=0 Feb 12 19:48:42.760000 audit[4981]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e8bfa0 a2=fc6 a3=0 items=0 ppid=4843 pid=4981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c293 key=(null) Feb 12 19:48:42.760000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:48:42.821000 audit[4946]: AVC avc: denied { watch } for pid=4946 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_48_32.3403967118/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c122 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c51,c122 tclass=file permissive=0 Feb 12 19:48:42.821000 audit[4946]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000dcc9e0 a2=fc6 a3=0 items=0 ppid=4755 pid=4946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c122 key=(null) Feb 12 19:48:42.821000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:48:46.689483 kernel: kauditd_printk_skb: 19 callbacks suppressed Feb 12 19:48:46.689776 kernel: audit: type=1130 audit(1707767326.686:1498): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-146.190.157.125:22-139.178.68.195:41040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:46.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-146.190.157.125:22-139.178.68.195:41040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:46.686992 systemd[1]: Started sshd@9-146.190.157.125:22-139.178.68.195:41040.service. Feb 12 19:48:46.785000 audit[5081]: USER_ACCT pid=5081 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:46.786930 sshd[5081]: Accepted publickey for core from 139.178.68.195 port 41040 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:48:46.790801 kernel: audit: type=1101 audit(1707767326.785:1499): pid=5081 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:46.790000 audit[5081]: CRED_ACQ pid=5081 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:46.798225 kernel: audit: type=1103 audit(1707767326.790:1500): pid=5081 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:46.798450 kernel: audit: type=1006 audit(1707767326.790:1501): pid=5081 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 12 19:48:46.798515 kernel: audit: type=1300 audit(1707767326.790:1501): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2d8d2380 a2=3 a3=0 items=0 ppid=1 pid=5081 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:46.790000 audit[5081]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2d8d2380 a2=3 a3=0 items=0 ppid=1 pid=5081 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:46.799318 sshd[5081]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:46.790000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:46.809025 kernel: audit: type=1327 audit(1707767326.790:1501): proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:46.818363 systemd[1]: Started session-10.scope. Feb 12 19:48:46.822937 systemd-logind[1093]: New session 10 of user core. Feb 12 19:48:46.836000 audit[5081]: USER_START pid=5081 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:46.841868 kernel: audit: type=1105 audit(1707767326.836:1502): pid=5081 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:46.845000 audit[5083]: CRED_ACQ pid=5083 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:46.851668 kernel: audit: type=1103 audit(1707767326.845:1503): pid=5083 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:47.097304 sshd[5081]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:47.098000 audit[5081]: USER_END pid=5081 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:47.103122 systemd-logind[1093]: Session 10 logged out. Waiting for processes to exit. Feb 12 19:48:47.099000 audit[5081]: CRED_DISP pid=5081 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:47.107913 kernel: audit: type=1106 audit(1707767327.098:1504): pid=5081 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:47.108025 kernel: audit: type=1104 audit(1707767327.099:1505): pid=5081 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:47.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-146.190.157.125:22-139.178.68.195:41040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:47.105765 systemd[1]: sshd@9-146.190.157.125:22-139.178.68.195:41040.service: Deactivated successfully. Feb 12 19:48:47.107042 systemd[1]: session-10.scope: Deactivated successfully. Feb 12 19:48:47.110549 systemd-logind[1093]: Removed session 10. Feb 12 19:48:52.104909 systemd[1]: Started sshd@10-146.190.157.125:22-139.178.68.195:41046.service. Feb 12 19:48:52.110123 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:48:52.110187 kernel: audit: type=1130 audit(1707767332.104:1507): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-146.190.157.125:22-139.178.68.195:41046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:52.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-146.190.157.125:22-139.178.68.195:41046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:52.180000 audit[5115]: USER_ACCT pid=5115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:52.185299 sshd[5115]: Accepted publickey for core from 139.178.68.195 port 41046 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:48:52.185839 kernel: audit: type=1101 audit(1707767332.180:1508): pid=5115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:52.186000 audit[5115]: CRED_ACQ pid=5115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:52.192235 kernel: audit: type=1103 audit(1707767332.186:1509): pid=5115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:52.192608 sshd[5115]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:52.186000 audit[5115]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9d91ef30 a2=3 a3=0 items=0 ppid=1 pid=5115 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:52.199471 kernel: audit: type=1006 audit(1707767332.186:1510): pid=5115 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 12 19:48:52.199640 kernel: audit: type=1300 audit(1707767332.186:1510): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9d91ef30 a2=3 a3=0 items=0 ppid=1 pid=5115 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:52.186000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:52.203613 kernel: audit: type=1327 audit(1707767332.186:1510): proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:52.205430 systemd[1]: Started session-11.scope. Feb 12 19:48:52.207326 systemd-logind[1093]: New session 11 of user core. Feb 12 19:48:52.217000 audit[5115]: USER_START pid=5115 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:52.223880 kernel: audit: type=1105 audit(1707767332.217:1511): pid=5115 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:52.219000 audit[5117]: CRED_ACQ pid=5117 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:52.227841 kernel: audit: type=1103 audit(1707767332.219:1512): pid=5117 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:52.289814 kubelet[2029]: E0212 19:48:52.289775 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:48:52.480361 sshd[5115]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:52.486000 audit[5115]: USER_END pid=5115 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:52.493652 systemd[1]: Started sshd@11-146.190.157.125:22-139.178.68.195:41050.service. Feb 12 19:48:52.495176 systemd[1]: sshd@10-146.190.157.125:22-139.178.68.195:41046.service: Deactivated successfully. Feb 12 19:48:52.498556 systemd-logind[1093]: Session 11 logged out. Waiting for processes to exit. Feb 12 19:48:52.503838 kernel: audit: type=1106 audit(1707767332.486:1513): pid=5115 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:52.504481 systemd[1]: session-11.scope: Deactivated successfully. Feb 12 19:48:52.487000 audit[5115]: CRED_DISP pid=5115 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:52.507513 systemd-logind[1093]: Removed session 11. Feb 12 19:48:52.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-146.190.157.125:22-139.178.68.195:41050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:52.510504 kernel: audit: type=1104 audit(1707767332.487:1514): pid=5115 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:52.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-146.190.157.125:22-139.178.68.195:41046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:52.583000 audit[5132]: USER_ACCT pid=5132 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:52.584887 sshd[5132]: Accepted publickey for core from 139.178.68.195 port 41050 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:48:52.585000 audit[5132]: CRED_ACQ pid=5132 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:52.586000 audit[5132]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0c347f20 a2=3 a3=0 items=0 ppid=1 pid=5132 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:52.586000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:52.588425 sshd[5132]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:52.600646 systemd[1]: Started session-12.scope. Feb 12 19:48:52.602960 systemd-logind[1093]: New session 12 of user core. Feb 12 19:48:52.611000 audit[5132]: USER_START pid=5132 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:52.614000 audit[5135]: CRED_ACQ pid=5135 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:54.379219 sshd[5132]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:54.385000 audit[5132]: USER_END pid=5132 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:54.386000 audit[5132]: CRED_DISP pid=5132 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:54.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-146.190.157.125:22-139.178.68.195:41060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:54.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-146.190.157.125:22-139.178.68.195:41050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:54.390876 systemd[1]: Started sshd@12-146.190.157.125:22-139.178.68.195:41060.service. Feb 12 19:48:54.391654 systemd[1]: sshd@11-146.190.157.125:22-139.178.68.195:41050.service: Deactivated successfully. Feb 12 19:48:54.397233 systemd[1]: session-12.scope: Deactivated successfully. Feb 12 19:48:54.399500 systemd-logind[1093]: Session 12 logged out. Waiting for processes to exit. Feb 12 19:48:54.403041 systemd-logind[1093]: Removed session 12. Feb 12 19:48:54.458000 audit[5146]: USER_ACCT pid=5146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:54.459616 sshd[5146]: Accepted publickey for core from 139.178.68.195 port 41060 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:48:54.461000 audit[5146]: CRED_ACQ pid=5146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:54.461000 audit[5146]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc32018060 a2=3 a3=0 items=0 ppid=1 pid=5146 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:54.461000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:54.464317 sshd[5146]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:54.476531 systemd-logind[1093]: New session 13 of user core. Feb 12 19:48:54.477776 systemd[1]: Started session-13.scope. Feb 12 19:48:54.486000 audit[5146]: USER_START pid=5146 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:54.489000 audit[5149]: CRED_ACQ pid=5149 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:54.803301 sshd[5146]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:54.805000 audit[5146]: USER_END pid=5146 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:54.806000 audit[5146]: CRED_DISP pid=5146 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:54.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-146.190.157.125:22-139.178.68.195:41060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:54.810148 systemd[1]: sshd@12-146.190.157.125:22-139.178.68.195:41060.service: Deactivated successfully. Feb 12 19:48:54.811333 systemd[1]: session-13.scope: Deactivated successfully. Feb 12 19:48:54.812224 systemd-logind[1093]: Session 13 logged out. Waiting for processes to exit. Feb 12 19:48:54.814663 systemd-logind[1093]: Removed session 13. Feb 12 19:48:56.289508 kubelet[2029]: E0212 19:48:56.289450 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:48:57.689595 systemd[1]: run-containerd-runc-k8s.io-b875817a6138008d50cef1b46ca8b3a8517ed48ccd9cae3df843a4247a92b868-runc.4yWhds.mount: Deactivated successfully. Feb 12 19:48:59.816664 systemd[1]: Started sshd@13-146.190.157.125:22-139.178.68.195:50040.service. Feb 12 19:48:59.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-146.190.157.125:22-139.178.68.195:50040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:59.819136 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 12 19:48:59.824813 kernel: audit: type=1130 audit(1707767339.817:1534): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-146.190.157.125:22-139.178.68.195:50040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:59.908000 audit[5184]: USER_ACCT pid=5184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:59.913590 sshd[5184]: Accepted publickey for core from 139.178.68.195 port 50040 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:48:59.914709 kernel: audit: type=1101 audit(1707767339.908:1535): pid=5184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:59.916000 audit[5184]: CRED_ACQ pid=5184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:59.921936 kernel: audit: type=1103 audit(1707767339.916:1536): pid=5184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:59.925155 kernel: audit: type=1006 audit(1707767339.921:1537): pid=5184 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Feb 12 19:48:59.925265 kernel: audit: type=1300 audit(1707767339.921:1537): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc49bf0470 a2=3 a3=0 items=0 ppid=1 pid=5184 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:59.921000 audit[5184]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc49bf0470 a2=3 a3=0 items=0 ppid=1 pid=5184 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:59.921000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:59.929895 sshd[5184]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:59.931319 kernel: audit: type=1327 audit(1707767339.921:1537): proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:59.938867 systemd-logind[1093]: New session 14 of user core. Feb 12 19:48:59.941125 systemd[1]: Started session-14.scope. Feb 12 19:48:59.952000 audit[5184]: USER_START pid=5184 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:59.959873 kernel: audit: type=1105 audit(1707767339.952:1538): pid=5184 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:59.959000 audit[5186]: CRED_ACQ pid=5186 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:48:59.964947 kernel: audit: type=1103 audit(1707767339.959:1539): pid=5186 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:00.299123 sshd[5184]: pam_unix(sshd:session): session closed for user core Feb 12 19:49:00.302000 audit[5184]: USER_END pid=5184 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:00.310817 kernel: audit: type=1106 audit(1707767340.302:1540): pid=5184 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:00.310291 systemd[1]: sshd@13-146.190.157.125:22-139.178.68.195:50040.service: Deactivated successfully. Feb 12 19:49:00.312900 systemd[1]: session-14.scope: Deactivated successfully. Feb 12 19:49:00.302000 audit[5184]: CRED_DISP pid=5184 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:00.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-146.190.157.125:22-139.178.68.195:50040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:00.319912 kernel: audit: type=1104 audit(1707767340.302:1541): pid=5184 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:00.320809 systemd-logind[1093]: Session 14 logged out. Waiting for processes to exit. Feb 12 19:49:00.323077 systemd-logind[1093]: Removed session 14. Feb 12 19:49:02.910297 systemd[1]: run-containerd-runc-k8s.io-3b2dc04642cc7aab6ff9d7d5386b52869d971603da1090157e86674df60fc6ca-runc.FzbwFy.mount: Deactivated successfully. Feb 12 19:49:03.004131 kubelet[2029]: I0212 19:49:03.004023 2029 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-77fb866796-q7qfv" podStartSLOduration=-9.223372003850815e+09 pod.CreationTimestamp="2024-02-12 19:48:30 +0000 UTC" firstStartedPulling="2024-02-12 19:48:33.875908021 +0000 UTC m=+64.254098895" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:48:40.817947294 +0000 UTC m=+71.196138232" watchObservedRunningTime="2024-02-12 19:49:03.003960515 +0000 UTC m=+93.382151413" Feb 12 19:49:03.193947 systemd[1]: run-containerd-runc-k8s.io-9302a378c43fb4df6a97b4ca8212bf023b0cb1086d7c495c7cc0c1c40f245a8c-runc.8RyZzh.mount: Deactivated successfully. Feb 12 19:49:03.196000 audit[5255]: NETFILTER_CFG table=filter:143 family=2 entries=7 op=nft_register_rule pid=5255 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:49:03.196000 audit[5255]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffddf09cac0 a2=0 a3=7ffddf09caac items=0 ppid=2189 pid=5255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:03.196000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:49:03.204000 audit[5255]: NETFILTER_CFG table=nat:144 family=2 entries=85 op=nft_register_chain pid=5255 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:49:03.204000 audit[5255]: SYSCALL arch=c000003e syscall=46 success=yes exit=28484 a0=3 a1=7ffddf09cac0 a2=0 a3=7ffddf09caac items=0 ppid=2189 pid=5255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:03.204000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:49:03.495000 audit[5293]: NETFILTER_CFG table=filter:145 family=2 entries=6 op=nft_register_rule pid=5293 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:49:03.495000 audit[5293]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffc7c0939a0 a2=0 a3=7ffc7c09398c items=0 ppid=2189 pid=5293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:03.495000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:49:03.501000 audit[5293]: NETFILTER_CFG table=nat:146 family=2 entries=92 op=nft_register_chain pid=5293 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:49:03.501000 audit[5293]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7ffc7c0939a0 a2=0 a3=7ffc7c09398c items=0 ppid=2189 pid=5293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:03.501000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:49:05.307561 systemd[1]: Started sshd@14-146.190.157.125:22-139.178.68.195:50044.service. Feb 12 19:49:05.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-146.190.157.125:22-139.178.68.195:50044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:05.312562 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 12 19:49:05.313054 kernel: audit: type=1130 audit(1707767345.307:1547): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-146.190.157.125:22-139.178.68.195:50044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:05.384000 audit[5297]: USER_ACCT pid=5297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:05.388969 sshd[5297]: Accepted publickey for core from 139.178.68.195 port 50044 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:49:05.388000 audit[5297]: CRED_ACQ pid=5297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:05.393627 kernel: audit: type=1101 audit(1707767345.384:1548): pid=5297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:05.393716 kernel: audit: type=1103 audit(1707767345.388:1549): pid=5297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:05.390467 sshd[5297]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:49:05.389000 audit[5297]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc1bfa530 a2=3 a3=0 items=0 ppid=1 pid=5297 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:05.400527 kernel: audit: type=1006 audit(1707767345.389:1550): pid=5297 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 12 19:49:05.400785 kernel: audit: type=1300 audit(1707767345.389:1550): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc1bfa530 a2=3 a3=0 items=0 ppid=1 pid=5297 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:05.389000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:05.403812 kernel: audit: type=1327 audit(1707767345.389:1550): proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:05.406401 systemd[1]: Started session-15.scope. Feb 12 19:49:05.408398 systemd-logind[1093]: New session 15 of user core. Feb 12 19:49:05.414000 audit[5297]: USER_START pid=5297 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:05.417000 audit[5299]: CRED_ACQ pid=5299 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:05.423440 kernel: audit: type=1105 audit(1707767345.414:1551): pid=5297 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:05.423590 kernel: audit: type=1103 audit(1707767345.417:1552): pid=5299 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:05.635421 sshd[5297]: pam_unix(sshd:session): session closed for user core Feb 12 19:49:05.636000 audit[5297]: USER_END pid=5297 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:05.641943 kernel: audit: type=1106 audit(1707767345.636:1553): pid=5297 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:05.646598 kernel: audit: type=1104 audit(1707767345.636:1554): pid=5297 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:05.636000 audit[5297]: CRED_DISP pid=5297 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:05.640015 systemd[1]: sshd@14-146.190.157.125:22-139.178.68.195:50044.service: Deactivated successfully. Feb 12 19:49:05.641487 systemd[1]: session-15.scope: Deactivated successfully. Feb 12 19:49:05.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-146.190.157.125:22-139.178.68.195:50044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:05.648582 systemd-logind[1093]: Session 15 logged out. Waiting for processes to exit. Feb 12 19:49:05.650262 systemd-logind[1093]: Removed session 15. Feb 12 19:49:06.289017 kubelet[2029]: E0212 19:49:06.288974 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:49:08.971452 systemd[1]: run-containerd-runc-k8s.io-2223747516a29bb53dcc858bf2a2f2a8e423434175021303f17e5f74647f2136-runc.oaWo3G.mount: Deactivated successfully. Feb 12 19:49:10.647831 systemd[1]: Started sshd@15-146.190.157.125:22-139.178.68.195:60260.service. Feb 12 19:49:10.651365 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:49:10.651507 kernel: audit: type=1130 audit(1707767350.648:1556): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-146.190.157.125:22-139.178.68.195:60260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:10.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-146.190.157.125:22-139.178.68.195:60260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:10.746000 audit[5328]: USER_ACCT pid=5328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:10.747279 sshd[5328]: Accepted publickey for core from 139.178.68.195 port 60260 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:49:10.751933 kernel: audit: type=1101 audit(1707767350.746:1557): pid=5328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:10.754000 audit[5328]: CRED_ACQ pid=5328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:10.763307 kernel: audit: type=1103 audit(1707767350.754:1558): pid=5328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:10.763472 kernel: audit: type=1006 audit(1707767350.755:1559): pid=5328 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 12 19:49:10.755000 audit[5328]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe71e46970 a2=3 a3=0 items=0 ppid=1 pid=5328 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:10.768769 kernel: audit: type=1300 audit(1707767350.755:1559): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe71e46970 a2=3 a3=0 items=0 ppid=1 pid=5328 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:10.768909 kernel: audit: type=1327 audit(1707767350.755:1559): proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:10.755000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:10.771328 sshd[5328]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:49:10.781366 systemd[1]: Started session-16.scope. Feb 12 19:49:10.782333 systemd-logind[1093]: New session 16 of user core. Feb 12 19:49:10.789000 audit[5328]: USER_START pid=5328 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:10.792000 audit[5330]: CRED_ACQ pid=5330 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:10.798883 kernel: audit: type=1105 audit(1707767350.789:1560): pid=5328 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:10.799050 kernel: audit: type=1103 audit(1707767350.792:1561): pid=5330 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:10.965140 sshd[5328]: pam_unix(sshd:session): session closed for user core Feb 12 19:49:10.965000 audit[5328]: USER_END pid=5328 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:10.969000 audit[5328]: CRED_DISP pid=5328 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:10.975848 kernel: audit: type=1106 audit(1707767350.965:1562): pid=5328 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:10.976120 kernel: audit: type=1104 audit(1707767350.969:1563): pid=5328 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:10.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-146.190.157.125:22-139.178.68.195:60260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:10.973572 systemd[1]: sshd@15-146.190.157.125:22-139.178.68.195:60260.service: Deactivated successfully. Feb 12 19:49:10.974988 systemd[1]: session-16.scope: Deactivated successfully. Feb 12 19:49:10.977306 systemd-logind[1093]: Session 16 logged out. Waiting for processes to exit. Feb 12 19:49:10.980601 systemd-logind[1093]: Removed session 16. Feb 12 19:49:15.975817 systemd[1]: Started sshd@16-146.190.157.125:22-139.178.68.195:60274.service. Feb 12 19:49:15.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-146.190.157.125:22-139.178.68.195:60274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:15.977279 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:49:15.977366 kernel: audit: type=1130 audit(1707767355.975:1565): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-146.190.157.125:22-139.178.68.195:60274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:16.037000 audit[5344]: USER_ACCT pid=5344 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:16.039150 sshd[5344]: Accepted publickey for core from 139.178.68.195 port 60274 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:49:16.043817 kernel: audit: type=1101 audit(1707767356.037:1566): pid=5344 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:16.043000 audit[5344]: CRED_ACQ pid=5344 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:16.045300 sshd[5344]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:49:16.048764 kernel: audit: type=1103 audit(1707767356.043:1567): pid=5344 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:16.048890 kernel: audit: type=1006 audit(1707767356.044:1568): pid=5344 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 12 19:49:16.044000 audit[5344]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc14522700 a2=3 a3=0 items=0 ppid=1 pid=5344 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:16.054767 kernel: audit: type=1300 audit(1707767356.044:1568): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc14522700 a2=3 a3=0 items=0 ppid=1 pid=5344 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:16.044000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:16.056631 kernel: audit: type=1327 audit(1707767356.044:1568): proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:16.059529 systemd-logind[1093]: New session 17 of user core. Feb 12 19:49:16.061262 systemd[1]: Started session-17.scope. Feb 12 19:49:16.069000 audit[5344]: USER_START pid=5344 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:16.077115 kernel: audit: type=1105 audit(1707767356.069:1569): pid=5344 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:16.077302 kernel: audit: type=1103 audit(1707767356.075:1570): pid=5346 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:16.075000 audit[5346]: CRED_ACQ pid=5346 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:16.269406 sshd[5344]: pam_unix(sshd:session): session closed for user core Feb 12 19:49:16.272000 audit[5344]: USER_END pid=5344 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:16.273000 audit[5344]: CRED_DISP pid=5344 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:16.279357 systemd[1]: Started sshd@17-146.190.157.125:22-139.178.68.195:36914.service. Feb 12 19:49:16.280698 systemd[1]: sshd@16-146.190.157.125:22-139.178.68.195:60274.service: Deactivated successfully. Feb 12 19:49:16.282317 kernel: audit: type=1106 audit(1707767356.272:1571): pid=5344 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:16.282866 kernel: audit: type=1104 audit(1707767356.273:1572): pid=5344 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:16.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-146.190.157.125:22-139.178.68.195:36914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:16.282000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-146.190.157.125:22-139.178.68.195:60274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:16.284886 systemd[1]: session-17.scope: Deactivated successfully. Feb 12 19:49:16.290649 systemd-logind[1093]: Session 17 logged out. Waiting for processes to exit. Feb 12 19:49:16.292709 systemd-logind[1093]: Removed session 17. Feb 12 19:49:16.368000 audit[5355]: USER_ACCT pid=5355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:16.369717 sshd[5355]: Accepted publickey for core from 139.178.68.195 port 36914 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:49:16.370000 audit[5355]: CRED_ACQ pid=5355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:16.370000 audit[5355]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2546ca60 a2=3 a3=0 items=0 ppid=1 pid=5355 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:16.370000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:16.372941 sshd[5355]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:49:16.379219 systemd-logind[1093]: New session 18 of user core. Feb 12 19:49:16.379808 systemd[1]: Started session-18.scope. Feb 12 19:49:16.390000 audit[5355]: USER_START pid=5355 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:16.394000 audit[5358]: CRED_ACQ pid=5358 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:16.902707 sshd[5355]: pam_unix(sshd:session): session closed for user core Feb 12 19:49:16.904000 audit[5355]: USER_END pid=5355 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:16.904000 audit[5355]: CRED_DISP pid=5355 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:16.909131 systemd[1]: sshd@17-146.190.157.125:22-139.178.68.195:36914.service: Deactivated successfully. Feb 12 19:49:16.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-146.190.157.125:22-139.178.68.195:36914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:16.911397 systemd[1]: session-18.scope: Deactivated successfully. Feb 12 19:49:16.913470 systemd-logind[1093]: Session 18 logged out. Waiting for processes to exit. Feb 12 19:49:16.917472 systemd[1]: Started sshd@18-146.190.157.125:22-139.178.68.195:36916.service. Feb 12 19:49:16.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-146.190.157.125:22-139.178.68.195:36916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:16.922222 systemd-logind[1093]: Removed session 18. Feb 12 19:49:16.981000 audit[5366]: USER_ACCT pid=5366 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:16.982078 sshd[5366]: Accepted publickey for core from 139.178.68.195 port 36916 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:49:16.983000 audit[5366]: CRED_ACQ pid=5366 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:16.983000 audit[5366]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea7814b20 a2=3 a3=0 items=0 ppid=1 pid=5366 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:16.983000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:16.985419 sshd[5366]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:49:16.991734 systemd-logind[1093]: New session 19 of user core. Feb 12 19:49:16.993551 systemd[1]: Started session-19.scope. Feb 12 19:49:17.000000 audit[5366]: USER_START pid=5366 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:17.002000 audit[5368]: CRED_ACQ pid=5368 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:19.704215 sshd[5366]: pam_unix(sshd:session): session closed for user core Feb 12 19:49:19.706000 audit[5366]: USER_END pid=5366 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:19.706000 audit[5366]: CRED_DISP pid=5366 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:19.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-146.190.157.125:22-139.178.68.195:36916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:19.710058 systemd[1]: sshd@18-146.190.157.125:22-139.178.68.195:36916.service: Deactivated successfully. Feb 12 19:49:19.717397 systemd[1]: session-19.scope: Deactivated successfully. Feb 12 19:49:19.718946 systemd-logind[1093]: Session 19 logged out. Waiting for processes to exit. Feb 12 19:49:19.722247 systemd[1]: Started sshd@19-146.190.157.125:22-139.178.68.195:36932.service. Feb 12 19:49:19.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-146.190.157.125:22-139.178.68.195:36932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:19.727742 systemd-logind[1093]: Removed session 19. Feb 12 19:49:19.803000 audit[5389]: USER_ACCT pid=5389 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:19.804236 sshd[5389]: Accepted publickey for core from 139.178.68.195 port 36932 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:49:19.805000 audit[5389]: CRED_ACQ pid=5389 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:19.805000 audit[5389]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdefee69f0 a2=3 a3=0 items=0 ppid=1 pid=5389 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:19.805000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:19.807179 sshd[5389]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:49:19.814361 systemd-logind[1093]: New session 20 of user core. Feb 12 19:49:19.815233 systemd[1]: Started session-20.scope. Feb 12 19:49:19.822000 audit[5389]: USER_START pid=5389 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:19.825000 audit[5401]: CRED_ACQ pid=5401 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:19.877000 audit[5409]: NETFILTER_CFG table=filter:147 family=2 entries=18 op=nft_register_rule pid=5409 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:49:19.877000 audit[5409]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffdf6e65fb0 a2=0 a3=7ffdf6e65f9c items=0 ppid=2189 pid=5409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:19.877000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:49:19.881000 audit[5409]: NETFILTER_CFG table=nat:148 family=2 entries=94 op=nft_register_rule pid=5409 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:49:19.881000 audit[5409]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7ffdf6e65fb0 a2=0 a3=7ffdf6e65f9c items=0 ppid=2189 pid=5409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:19.881000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:49:19.946000 audit[5439]: NETFILTER_CFG table=filter:149 family=2 entries=30 op=nft_register_rule pid=5439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:49:19.946000 audit[5439]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7fff36222d80 a2=0 a3=7fff36222d6c items=0 ppid=2189 pid=5439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:19.946000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:49:19.949000 audit[5439]: NETFILTER_CFG table=nat:150 family=2 entries=94 op=nft_register_rule pid=5439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:49:19.949000 audit[5439]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7fff36222d80 a2=0 a3=7fff36222d6c items=0 ppid=2189 pid=5439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:19.949000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:49:20.495755 sshd[5389]: pam_unix(sshd:session): session closed for user core Feb 12 19:49:20.501000 audit[5389]: USER_END pid=5389 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:20.502000 audit[5389]: CRED_DISP pid=5389 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:20.504907 systemd[1]: Started sshd@20-146.190.157.125:22-139.178.68.195:36938.service. Feb 12 19:49:20.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-146.190.157.125:22-139.178.68.195:36938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:20.509833 systemd[1]: sshd@19-146.190.157.125:22-139.178.68.195:36932.service: Deactivated successfully. Feb 12 19:49:20.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-146.190.157.125:22-139.178.68.195:36932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:20.512925 systemd[1]: session-20.scope: Deactivated successfully. Feb 12 19:49:20.517233 systemd-logind[1093]: Session 20 logged out. Waiting for processes to exit. Feb 12 19:49:20.523141 systemd-logind[1093]: Removed session 20. Feb 12 19:49:20.584000 audit[5442]: USER_ACCT pid=5442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:20.586075 sshd[5442]: Accepted publickey for core from 139.178.68.195 port 36938 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:49:20.587000 audit[5442]: CRED_ACQ pid=5442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:20.588000 audit[5442]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec97bbc30 a2=3 a3=0 items=0 ppid=1 pid=5442 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:20.588000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:20.590269 sshd[5442]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:49:20.598646 systemd[1]: Started session-21.scope. Feb 12 19:49:20.599747 systemd-logind[1093]: New session 21 of user core. Feb 12 19:49:20.612000 audit[5442]: USER_START pid=5442 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:20.615000 audit[5445]: CRED_ACQ pid=5445 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:20.797183 sshd[5442]: pam_unix(sshd:session): session closed for user core Feb 12 19:49:20.798000 audit[5442]: USER_END pid=5442 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:20.799000 audit[5442]: CRED_DISP pid=5442 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:20.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-146.190.157.125:22-139.178.68.195:36938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:20.803516 systemd[1]: sshd@20-146.190.157.125:22-139.178.68.195:36938.service: Deactivated successfully. Feb 12 19:49:20.806180 systemd[1]: session-21.scope: Deactivated successfully. Feb 12 19:49:20.808401 systemd-logind[1093]: Session 21 logged out. Waiting for processes to exit. Feb 12 19:49:20.810576 systemd-logind[1093]: Removed session 21. Feb 12 19:49:22.194000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:22.197385 kernel: kauditd_printk_skb: 57 callbacks suppressed Feb 12 19:49:22.197535 kernel: audit: type=1400 audit(1707767362.194:1614): avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:22.194000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:22.194000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002662ea0 a2=fc6 a3=0 items=0 ppid=1727 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 key=(null) Feb 12 19:49:22.216832 kernel: audit: type=1400 audit(1707767362.194:1615): avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:22.217376 kernel: audit: type=1300 audit(1707767362.194:1614): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002662ea0 a2=fc6 a3=0 items=0 ppid=1727 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 key=(null) Feb 12 19:49:22.217445 kernel: audit: type=1327 audit(1707767362.194:1614): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:49:22.194000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:49:22.194000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0029e8db0 a2=fc6 a3=0 items=0 ppid=1727 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 key=(null) Feb 12 19:49:22.227468 kernel: audit: type=1300 audit(1707767362.194:1615): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0029e8db0 a2=fc6 a3=0 items=0 ppid=1727 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 key=(null) Feb 12 19:49:22.227657 kernel: audit: type=1327 audit(1707767362.194:1615): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:49:22.194000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:49:25.062000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:25.064000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:25.072770 kernel: audit: type=1400 audit(1707767365.062:1616): avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:25.073016 kernel: audit: type=1400 audit(1707767365.064:1617): avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:25.064000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7d a1=c0083fe870 a2=fc6 a3=0 items=0 ppid=1741 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 key=(null) Feb 12 19:49:25.064000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135372E313235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F Feb 12 19:49:25.084324 kernel: audit: type=1300 audit(1707767365.064:1617): arch=c000003e syscall=254 success=no exit=-13 a0=7d a1=c0083fe870 a2=fc6 a3=0 items=0 ppid=1741 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 key=(null) Feb 12 19:49:25.084522 kernel: audit: type=1327 audit(1707767365.064:1617): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135372E313235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F Feb 12 19:49:25.066000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:25.066000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7d a1=c0083fe8a0 a2=fc6 a3=0 items=0 ppid=1741 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 key=(null) Feb 12 19:49:25.066000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135372E313235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F Feb 12 19:49:25.066000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:25.066000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7d a1=c0088cdb00 a2=fc6 a3=0 items=0 ppid=1741 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 key=(null) Feb 12 19:49:25.066000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135372E313235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F Feb 12 19:49:25.067000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:25.067000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7e a1=c0083fe9c0 a2=fc6 a3=0 items=0 ppid=1741 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 key=(null) Feb 12 19:49:25.067000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135372E313235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F Feb 12 19:49:25.062000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c0083fe7e0 a2=fc6 a3=0 items=0 ppid=1741 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 key=(null) Feb 12 19:49:25.062000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135372E313235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F Feb 12 19:49:25.072000 audit[1879]: AVC avc: denied { watch } for pid=1879 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:25.072000 audit[1879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c008c83660 a2=fc6 a3=0 items=0 ppid=1741 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c445 key=(null) Feb 12 19:49:25.072000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134362E3139302E3135372E313235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F Feb 12 19:49:25.808007 systemd[1]: Started sshd@21-146.190.157.125:22-139.178.68.195:36948.service. Feb 12 19:49:25.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-146.190.157.125:22-139.178.68.195:36948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:25.868000 audit[5456]: USER_ACCT pid=5456 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:25.870267 sshd[5456]: Accepted publickey for core from 139.178.68.195 port 36948 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:49:25.871000 audit[5456]: CRED_ACQ pid=5456 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:25.871000 audit[5456]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5a272900 a2=3 a3=0 items=0 ppid=1 pid=5456 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:25.871000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:25.874640 sshd[5456]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:49:25.887315 systemd[1]: Started session-22.scope. Feb 12 19:49:25.888112 systemd-logind[1093]: New session 22 of user core. Feb 12 19:49:25.894000 audit[5456]: USER_START pid=5456 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:25.897000 audit[5458]: CRED_ACQ pid=5458 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:26.058861 sshd[5456]: pam_unix(sshd:session): session closed for user core Feb 12 19:49:26.061000 audit[5456]: USER_END pid=5456 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:26.061000 audit[5456]: CRED_DISP pid=5456 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:26.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-146.190.157.125:22-139.178.68.195:36948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:26.065813 systemd[1]: sshd@21-146.190.157.125:22-139.178.68.195:36948.service: Deactivated successfully. Feb 12 19:49:26.066858 systemd[1]: session-22.scope: Deactivated successfully. Feb 12 19:49:26.067828 systemd-logind[1093]: Session 22 logged out. Waiting for processes to exit. Feb 12 19:49:26.070292 systemd-logind[1093]: Removed session 22. Feb 12 19:49:26.604000 audit[5492]: NETFILTER_CFG table=filter:151 family=2 entries=18 op=nft_register_rule pid=5492 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:49:26.604000 audit[5492]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fffa64e66c0 a2=0 a3=7fffa64e66ac items=0 ppid=2189 pid=5492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:26.604000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:49:26.612000 audit[5492]: NETFILTER_CFG table=nat:152 family=2 entries=178 op=nft_register_chain pid=5492 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:49:26.612000 audit[5492]: SYSCALL arch=c000003e syscall=46 success=yes exit=72324 a0=3 a1=7fffa64e66c0 a2=0 a3=7fffa64e66ac items=0 ppid=2189 pid=5492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:26.612000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:49:29.593844 kernel: kauditd_printk_skb: 31 callbacks suppressed Feb 12 19:49:29.594070 kernel: audit: type=1400 audit(1707767369.585:1633): avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:29.585000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:29.585000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002b28a80 a2=fc6 a3=0 items=0 ppid=1727 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 key=(null) Feb 12 19:49:29.604935 kernel: audit: type=1300 audit(1707767369.585:1633): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002b28a80 a2=fc6 a3=0 items=0 ppid=1727 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 key=(null) Feb 12 19:49:29.585000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:49:29.613778 kernel: audit: type=1327 audit(1707767369.585:1633): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:49:29.614000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:29.622775 kernel: audit: type=1400 audit(1707767369.614:1634): avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:29.622992 kernel: audit: type=1300 audit(1707767369.614:1634): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002e95600 a2=fc6 a3=0 items=0 ppid=1727 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 key=(null) Feb 12 19:49:29.614000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002e95600 a2=fc6 a3=0 items=0 ppid=1727 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 key=(null) Feb 12 19:49:29.642028 kernel: audit: type=1327 audit(1707767369.614:1634): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:49:29.614000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:49:29.656193 kernel: audit: type=1400 audit(1707767369.616:1635): avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:29.656412 kernel: audit: type=1300 audit(1707767369.616:1635): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002b28ba0 a2=fc6 a3=0 items=0 ppid=1727 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 key=(null) Feb 12 19:49:29.616000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:29.616000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002b28ba0 a2=fc6 a3=0 items=0 ppid=1727 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 key=(null) Feb 12 19:49:29.616000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:49:29.619000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:29.672239 kernel: audit: type=1327 audit(1707767369.616:1635): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:49:29.672693 kernel: audit: type=1400 audit(1707767369.619:1636): avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:29.619000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002b28dc0 a2=fc6 a3=0 items=0 ppid=1727 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c681 key=(null) Feb 12 19:49:29.619000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:49:31.068088 systemd[1]: Started sshd@22-146.190.157.125:22-139.178.68.195:45350.service. Feb 12 19:49:31.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-146.190.157.125:22-139.178.68.195:45350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:31.124000 audit[5518]: USER_ACCT pid=5518 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:31.125405 sshd[5518]: Accepted publickey for core from 139.178.68.195 port 45350 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:49:31.126000 audit[5518]: CRED_ACQ pid=5518 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:31.126000 audit[5518]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc96ee1430 a2=3 a3=0 items=0 ppid=1 pid=5518 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:31.126000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:31.128069 sshd[5518]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:49:31.134746 systemd-logind[1093]: New session 23 of user core. Feb 12 19:49:31.135552 systemd[1]: Started session-23.scope. Feb 12 19:49:31.142000 audit[5518]: USER_START pid=5518 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:31.144000 audit[5520]: CRED_ACQ pid=5520 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:31.308575 sshd[5518]: pam_unix(sshd:session): session closed for user core Feb 12 19:49:31.309000 audit[5518]: USER_END pid=5518 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:31.309000 audit[5518]: CRED_DISP pid=5518 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:31.312201 systemd-logind[1093]: Session 23 logged out. Waiting for processes to exit. Feb 12 19:49:31.312502 systemd[1]: sshd@22-146.190.157.125:22-139.178.68.195:45350.service: Deactivated successfully. Feb 12 19:49:31.313554 systemd[1]: session-23.scope: Deactivated successfully. Feb 12 19:49:31.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-146.190.157.125:22-139.178.68.195:45350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:31.314890 systemd-logind[1093]: Removed session 23. Feb 12 19:49:33.179150 systemd[1]: run-containerd-runc-k8s.io-9302a378c43fb4df6a97b4ca8212bf023b0cb1086d7c495c7cc0c1c40f245a8c-runc.EFnHX4.mount: Deactivated successfully. Feb 12 19:49:33.289029 kubelet[2029]: E0212 19:49:33.288960 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:49:36.289421 kubelet[2029]: E0212 19:49:36.289375 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:49:36.321806 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 12 19:49:36.321945 kernel: audit: type=1130 audit(1707767376.317:1646): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-146.190.157.125:22-139.178.68.195:43474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:36.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-146.190.157.125:22-139.178.68.195:43474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:36.317846 systemd[1]: Started sshd@23-146.190.157.125:22-139.178.68.195:43474.service. Feb 12 19:49:36.373000 audit[5570]: USER_ACCT pid=5570 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:36.374291 sshd[5570]: Accepted publickey for core from 139.178.68.195 port 43474 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:49:36.378811 kernel: audit: type=1101 audit(1707767376.373:1647): pid=5570 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:36.379000 audit[5570]: CRED_ACQ pid=5570 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:36.380619 sshd[5570]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:49:36.385421 kernel: audit: type=1103 audit(1707767376.379:1648): pid=5570 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:36.385589 kernel: audit: type=1006 audit(1707767376.379:1649): pid=5570 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 12 19:49:36.379000 audit[5570]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc593fcf50 a2=3 a3=0 items=0 ppid=1 pid=5570 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:36.379000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:36.391894 kernel: audit: type=1300 audit(1707767376.379:1649): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc593fcf50 a2=3 a3=0 items=0 ppid=1 pid=5570 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:36.391989 kernel: audit: type=1327 audit(1707767376.379:1649): proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:36.395389 systemd-logind[1093]: New session 24 of user core. Feb 12 19:49:36.396128 systemd[1]: Started session-24.scope. Feb 12 19:49:36.402000 audit[5570]: USER_START pid=5570 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:36.408707 kernel: audit: type=1105 audit(1707767376.402:1650): pid=5570 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:36.408848 kernel: audit: type=1103 audit(1707767376.407:1651): pid=5572 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:36.407000 audit[5572]: CRED_ACQ pid=5572 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:36.555023 sshd[5570]: pam_unix(sshd:session): session closed for user core Feb 12 19:49:36.556000 audit[5570]: USER_END pid=5570 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:36.564803 kernel: audit: type=1106 audit(1707767376.556:1652): pid=5570 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:36.565281 systemd[1]: sshd@23-146.190.157.125:22-139.178.68.195:43474.service: Deactivated successfully. Feb 12 19:49:36.567486 systemd[1]: session-24.scope: Deactivated successfully. Feb 12 19:49:36.568961 systemd-logind[1093]: Session 24 logged out. Waiting for processes to exit. Feb 12 19:49:36.556000 audit[5570]: CRED_DISP pid=5570 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:36.577854 kernel: audit: type=1104 audit(1707767376.556:1653): pid=5570 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:36.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-146.190.157.125:22-139.178.68.195:43474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:36.577662 systemd-logind[1093]: Removed session 24. Feb 12 19:49:38.289386 kubelet[2029]: E0212 19:49:38.289341 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:49:41.563761 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:49:41.563957 kernel: audit: type=1130 audit(1707767381.561:1655): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-146.190.157.125:22-139.178.68.195:43490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:41.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-146.190.157.125:22-139.178.68.195:43490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:41.562098 systemd[1]: Started sshd@24-146.190.157.125:22-139.178.68.195:43490.service. Feb 12 19:49:41.618000 audit[5602]: USER_ACCT pid=5602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:41.619495 sshd[5602]: Accepted publickey for core from 139.178.68.195 port 43490 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:49:41.623000 audit[5602]: CRED_ACQ pid=5602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:41.624955 sshd[5602]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:49:41.630472 kernel: audit: type=1101 audit(1707767381.618:1656): pid=5602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:41.630599 kernel: audit: type=1103 audit(1707767381.623:1657): pid=5602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:41.633077 systemd[1]: Started session-25.scope. Feb 12 19:49:41.635508 kernel: audit: type=1006 audit(1707767381.623:1658): pid=5602 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 12 19:49:41.635651 kernel: audit: type=1300 audit(1707767381.623:1658): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb496a1a0 a2=3 a3=0 items=0 ppid=1 pid=5602 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:41.623000 audit[5602]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb496a1a0 a2=3 a3=0 items=0 ppid=1 pid=5602 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:41.635908 systemd-logind[1093]: New session 25 of user core. Feb 12 19:49:41.623000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:41.641913 kernel: audit: type=1327 audit(1707767381.623:1658): proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:41.642000 audit[5602]: USER_START pid=5602 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:41.649849 kernel: audit: type=1105 audit(1707767381.642:1659): pid=5602 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:41.650000 audit[5604]: CRED_ACQ pid=5604 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:41.656813 kernel: audit: type=1103 audit(1707767381.650:1660): pid=5604 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:41.818026 sshd[5602]: pam_unix(sshd:session): session closed for user core Feb 12 19:49:41.819000 audit[5602]: USER_END pid=5602 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:41.825821 kernel: audit: type=1106 audit(1707767381.819:1661): pid=5602 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:41.819000 audit[5602]: CRED_DISP pid=5602 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:41.828743 systemd-logind[1093]: Session 25 logged out. Waiting for processes to exit. Feb 12 19:49:41.832959 kernel: audit: type=1104 audit(1707767381.819:1662): pid=5602 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:41.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-146.190.157.125:22-139.178.68.195:43490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:41.830899 systemd[1]: sshd@24-146.190.157.125:22-139.178.68.195:43490.service: Deactivated successfully. Feb 12 19:49:41.832181 systemd[1]: session-25.scope: Deactivated successfully. Feb 12 19:49:41.835539 systemd-logind[1093]: Removed session 25. Feb 12 19:49:42.761000 audit[4981]: AVC avc: denied { watch } for pid=4981 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_48_32.3129747315/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c293 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c95,c293 tclass=file permissive=0 Feb 12 19:49:42.761000 audit[4981]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0009deae0 a2=fc6 a3=0 items=0 ppid=4843 pid=4981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c293 key=(null) Feb 12 19:49:42.761000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:49:42.825000 audit[4946]: AVC avc: denied { watch } for pid=4946 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_48_32.3403967118/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c51,c122 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c51,c122 tclass=file permissive=0 Feb 12 19:49:42.825000 audit[4946]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0018a3420 a2=fc6 a3=0 items=0 ppid=4755 pid=4946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c51,c122 key=(null) Feb 12 19:49:42.825000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:49:46.845669 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 12 19:49:46.845967 kernel: audit: type=1130 audit(1707767386.839:1666): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-146.190.157.125:22-139.178.68.195:50460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:46.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-146.190.157.125:22-139.178.68.195:50460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:46.840079 systemd[1]: Started sshd@25-146.190.157.125:22-139.178.68.195:50460.service. Feb 12 19:49:46.909000 audit[5622]: USER_ACCT pid=5622 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:46.917028 kernel: audit: type=1101 audit(1707767386.909:1667): pid=5622 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:46.917108 sshd[5622]: Accepted publickey for core from 139.178.68.195 port 50460 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:49:46.917528 sshd[5622]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:49:46.915000 audit[5622]: CRED_ACQ pid=5622 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:46.932613 kernel: audit: type=1103 audit(1707767386.915:1668): pid=5622 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:46.932827 kernel: audit: type=1006 audit(1707767386.916:1669): pid=5622 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 12 19:49:46.932871 kernel: audit: type=1300 audit(1707767386.916:1669): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee942b070 a2=3 a3=0 items=0 ppid=1 pid=5622 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:46.916000 audit[5622]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee942b070 a2=3 a3=0 items=0 ppid=1 pid=5622 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:46.916000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:46.944875 kernel: audit: type=1327 audit(1707767386.916:1669): proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:46.950959 systemd-logind[1093]: New session 26 of user core. Feb 12 19:49:46.952441 systemd[1]: Started session-26.scope. Feb 12 19:49:46.963000 audit[5622]: USER_START pid=5622 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:46.971023 kernel: audit: type=1105 audit(1707767386.963:1670): pid=5622 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:46.971000 audit[5624]: CRED_ACQ pid=5624 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:46.978084 kernel: audit: type=1103 audit(1707767386.971:1671): pid=5624 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:47.170773 sshd[5622]: pam_unix(sshd:session): session closed for user core Feb 12 19:49:47.172000 audit[5622]: USER_END pid=5622 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:47.174000 audit[5622]: CRED_DISP pid=5622 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:47.179965 systemd[1]: sshd@25-146.190.157.125:22-139.178.68.195:50460.service: Deactivated successfully. Feb 12 19:49:47.181208 systemd[1]: session-26.scope: Deactivated successfully. Feb 12 19:49:47.182434 kernel: audit: type=1106 audit(1707767387.172:1672): pid=5622 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:47.182532 kernel: audit: type=1104 audit(1707767387.174:1673): pid=5622 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:47.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-146.190.157.125:22-139.178.68.195:50460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:47.184395 systemd-logind[1093]: Session 26 logged out. Waiting for processes to exit. Feb 12 19:49:47.186151 systemd-logind[1093]: Removed session 26. Feb 12 19:49:49.051090 systemd[1]: run-containerd-runc-k8s.io-2223747516a29bb53dcc858bf2a2f2a8e423434175021303f17e5f74647f2136-runc.KU7OTO.mount: Deactivated successfully. Feb 12 19:49:50.289022 kubelet[2029]: E0212 19:49:50.288949 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:49:50.290097 kubelet[2029]: E0212 19:49:50.290070 2029 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:49:52.177804 systemd[1]: Started sshd@26-146.190.157.125:22-139.178.68.195:50470.service. Feb 12 19:49:52.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-146.190.157.125:22-139.178.68.195:50470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:52.179365 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:49:52.179588 kernel: audit: type=1130 audit(1707767392.177:1675): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-146.190.157.125:22-139.178.68.195:50470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:52.236000 audit[5652]: USER_ACCT pid=5652 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:52.237755 sshd[5652]: Accepted publickey for core from 139.178.68.195 port 50470 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:49:52.241768 kernel: audit: type=1101 audit(1707767392.236:1676): pid=5652 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:52.241000 audit[5652]: CRED_ACQ pid=5652 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:52.243148 sshd[5652]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:49:52.246183 kernel: audit: type=1103 audit(1707767392.241:1677): pid=5652 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:52.246289 kernel: audit: type=1006 audit(1707767392.241:1678): pid=5652 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 12 19:49:52.241000 audit[5652]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2d2f5510 a2=3 a3=0 items=0 ppid=1 pid=5652 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:52.251982 kernel: audit: type=1300 audit(1707767392.241:1678): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2d2f5510 a2=3 a3=0 items=0 ppid=1 pid=5652 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:52.241000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:52.253788 kernel: audit: type=1327 audit(1707767392.241:1678): proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:52.257806 systemd-logind[1093]: New session 27 of user core. Feb 12 19:49:52.258477 systemd[1]: Started session-27.scope. Feb 12 19:49:52.264000 audit[5652]: USER_START pid=5652 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:52.269794 kernel: audit: type=1105 audit(1707767392.264:1679): pid=5652 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:52.271409 kernel: audit: type=1103 audit(1707767392.269:1680): pid=5654 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:52.269000 audit[5654]: CRED_ACQ pid=5654 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:52.419388 sshd[5652]: pam_unix(sshd:session): session closed for user core Feb 12 19:49:52.420000 audit[5652]: USER_END pid=5652 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:52.426810 kernel: audit: type=1106 audit(1707767392.420:1681): pid=5652 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:52.426775 systemd[1]: sshd@26-146.190.157.125:22-139.178.68.195:50470.service: Deactivated successfully. Feb 12 19:49:52.420000 audit[5652]: CRED_DISP pid=5652 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:52.430840 kernel: audit: type=1104 audit(1707767392.420:1682): pid=5652 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:49:52.428133 systemd[1]: session-27.scope: Deactivated successfully. Feb 12 19:49:52.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-146.190.157.125:22-139.178.68.195:50470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:52.431856 systemd-logind[1093]: Session 27 logged out. Waiting for processes to exit. Feb 12 19:49:52.433353 systemd-logind[1093]: Removed session 27.