Feb 12 20:26:22.810737 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 12 20:26:22.810761 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 20:26:22.810772 kernel: BIOS-provided physical RAM map: Feb 12 20:26:22.810780 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Feb 12 20:26:22.810787 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Feb 12 20:26:22.810795 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Feb 12 20:26:22.810804 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdcfff] usable Feb 12 20:26:22.810812 kernel: BIOS-e820: [mem 0x000000009cfdd000-0x000000009cffffff] reserved Feb 12 20:26:22.810821 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Feb 12 20:26:22.810829 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Feb 12 20:26:22.810837 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved Feb 12 20:26:22.810845 kernel: NX (Execute Disable) protection: active Feb 12 20:26:22.810852 kernel: SMBIOS 2.8 present. Feb 12 20:26:22.810861 kernel: DMI: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Feb 12 20:26:22.810872 kernel: Hypervisor detected: KVM Feb 12 20:26:22.810881 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 12 20:26:22.810889 kernel: kvm-clock: cpu 0, msr 5ffaa001, primary cpu clock Feb 12 20:26:22.810897 kernel: kvm-clock: using sched offset of 2198950332 cycles Feb 12 20:26:22.810906 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 12 20:26:22.810915 kernel: tsc: Detected 2794.748 MHz processor Feb 12 20:26:22.810924 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 12 20:26:22.810933 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 12 20:26:22.810942 kernel: last_pfn = 0x9cfdd max_arch_pfn = 0x400000000 Feb 12 20:26:22.810952 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 12 20:26:22.810960 kernel: Using GB pages for direct mapping Feb 12 20:26:22.810969 kernel: ACPI: Early table checksum verification disabled Feb 12 20:26:22.810977 kernel: ACPI: RSDP 0x00000000000F59C0 000014 (v00 BOCHS ) Feb 12 20:26:22.810986 kernel: ACPI: RSDT 0x000000009CFE1BDD 000034 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 20:26:22.810995 kernel: ACPI: FACP 0x000000009CFE1A79 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 20:26:22.811003 kernel: ACPI: DSDT 0x000000009CFE0040 001A39 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 20:26:22.811012 kernel: ACPI: FACS 0x000000009CFE0000 000040 Feb 12 20:26:22.811020 kernel: ACPI: APIC 0x000000009CFE1AED 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 20:26:22.811031 kernel: ACPI: HPET 0x000000009CFE1B7D 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 20:26:22.811039 kernel: ACPI: WAET 0x000000009CFE1BB5 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 20:26:22.811048 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe1a79-0x9cfe1aec] Feb 12 20:26:22.811057 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe1a78] Feb 12 20:26:22.811065 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] Feb 12 20:26:22.811074 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe1aed-0x9cfe1b7c] Feb 12 20:26:22.811093 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe1b7d-0x9cfe1bb4] Feb 12 20:26:22.811102 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe1bb5-0x9cfe1bdc] Feb 12 20:26:22.811116 kernel: No NUMA configuration found Feb 12 20:26:22.811125 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdcfff] Feb 12 20:26:22.811134 kernel: NODE_DATA(0) allocated [mem 0x9cfd7000-0x9cfdcfff] Feb 12 20:26:22.811144 kernel: Zone ranges: Feb 12 20:26:22.811153 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 12 20:26:22.811163 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdcfff] Feb 12 20:26:22.811175 kernel: Normal empty Feb 12 20:26:22.811186 kernel: Movable zone start for each node Feb 12 20:26:22.811196 kernel: Early memory node ranges Feb 12 20:26:22.811205 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Feb 12 20:26:22.811215 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdcfff] Feb 12 20:26:22.811224 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdcfff] Feb 12 20:26:22.811233 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 12 20:26:22.811243 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Feb 12 20:26:22.811252 kernel: On node 0, zone DMA32: 12323 pages in unavailable ranges Feb 12 20:26:22.811262 kernel: ACPI: PM-Timer IO Port: 0x608 Feb 12 20:26:22.811270 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 12 20:26:22.811279 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 12 20:26:22.811298 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 12 20:26:22.811307 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 12 20:26:22.811316 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 12 20:26:22.811326 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 12 20:26:22.811335 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 12 20:26:22.811343 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 12 20:26:22.811354 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 12 20:26:22.811363 kernel: TSC deadline timer available Feb 12 20:26:22.811374 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Feb 12 20:26:22.811384 kernel: kvm-guest: KVM setup pv remote TLB flush Feb 12 20:26:22.811392 kernel: kvm-guest: setup PV sched yield Feb 12 20:26:22.811401 kernel: [mem 0x9d000000-0xfeffbfff] available for PCI devices Feb 12 20:26:22.811410 kernel: Booting paravirtualized kernel on KVM Feb 12 20:26:22.811420 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 12 20:26:22.811430 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Feb 12 20:26:22.811439 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u524288 Feb 12 20:26:22.811451 kernel: pcpu-alloc: s185624 r8192 d31464 u524288 alloc=1*2097152 Feb 12 20:26:22.811460 kernel: pcpu-alloc: [0] 0 1 2 3 Feb 12 20:26:22.811469 kernel: kvm-guest: setup async PF for cpu 0 Feb 12 20:26:22.811478 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 Feb 12 20:26:22.811488 kernel: kvm-guest: PV spinlocks enabled Feb 12 20:26:22.811497 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 12 20:26:22.811506 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632733 Feb 12 20:26:22.811516 kernel: Policy zone: DMA32 Feb 12 20:26:22.811527 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 20:26:22.811538 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 20:26:22.811548 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 12 20:26:22.811557 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 20:26:22.811566 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 20:26:22.811576 kernel: Memory: 2438768K/2571756K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 132728K reserved, 0K cma-reserved) Feb 12 20:26:22.811586 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Feb 12 20:26:22.811595 kernel: ftrace: allocating 34475 entries in 135 pages Feb 12 20:26:22.811604 kernel: ftrace: allocated 135 pages with 4 groups Feb 12 20:26:22.811615 kernel: rcu: Hierarchical RCU implementation. Feb 12 20:26:22.811625 kernel: rcu: RCU event tracing is enabled. Feb 12 20:26:22.811634 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Feb 12 20:26:22.811644 kernel: Rude variant of Tasks RCU enabled. Feb 12 20:26:22.811653 kernel: Tracing variant of Tasks RCU enabled. Feb 12 20:26:22.811663 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 20:26:22.811672 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Feb 12 20:26:22.811681 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Feb 12 20:26:22.811690 kernel: random: crng init done Feb 12 20:26:22.811701 kernel: Console: colour VGA+ 80x25 Feb 12 20:26:22.811710 kernel: printk: console [ttyS0] enabled Feb 12 20:26:22.811719 kernel: ACPI: Core revision 20210730 Feb 12 20:26:22.811729 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Feb 12 20:26:22.811738 kernel: APIC: Switch to symmetric I/O mode setup Feb 12 20:26:22.811747 kernel: x2apic enabled Feb 12 20:26:22.811757 kernel: Switched APIC routing to physical x2apic. Feb 12 20:26:22.811766 kernel: kvm-guest: setup PV IPIs Feb 12 20:26:22.811775 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 12 20:26:22.811786 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Feb 12 20:26:22.811795 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Feb 12 20:26:22.811804 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Feb 12 20:26:22.811814 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Feb 12 20:26:22.811823 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Feb 12 20:26:22.811832 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 12 20:26:22.811842 kernel: Spectre V2 : Mitigation: Retpolines Feb 12 20:26:22.811851 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 12 20:26:22.811861 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 12 20:26:22.811877 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Feb 12 20:26:22.811887 kernel: RETBleed: Mitigation: untrained return thunk Feb 12 20:26:22.811897 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 12 20:26:22.811908 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 12 20:26:22.811918 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 12 20:26:22.811928 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 12 20:26:22.811938 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 12 20:26:22.811947 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 12 20:26:22.811958 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Feb 12 20:26:22.811969 kernel: Freeing SMP alternatives memory: 32K Feb 12 20:26:22.811979 kernel: pid_max: default: 32768 minimum: 301 Feb 12 20:26:22.811988 kernel: LSM: Security Framework initializing Feb 12 20:26:22.811998 kernel: SELinux: Initializing. Feb 12 20:26:22.812008 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 20:26:22.812018 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 20:26:22.812028 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Feb 12 20:26:22.812039 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Feb 12 20:26:22.812049 kernel: ... version: 0 Feb 12 20:26:22.812058 kernel: ... bit width: 48 Feb 12 20:26:22.812068 kernel: ... generic registers: 6 Feb 12 20:26:22.812078 kernel: ... value mask: 0000ffffffffffff Feb 12 20:26:22.812095 kernel: ... max period: 00007fffffffffff Feb 12 20:26:22.812105 kernel: ... fixed-purpose events: 0 Feb 12 20:26:22.812114 kernel: ... event mask: 000000000000003f Feb 12 20:26:22.812124 kernel: signal: max sigframe size: 1776 Feb 12 20:26:22.812135 kernel: rcu: Hierarchical SRCU implementation. Feb 12 20:26:22.812145 kernel: smp: Bringing up secondary CPUs ... Feb 12 20:26:22.812154 kernel: x86: Booting SMP configuration: Feb 12 20:26:22.812164 kernel: .... node #0, CPUs: #1 Feb 12 20:26:22.812174 kernel: kvm-clock: cpu 1, msr 5ffaa041, secondary cpu clock Feb 12 20:26:22.812184 kernel: kvm-guest: setup async PF for cpu 1 Feb 12 20:26:22.812193 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 Feb 12 20:26:22.812203 kernel: #2 Feb 12 20:26:22.812213 kernel: kvm-clock: cpu 2, msr 5ffaa081, secondary cpu clock Feb 12 20:26:22.812223 kernel: kvm-guest: setup async PF for cpu 2 Feb 12 20:26:22.812234 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 Feb 12 20:26:22.812243 kernel: #3 Feb 12 20:26:22.812253 kernel: kvm-clock: cpu 3, msr 5ffaa0c1, secondary cpu clock Feb 12 20:26:22.812262 kernel: kvm-guest: setup async PF for cpu 3 Feb 12 20:26:22.812272 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 Feb 12 20:26:22.812282 kernel: smp: Brought up 1 node, 4 CPUs Feb 12 20:26:22.812332 kernel: smpboot: Max logical packages: 1 Feb 12 20:26:22.812342 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Feb 12 20:26:22.812351 kernel: devtmpfs: initialized Feb 12 20:26:22.812363 kernel: x86/mm: Memory block size: 128MB Feb 12 20:26:22.812373 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 20:26:22.812383 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Feb 12 20:26:22.812393 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 20:26:22.812403 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 20:26:22.812413 kernel: audit: initializing netlink subsys (disabled) Feb 12 20:26:22.812423 kernel: audit: type=2000 audit(1707769583.078:1): state=initialized audit_enabled=0 res=1 Feb 12 20:26:22.812432 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 20:26:22.812442 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 12 20:26:22.812453 kernel: cpuidle: using governor menu Feb 12 20:26:22.812463 kernel: ACPI: bus type PCI registered Feb 12 20:26:22.812473 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 20:26:22.812483 kernel: dca service started, version 1.12.1 Feb 12 20:26:22.812492 kernel: PCI: Using configuration type 1 for base access Feb 12 20:26:22.812502 kernel: PCI: Using configuration type 1 for extended access Feb 12 20:26:22.812512 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 12 20:26:22.812522 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 20:26:22.812532 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 20:26:22.812543 kernel: ACPI: Added _OSI(Module Device) Feb 12 20:26:22.812553 kernel: ACPI: Added _OSI(Processor Device) Feb 12 20:26:22.812563 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 20:26:22.812572 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 20:26:22.812582 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 20:26:22.812592 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 20:26:22.812601 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 20:26:22.812611 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 12 20:26:22.812621 kernel: ACPI: Interpreter enabled Feb 12 20:26:22.812632 kernel: ACPI: PM: (supports S0 S3 S5) Feb 12 20:26:22.812641 kernel: ACPI: Using IOAPIC for interrupt routing Feb 12 20:26:22.812651 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 12 20:26:22.812661 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Feb 12 20:26:22.812671 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 12 20:26:22.812805 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 12 20:26:22.812821 kernel: acpiphp: Slot [3] registered Feb 12 20:26:22.812831 kernel: acpiphp: Slot [4] registered Feb 12 20:26:22.812842 kernel: acpiphp: Slot [5] registered Feb 12 20:26:22.812852 kernel: acpiphp: Slot [6] registered Feb 12 20:26:22.812861 kernel: acpiphp: Slot [7] registered Feb 12 20:26:22.812871 kernel: acpiphp: Slot [8] registered Feb 12 20:26:22.812881 kernel: acpiphp: Slot [9] registered Feb 12 20:26:22.812890 kernel: acpiphp: Slot [10] registered Feb 12 20:26:22.812900 kernel: acpiphp: Slot [11] registered Feb 12 20:26:22.812910 kernel: acpiphp: Slot [12] registered Feb 12 20:26:22.812919 kernel: acpiphp: Slot [13] registered Feb 12 20:26:22.812929 kernel: acpiphp: Slot [14] registered Feb 12 20:26:22.812940 kernel: acpiphp: Slot [15] registered Feb 12 20:26:22.812949 kernel: acpiphp: Slot [16] registered Feb 12 20:26:22.812959 kernel: acpiphp: Slot [17] registered Feb 12 20:26:22.812969 kernel: acpiphp: Slot [18] registered Feb 12 20:26:22.812979 kernel: acpiphp: Slot [19] registered Feb 12 20:26:22.812988 kernel: acpiphp: Slot [20] registered Feb 12 20:26:22.812998 kernel: acpiphp: Slot [21] registered Feb 12 20:26:22.813008 kernel: acpiphp: Slot [22] registered Feb 12 20:26:22.813017 kernel: acpiphp: Slot [23] registered Feb 12 20:26:22.813028 kernel: acpiphp: Slot [24] registered Feb 12 20:26:22.813038 kernel: acpiphp: Slot [25] registered Feb 12 20:26:22.813048 kernel: acpiphp: Slot [26] registered Feb 12 20:26:22.813057 kernel: acpiphp: Slot [27] registered Feb 12 20:26:22.813067 kernel: acpiphp: Slot [28] registered Feb 12 20:26:22.813076 kernel: acpiphp: Slot [29] registered Feb 12 20:26:22.813094 kernel: acpiphp: Slot [30] registered Feb 12 20:26:22.813104 kernel: acpiphp: Slot [31] registered Feb 12 20:26:22.813113 kernel: PCI host bridge to bus 0000:00 Feb 12 20:26:22.813217 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 12 20:26:22.813322 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 12 20:26:22.813404 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 12 20:26:22.813483 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xfebfffff window] Feb 12 20:26:22.813560 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Feb 12 20:26:22.813637 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 12 20:26:22.813742 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 12 20:26:22.813844 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 12 20:26:22.813949 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Feb 12 20:26:22.814040 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc0c0-0xc0cf] Feb 12 20:26:22.814142 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Feb 12 20:26:22.814232 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Feb 12 20:26:22.814347 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Feb 12 20:26:22.814436 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Feb 12 20:26:22.814531 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 12 20:26:22.814617 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Feb 12 20:26:22.814702 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Feb 12 20:26:22.814796 kernel: pci 0000:00:02.0: [1234:1111] type 00 class 0x030000 Feb 12 20:26:22.814885 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] Feb 12 20:26:22.814972 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] Feb 12 20:26:22.815060 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] Feb 12 20:26:22.815157 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 12 20:26:22.815253 kernel: pci 0000:00:03.0: [1af4:1005] type 00 class 0x00ff00 Feb 12 20:26:22.815357 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc09f] Feb 12 20:26:22.815450 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] Feb 12 20:26:22.815536 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] Feb 12 20:26:22.815631 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Feb 12 20:26:22.815721 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Feb 12 20:26:22.815849 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] Feb 12 20:26:22.815986 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] Feb 12 20:26:22.816127 kernel: pci 0000:00:05.0: [1af4:1000] type 00 class 0x020000 Feb 12 20:26:22.816225 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0a0-0xc0bf] Feb 12 20:26:22.816347 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] Feb 12 20:26:22.816442 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] Feb 12 20:26:22.816538 kernel: pci 0000:00:05.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] Feb 12 20:26:22.816551 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 12 20:26:22.816560 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 12 20:26:22.816570 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 12 20:26:22.816579 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 12 20:26:22.816589 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 12 20:26:22.816599 kernel: iommu: Default domain type: Translated Feb 12 20:26:22.816609 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 12 20:26:22.816701 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Feb 12 20:26:22.816794 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 12 20:26:22.816883 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Feb 12 20:26:22.816896 kernel: vgaarb: loaded Feb 12 20:26:22.816906 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 20:26:22.816916 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 20:26:22.816926 kernel: PTP clock support registered Feb 12 20:26:22.816936 kernel: PCI: Using ACPI for IRQ routing Feb 12 20:26:22.816946 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 12 20:26:22.816959 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Feb 12 20:26:22.816969 kernel: e820: reserve RAM buffer [mem 0x9cfdd000-0x9fffffff] Feb 12 20:26:22.816979 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Feb 12 20:26:22.816989 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Feb 12 20:26:22.816999 kernel: clocksource: Switched to clocksource kvm-clock Feb 12 20:26:22.817009 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 20:26:22.817020 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 20:26:22.817030 kernel: pnp: PnP ACPI init Feb 12 20:26:22.817141 kernel: pnp 00:02: [dma 2] Feb 12 20:26:22.817158 kernel: pnp: PnP ACPI: found 6 devices Feb 12 20:26:22.817169 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 12 20:26:22.817179 kernel: NET: Registered PF_INET protocol family Feb 12 20:26:22.817189 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 12 20:26:22.817199 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 12 20:26:22.817210 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 20:26:22.817220 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 12 20:26:22.817230 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 12 20:26:22.817242 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 12 20:26:22.817252 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 20:26:22.817262 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 20:26:22.817272 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 20:26:22.817282 kernel: NET: Registered PF_XDP protocol family Feb 12 20:26:22.817402 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 12 20:26:22.817490 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 12 20:26:22.817646 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 12 20:26:22.817730 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xfebfffff window] Feb 12 20:26:22.817813 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Feb 12 20:26:22.817903 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Feb 12 20:26:22.817995 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 12 20:26:22.818095 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 12 20:26:22.818109 kernel: PCI: CLS 0 bytes, default 64 Feb 12 20:26:22.818119 kernel: Initialise system trusted keyrings Feb 12 20:26:22.818129 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 12 20:26:22.818139 kernel: Key type asymmetric registered Feb 12 20:26:22.818152 kernel: Asymmetric key parser 'x509' registered Feb 12 20:26:22.818162 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 20:26:22.818172 kernel: io scheduler mq-deadline registered Feb 12 20:26:22.818185 kernel: io scheduler kyber registered Feb 12 20:26:22.818196 kernel: io scheduler bfq registered Feb 12 20:26:22.818207 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 12 20:26:22.818218 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 12 20:26:22.818228 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Feb 12 20:26:22.818238 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 12 20:26:22.818249 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 20:26:22.818260 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 12 20:26:22.818270 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 12 20:26:22.818280 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 12 20:26:22.818303 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 12 20:26:22.818400 kernel: rtc_cmos 00:05: RTC can wake from S4 Feb 12 20:26:22.818415 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 12 20:26:22.818494 kernel: rtc_cmos 00:05: registered as rtc0 Feb 12 20:26:22.818592 kernel: rtc_cmos 00:05: setting system clock to 2024-02-12T20:26:22 UTC (1707769582) Feb 12 20:26:22.818677 kernel: rtc_cmos 00:05: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Feb 12 20:26:22.818703 kernel: NET: Registered PF_INET6 protocol family Feb 12 20:26:22.818716 kernel: Segment Routing with IPv6 Feb 12 20:26:22.818734 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 20:26:22.818744 kernel: NET: Registered PF_PACKET protocol family Feb 12 20:26:22.818754 kernel: Key type dns_resolver registered Feb 12 20:26:22.818766 kernel: IPI shorthand broadcast: enabled Feb 12 20:26:22.818775 kernel: sched_clock: Marking stable (383280248, 74022999)->(514776183, -57472936) Feb 12 20:26:22.818788 kernel: registered taskstats version 1 Feb 12 20:26:22.818808 kernel: Loading compiled-in X.509 certificates Feb 12 20:26:22.818818 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 12 20:26:22.818828 kernel: Key type .fscrypt registered Feb 12 20:26:22.818837 kernel: Key type fscrypt-provisioning registered Feb 12 20:26:22.818847 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 20:26:22.818872 kernel: ima: Allocated hash algorithm: sha1 Feb 12 20:26:22.818883 kernel: ima: No architecture policies found Feb 12 20:26:22.818894 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 12 20:26:22.818904 kernel: Write protecting the kernel read-only data: 28672k Feb 12 20:26:22.818913 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 12 20:26:22.818933 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 12 20:26:22.818943 kernel: Run /init as init process Feb 12 20:26:22.818952 kernel: with arguments: Feb 12 20:26:22.818962 kernel: /init Feb 12 20:26:22.818972 kernel: with environment: Feb 12 20:26:22.819008 kernel: HOME=/ Feb 12 20:26:22.819019 kernel: TERM=linux Feb 12 20:26:22.819039 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 20:26:22.819053 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 20:26:22.819065 systemd[1]: Detected virtualization kvm. Feb 12 20:26:22.819076 systemd[1]: Detected architecture x86-64. Feb 12 20:26:22.819103 systemd[1]: Running in initrd. Feb 12 20:26:22.819114 systemd[1]: No hostname configured, using default hostname. Feb 12 20:26:22.819124 systemd[1]: Hostname set to . Feb 12 20:26:22.819137 systemd[1]: Initializing machine ID from VM UUID. Feb 12 20:26:22.819148 systemd[1]: Queued start job for default target initrd.target. Feb 12 20:26:22.819158 systemd[1]: Started systemd-ask-password-console.path. Feb 12 20:26:22.819169 systemd[1]: Reached target cryptsetup.target. Feb 12 20:26:22.819179 systemd[1]: Reached target paths.target. Feb 12 20:26:22.819189 systemd[1]: Reached target slices.target. Feb 12 20:26:22.819210 systemd[1]: Reached target swap.target. Feb 12 20:26:22.819221 systemd[1]: Reached target timers.target. Feb 12 20:26:22.819234 systemd[1]: Listening on iscsid.socket. Feb 12 20:26:22.819244 systemd[1]: Listening on iscsiuio.socket. Feb 12 20:26:22.819255 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 20:26:22.819265 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 20:26:22.819276 systemd[1]: Listening on systemd-journald.socket. Feb 12 20:26:22.819298 systemd[1]: Listening on systemd-networkd.socket. Feb 12 20:26:22.819319 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 20:26:22.819330 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 20:26:22.819343 systemd[1]: Reached target sockets.target. Feb 12 20:26:22.819354 systemd[1]: Starting kmod-static-nodes.service... Feb 12 20:26:22.819364 systemd[1]: Finished network-cleanup.service. Feb 12 20:26:22.819375 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 20:26:22.819385 systemd[1]: Starting systemd-journald.service... Feb 12 20:26:22.819406 systemd[1]: Starting systemd-modules-load.service... Feb 12 20:26:22.819419 systemd[1]: Starting systemd-resolved.service... Feb 12 20:26:22.819430 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 20:26:22.819441 systemd[1]: Finished kmod-static-nodes.service. Feb 12 20:26:22.819452 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 20:26:22.819465 systemd-journald[197]: Journal started Feb 12 20:26:22.819528 systemd-journald[197]: Runtime Journal (/run/log/journal/26f6cdfee24b45f9b35f2e0cb5f4ec48) is 6.0M, max 48.5M, 42.5M free. Feb 12 20:26:22.816033 systemd-modules-load[198]: Inserted module 'overlay' Feb 12 20:26:22.828018 systemd-resolved[199]: Positive Trust Anchors: Feb 12 20:26:22.838018 systemd[1]: Started systemd-journald.service. Feb 12 20:26:22.838034 kernel: audit: type=1130 audit(1707769582.831:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:22.838046 kernel: audit: type=1130 audit(1707769582.835:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:22.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:22.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:22.828027 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 20:26:22.841734 kernel: audit: type=1130 audit(1707769582.838:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:22.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:22.828053 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 20:26:22.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:22.830177 systemd-resolved[199]: Defaulting to hostname 'linux'. Feb 12 20:26:22.849053 kernel: audit: type=1130 audit(1707769582.841:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:22.835571 systemd[1]: Started systemd-resolved.service. Feb 12 20:26:22.838678 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 20:26:22.842196 systemd[1]: Reached target nss-lookup.target. Feb 12 20:26:22.849216 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 20:26:22.850361 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 20:26:22.859426 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 20:26:22.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:22.862644 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 20:26:22.862666 kernel: audit: type=1130 audit(1707769582.859:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:22.862799 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 20:26:22.865968 kernel: audit: type=1130 audit(1707769582.862:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:22.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:22.863850 systemd[1]: Starting dracut-cmdline.service... Feb 12 20:26:22.868942 systemd-modules-load[198]: Inserted module 'br_netfilter' Feb 12 20:26:22.869649 kernel: Bridge firewalling registered Feb 12 20:26:22.870791 dracut-cmdline[213]: dracut-dracut-053 Feb 12 20:26:22.872303 dracut-cmdline[213]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 20:26:22.887315 kernel: SCSI subsystem initialized Feb 12 20:26:22.897600 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 20:26:22.897631 kernel: device-mapper: uevent: version 1.0.3 Feb 12 20:26:22.897644 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 20:26:22.901303 systemd-modules-load[198]: Inserted module 'dm_multipath' Feb 12 20:26:22.902357 systemd[1]: Finished systemd-modules-load.service. Feb 12 20:26:22.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:22.903376 systemd[1]: Starting systemd-sysctl.service... Feb 12 20:26:22.906580 kernel: audit: type=1130 audit(1707769582.902:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:22.911153 systemd[1]: Finished systemd-sysctl.service. Feb 12 20:26:22.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:22.914302 kernel: audit: type=1130 audit(1707769582.911:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:22.915298 kernel: Loading iSCSI transport class v2.0-870. Feb 12 20:26:22.928314 kernel: iscsi: registered transport (tcp) Feb 12 20:26:22.949478 kernel: iscsi: registered transport (qla4xxx) Feb 12 20:26:22.949538 kernel: QLogic iSCSI HBA Driver Feb 12 20:26:22.983400 systemd[1]: Finished dracut-cmdline.service. Feb 12 20:26:22.987359 kernel: audit: type=1130 audit(1707769582.983:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:22.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:22.985264 systemd[1]: Starting dracut-pre-udev.service... Feb 12 20:26:23.033339 kernel: raid6: avx2x4 gen() 29334 MB/s Feb 12 20:26:23.050331 kernel: raid6: avx2x4 xor() 7177 MB/s Feb 12 20:26:23.067322 kernel: raid6: avx2x2 gen() 25514 MB/s Feb 12 20:26:23.084352 kernel: raid6: avx2x2 xor() 15140 MB/s Feb 12 20:26:23.101324 kernel: raid6: avx2x1 gen() 18480 MB/s Feb 12 20:26:23.118322 kernel: raid6: avx2x1 xor() 11364 MB/s Feb 12 20:26:23.135325 kernel: raid6: sse2x4 gen() 10129 MB/s Feb 12 20:26:23.152320 kernel: raid6: sse2x4 xor() 4456 MB/s Feb 12 20:26:23.169312 kernel: raid6: sse2x2 gen() 10987 MB/s Feb 12 20:26:23.186340 kernel: raid6: sse2x2 xor() 6834 MB/s Feb 12 20:26:23.203325 kernel: raid6: sse2x1 gen() 8730 MB/s Feb 12 20:26:23.220578 kernel: raid6: sse2x1 xor() 5791 MB/s Feb 12 20:26:23.220611 kernel: raid6: using algorithm avx2x4 gen() 29334 MB/s Feb 12 20:26:23.220621 kernel: raid6: .... xor() 7177 MB/s, rmw enabled Feb 12 20:26:23.221821 kernel: raid6: using avx2x2 recovery algorithm Feb 12 20:26:23.237315 kernel: xor: automatically using best checksumming function avx Feb 12 20:26:23.350316 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 12 20:26:23.358978 systemd[1]: Finished dracut-pre-udev.service. Feb 12 20:26:23.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:23.360000 audit: BPF prog-id=7 op=LOAD Feb 12 20:26:23.360000 audit: BPF prog-id=8 op=LOAD Feb 12 20:26:23.360768 systemd[1]: Starting systemd-udevd.service... Feb 12 20:26:23.371695 systemd-udevd[399]: Using default interface naming scheme 'v252'. Feb 12 20:26:23.375985 systemd[1]: Started systemd-udevd.service. Feb 12 20:26:23.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:23.379912 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 20:26:23.390688 dracut-pre-trigger[413]: rd.md=0: removing MD RAID activation Feb 12 20:26:23.420470 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 20:26:23.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:23.421848 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 20:26:23.456846 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 20:26:23.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:23.482322 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Feb 12 20:26:23.487310 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 20:26:23.489413 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 12 20:26:23.489442 kernel: GPT:9289727 != 19775487 Feb 12 20:26:23.489454 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 12 20:26:23.490367 kernel: GPT:9289727 != 19775487 Feb 12 20:26:23.490390 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 12 20:26:23.491396 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 20:26:23.492327 kernel: libata version 3.00 loaded. Feb 12 20:26:23.495583 kernel: ata_piix 0000:00:01.1: version 2.13 Feb 12 20:26:23.495811 kernel: scsi host0: ata_piix Feb 12 20:26:23.495933 kernel: scsi host1: ata_piix Feb 12 20:26:23.496763 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0c0 irq 14 Feb 12 20:26:23.496788 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0c8 irq 15 Feb 12 20:26:23.500970 kernel: AVX2 version of gcm_enc/dec engaged. Feb 12 20:26:23.500994 kernel: AES CTR mode by8 optimization enabled Feb 12 20:26:23.654375 kernel: ata2.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Feb 12 20:26:23.656903 kernel: scsi 1:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Feb 12 20:26:23.671313 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (450) Feb 12 20:26:23.680219 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 20:26:23.680666 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 20:26:23.688399 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 20:26:23.692965 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 20:26:23.696305 kernel: sr 1:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Feb 12 20:26:23.696475 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 12 20:26:23.698606 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 20:26:23.699861 systemd[1]: Starting disk-uuid.service... Feb 12 20:26:23.710512 disk-uuid[531]: Primary Header is updated. Feb 12 20:26:23.710512 disk-uuid[531]: Secondary Entries is updated. Feb 12 20:26:23.710512 disk-uuid[531]: Secondary Header is updated. Feb 12 20:26:23.714316 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 20:26:23.715306 kernel: sr 1:0:0:0: Attached scsi CD-ROM sr0 Feb 12 20:26:23.717312 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 20:26:24.717392 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 20:26:24.717448 disk-uuid[532]: The operation has completed successfully. Feb 12 20:26:24.739433 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 20:26:24.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:24.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:24.739516 systemd[1]: Finished disk-uuid.service. Feb 12 20:26:24.750410 systemd[1]: Starting verity-setup.service... Feb 12 20:26:24.763310 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Feb 12 20:26:24.784406 systemd[1]: Found device dev-mapper-usr.device. Feb 12 20:26:24.785698 systemd[1]: Mounting sysusr-usr.mount... Feb 12 20:26:24.786321 systemd[1]: Finished verity-setup.service. Feb 12 20:26:24.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:24.845331 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 20:26:24.845783 systemd[1]: Mounted sysusr-usr.mount. Feb 12 20:26:24.846368 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 20:26:24.847065 systemd[1]: Starting ignition-setup.service... Feb 12 20:26:24.849623 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 20:26:24.857778 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 20:26:24.857841 kernel: BTRFS info (device vda6): using free space tree Feb 12 20:26:24.857857 kernel: BTRFS info (device vda6): has skinny extents Feb 12 20:26:24.865470 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 20:26:24.873726 systemd[1]: Finished ignition-setup.service. Feb 12 20:26:24.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:24.876086 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 20:26:24.906961 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 20:26:24.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:24.907000 audit: BPF prog-id=9 op=LOAD Feb 12 20:26:24.908553 systemd[1]: Starting systemd-networkd.service... Feb 12 20:26:24.914238 ignition[645]: Ignition 2.14.0 Feb 12 20:26:24.914246 ignition[645]: Stage: fetch-offline Feb 12 20:26:24.914296 ignition[645]: no configs at "/usr/lib/ignition/base.d" Feb 12 20:26:24.914303 ignition[645]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 20:26:24.914385 ignition[645]: parsed url from cmdline: "" Feb 12 20:26:24.914387 ignition[645]: no config URL provided Feb 12 20:26:24.914392 ignition[645]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 20:26:24.914397 ignition[645]: no config at "/usr/lib/ignition/user.ign" Feb 12 20:26:24.914412 ignition[645]: op(1): [started] loading QEMU firmware config module Feb 12 20:26:24.914416 ignition[645]: op(1): executing: "modprobe" "qemu_fw_cfg" Feb 12 20:26:24.918446 ignition[645]: op(1): [finished] loading QEMU firmware config module Feb 12 20:26:24.930797 systemd-networkd[709]: lo: Link UP Feb 12 20:26:24.930805 systemd-networkd[709]: lo: Gained carrier Feb 12 20:26:24.931165 systemd-networkd[709]: Enumeration completed Feb 12 20:26:24.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:24.931224 systemd[1]: Started systemd-networkd.service. Feb 12 20:26:24.931712 systemd[1]: Reached target network.target. Feb 12 20:26:24.931939 systemd-networkd[709]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 20:26:24.932889 systemd-networkd[709]: eth0: Link UP Feb 12 20:26:24.932892 systemd-networkd[709]: eth0: Gained carrier Feb 12 20:26:24.933667 systemd[1]: Starting iscsiuio.service... Feb 12 20:26:24.937431 systemd[1]: Started iscsiuio.service. Feb 12 20:26:24.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:24.938740 systemd[1]: Starting iscsid.service... Feb 12 20:26:24.941214 iscsid[715]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 20:26:24.941214 iscsid[715]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 20:26:24.941214 iscsid[715]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 20:26:24.941214 iscsid[715]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 20:26:24.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:24.948540 iscsid[715]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 20:26:24.948540 iscsid[715]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 20:26:24.942206 systemd[1]: Started iscsid.service. Feb 12 20:26:24.946495 systemd[1]: Starting dracut-initqueue.service... Feb 12 20:26:24.955611 systemd[1]: Finished dracut-initqueue.service. Feb 12 20:26:24.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:24.956283 systemd[1]: Reached target remote-fs-pre.target. Feb 12 20:26:24.956879 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 20:26:24.957495 systemd[1]: Reached target remote-fs.target. Feb 12 20:26:24.958603 systemd[1]: Starting dracut-pre-mount.service... Feb 12 20:26:24.965475 systemd[1]: Finished dracut-pre-mount.service. Feb 12 20:26:24.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:24.998307 ignition[645]: parsing config with SHA512: c1e6a087f1afd72e5da76e2d531ba19f17e11c37fd4479180c20e07a5fe8ea5099307a6b8555c78918bd23177e3d7dfbbf12e4e68f66be631f9d5b13d627a6f9 Feb 12 20:26:25.014347 systemd-networkd[709]: eth0: DHCPv4 address 10.0.0.105/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 12 20:26:25.025588 unknown[645]: fetched base config from "system" Feb 12 20:26:25.025596 unknown[645]: fetched user config from "qemu" Feb 12 20:26:25.026145 ignition[645]: fetch-offline: fetch-offline passed Feb 12 20:26:25.027181 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 20:26:25.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:25.026193 ignition[645]: Ignition finished successfully Feb 12 20:26:25.028491 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 12 20:26:25.029193 systemd[1]: Starting ignition-kargs.service... Feb 12 20:26:25.037311 ignition[730]: Ignition 2.14.0 Feb 12 20:26:25.037319 ignition[730]: Stage: kargs Feb 12 20:26:25.037402 ignition[730]: no configs at "/usr/lib/ignition/base.d" Feb 12 20:26:25.037411 ignition[730]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 20:26:25.038601 ignition[730]: kargs: kargs passed Feb 12 20:26:25.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:25.040046 systemd[1]: Finished ignition-kargs.service. Feb 12 20:26:25.038636 ignition[730]: Ignition finished successfully Feb 12 20:26:25.041772 systemd[1]: Starting ignition-disks.service... Feb 12 20:26:25.048744 ignition[736]: Ignition 2.14.0 Feb 12 20:26:25.048753 ignition[736]: Stage: disks Feb 12 20:26:25.048838 ignition[736]: no configs at "/usr/lib/ignition/base.d" Feb 12 20:26:25.048849 ignition[736]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 20:26:25.049934 ignition[736]: disks: disks passed Feb 12 20:26:25.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:25.050651 systemd[1]: Finished ignition-disks.service. Feb 12 20:26:25.049968 ignition[736]: Ignition finished successfully Feb 12 20:26:25.051747 systemd[1]: Reached target initrd-root-device.target. Feb 12 20:26:25.052693 systemd[1]: Reached target local-fs-pre.target. Feb 12 20:26:25.053239 systemd[1]: Reached target local-fs.target. Feb 12 20:26:25.053756 systemd[1]: Reached target sysinit.target. Feb 12 20:26:25.054731 systemd[1]: Reached target basic.target. Feb 12 20:26:25.055830 systemd[1]: Starting systemd-fsck-root.service... Feb 12 20:26:25.065409 systemd-fsck[744]: ROOT: clean, 602/553520 files, 56013/553472 blocks Feb 12 20:26:25.070131 systemd[1]: Finished systemd-fsck-root.service. Feb 12 20:26:25.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:25.071902 systemd[1]: Mounting sysroot.mount... Feb 12 20:26:25.077317 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 20:26:25.077876 systemd[1]: Mounted sysroot.mount. Feb 12 20:26:25.078473 systemd[1]: Reached target initrd-root-fs.target. Feb 12 20:26:25.080264 systemd[1]: Mounting sysroot-usr.mount... Feb 12 20:26:25.081119 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 12 20:26:25.081156 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 20:26:25.081179 systemd[1]: Reached target ignition-diskful.target. Feb 12 20:26:25.082542 systemd[1]: Mounted sysroot-usr.mount. Feb 12 20:26:25.083928 systemd[1]: Starting initrd-setup-root.service... Feb 12 20:26:25.087539 initrd-setup-root[754]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 20:26:25.089920 initrd-setup-root[762]: cut: /sysroot/etc/group: No such file or directory Feb 12 20:26:25.092850 initrd-setup-root[770]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 20:26:25.094998 initrd-setup-root[778]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 20:26:25.114914 systemd[1]: Finished initrd-setup-root.service. Feb 12 20:26:25.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:25.116201 systemd[1]: Starting ignition-mount.service... Feb 12 20:26:25.117595 systemd[1]: Starting sysroot-boot.service... Feb 12 20:26:25.120755 bash[795]: umount: /sysroot/usr/share/oem: not mounted. Feb 12 20:26:25.126936 ignition[797]: INFO : Ignition 2.14.0 Feb 12 20:26:25.126936 ignition[797]: INFO : Stage: mount Feb 12 20:26:25.128615 ignition[797]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 12 20:26:25.128615 ignition[797]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 20:26:25.128615 ignition[797]: INFO : mount: mount passed Feb 12 20:26:25.128615 ignition[797]: INFO : Ignition finished successfully Feb 12 20:26:25.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:25.128744 systemd[1]: Finished ignition-mount.service. Feb 12 20:26:25.132706 systemd[1]: Finished sysroot-boot.service. Feb 12 20:26:25.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:25.793411 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 20:26:25.798297 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (805) Feb 12 20:26:25.798322 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 20:26:25.799663 kernel: BTRFS info (device vda6): using free space tree Feb 12 20:26:25.799673 kernel: BTRFS info (device vda6): has skinny extents Feb 12 20:26:25.802772 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 20:26:25.809846 systemd[1]: Starting ignition-files.service... Feb 12 20:26:25.822908 ignition[825]: INFO : Ignition 2.14.0 Feb 12 20:26:25.822908 ignition[825]: INFO : Stage: files Feb 12 20:26:25.824239 ignition[825]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 12 20:26:25.824239 ignition[825]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 20:26:25.826746 ignition[825]: DEBUG : files: compiled without relabeling support, skipping Feb 12 20:26:25.827841 ignition[825]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 20:26:25.827841 ignition[825]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 20:26:25.830346 ignition[825]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 20:26:25.831334 ignition[825]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 20:26:25.832652 unknown[825]: wrote ssh authorized keys file for user: core Feb 12 20:26:25.833454 ignition[825]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 20:26:25.834784 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 12 20:26:25.836068 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 12 20:26:26.156492 systemd-networkd[709]: eth0: Gained IPv6LL Feb 12 20:26:26.392834 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 12 20:26:26.568116 ignition[825]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 12 20:26:26.568116 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 12 20:26:26.572672 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 12 20:26:26.572672 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 12 20:26:27.011157 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 12 20:26:27.085448 ignition[825]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 12 20:26:27.087551 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 12 20:26:27.087551 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 20:26:27.087551 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 12 20:26:27.105220 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 12 20:26:27.166857 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 20:26:27.168342 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 20:26:27.168342 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Feb 12 20:26:27.250572 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 12 20:26:27.510735 ignition[825]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Feb 12 20:26:27.512839 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 20:26:27.512839 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 20:26:27.512839 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Feb 12 20:26:27.564111 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 12 20:26:28.097684 ignition[825]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Feb 12 20:26:28.097684 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 20:26:28.097684 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Feb 12 20:26:28.103606 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubectl: attempt #1 Feb 12 20:26:28.144554 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 12 20:26:28.341045 ignition[825]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 857e67001e74840518413593d90c6e64ad3f00d55fa44ad9a8e2ed6135392c908caff7ec19af18cbe10784b8f83afe687a0bc3bacbc9eee984cdeb9c0749cb83 Feb 12 20:26:28.352193 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 12 20:26:28.352193 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 20:26:28.352193 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 20:26:28.352193 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 12 20:26:28.352193 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 20:26:28.352193 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 12 20:26:28.352193 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 12 20:26:28.352193 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 20:26:28.352193 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 20:26:28.352193 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 20:26:28.352193 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 20:26:28.352193 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 20:26:28.352193 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 20:26:28.352193 ignition[825]: INFO : files: op(f): [started] processing unit "prepare-cni-plugins.service" Feb 12 20:26:28.352193 ignition[825]: INFO : files: op(f): op(10): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 20:26:28.352193 ignition[825]: INFO : files: op(f): op(10): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 20:26:28.352193 ignition[825]: INFO : files: op(f): [finished] processing unit "prepare-cni-plugins.service" Feb 12 20:26:28.379754 ignition[825]: INFO : files: op(11): [started] processing unit "prepare-critools.service" Feb 12 20:26:28.379754 ignition[825]: INFO : files: op(11): op(12): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 20:26:28.379754 ignition[825]: INFO : files: op(11): op(12): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 20:26:28.379754 ignition[825]: INFO : files: op(11): [finished] processing unit "prepare-critools.service" Feb 12 20:26:28.379754 ignition[825]: INFO : files: op(13): [started] processing unit "prepare-helm.service" Feb 12 20:26:28.379754 ignition[825]: INFO : files: op(13): op(14): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 20:26:28.379754 ignition[825]: INFO : files: op(13): op(14): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 20:26:28.379754 ignition[825]: INFO : files: op(13): [finished] processing unit "prepare-helm.service" Feb 12 20:26:28.379754 ignition[825]: INFO : files: op(15): [started] processing unit "coreos-metadata.service" Feb 12 20:26:28.379754 ignition[825]: INFO : files: op(15): op(16): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 12 20:26:28.379754 ignition[825]: INFO : files: op(15): op(16): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 12 20:26:28.379754 ignition[825]: INFO : files: op(15): [finished] processing unit "coreos-metadata.service" Feb 12 20:26:28.379754 ignition[825]: INFO : files: op(17): [started] setting preset to enabled for "prepare-critools.service" Feb 12 20:26:28.379754 ignition[825]: INFO : files: op(17): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 20:26:28.379754 ignition[825]: INFO : files: op(18): [started] setting preset to enabled for "prepare-helm.service" Feb 12 20:26:28.379754 ignition[825]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-helm.service" Feb 12 20:26:28.379754 ignition[825]: INFO : files: op(19): [started] setting preset to disabled for "coreos-metadata.service" Feb 12 20:26:28.379754 ignition[825]: INFO : files: op(19): op(1a): [started] removing enablement symlink(s) for "coreos-metadata.service" Feb 12 20:26:28.429226 kernel: kauditd_printk_skb: 24 callbacks suppressed Feb 12 20:26:28.429248 kernel: audit: type=1130 audit(1707769588.383:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.429259 kernel: audit: type=1130 audit(1707769588.392:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.429269 kernel: audit: type=1130 audit(1707769588.396:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.429282 kernel: audit: type=1131 audit(1707769588.396:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.429300 kernel: audit: type=1130 audit(1707769588.416:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.429310 kernel: audit: type=1131 audit(1707769588.416:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.429461 ignition[825]: INFO : files: op(19): op(1a): [finished] removing enablement symlink(s) for "coreos-metadata.service" Feb 12 20:26:28.429461 ignition[825]: INFO : files: op(19): [finished] setting preset to disabled for "coreos-metadata.service" Feb 12 20:26:28.429461 ignition[825]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 20:26:28.429461 ignition[825]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 20:26:28.429461 ignition[825]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 20:26:28.429461 ignition[825]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 20:26:28.429461 ignition[825]: INFO : files: files passed Feb 12 20:26:28.429461 ignition[825]: INFO : Ignition finished successfully Feb 12 20:26:28.439983 kernel: audit: type=1130 audit(1707769588.434:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.382606 systemd[1]: Finished ignition-files.service. Feb 12 20:26:28.385085 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 20:26:28.441698 initrd-setup-root-after-ignition[849]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Feb 12 20:26:28.388564 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 20:26:28.444182 initrd-setup-root-after-ignition[852]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 20:26:28.389192 systemd[1]: Starting ignition-quench.service... Feb 12 20:26:28.472521 kernel: audit: type=1131 audit(1707769588.445:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.472549 kernel: audit: type=1131 audit(1707769588.451:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.472561 kernel: audit: type=1131 audit(1707769588.454:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.458000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.458000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.458000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.392425 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 20:26:28.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.393419 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 20:26:28.393500 systemd[1]: Finished ignition-quench.service. Feb 12 20:26:28.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.396776 systemd[1]: Reached target ignition-complete.target. Feb 12 20:26:28.402500 systemd[1]: Starting initrd-parse-etc.service... Feb 12 20:26:28.481050 ignition[865]: INFO : Ignition 2.14.0 Feb 12 20:26:28.481050 ignition[865]: INFO : Stage: umount Feb 12 20:26:28.481050 ignition[865]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 12 20:26:28.481050 ignition[865]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 20:26:28.481050 ignition[865]: INFO : umount: umount passed Feb 12 20:26:28.481050 ignition[865]: INFO : Ignition finished successfully Feb 12 20:26:28.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.482000 audit: BPF prog-id=6 op=UNLOAD Feb 12 20:26:28.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.414916 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 20:26:28.414995 systemd[1]: Finished initrd-parse-etc.service. Feb 12 20:26:28.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.417213 systemd[1]: Reached target initrd-fs.target. Feb 12 20:26:28.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.422495 systemd[1]: Reached target initrd.target. Feb 12 20:26:28.423965 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 20:26:28.424578 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 20:26:28.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.496000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.433607 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 20:26:28.435885 systemd[1]: Starting initrd-cleanup.service... Feb 12 20:26:28.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.444744 systemd[1]: Stopped target nss-lookup.target. Feb 12 20:26:28.446123 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 20:26:28.446591 systemd[1]: Stopped target timers.target. Feb 12 20:26:28.446679 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 20:26:28.446766 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 20:26:28.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.447002 systemd[1]: Stopped target initrd.target. Feb 12 20:26:28.449913 systemd[1]: Stopped target basic.target. Feb 12 20:26:28.450226 systemd[1]: Stopped target ignition-complete.target. Feb 12 20:26:28.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.450337 systemd[1]: Stopped target ignition-diskful.target. Feb 12 20:26:28.450562 systemd[1]: Stopped target initrd-root-device.target. Feb 12 20:26:28.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.450857 systemd[1]: Stopped target remote-fs.target. Feb 12 20:26:28.451000 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 20:26:28.451134 systemd[1]: Stopped target sysinit.target. Feb 12 20:26:28.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.451260 systemd[1]: Stopped target local-fs.target. Feb 12 20:26:28.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.451525 systemd[1]: Stopped target local-fs-pre.target. Feb 12 20:26:28.451656 systemd[1]: Stopped target swap.target. Feb 12 20:26:28.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:28.451776 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 20:26:28.451856 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 20:26:28.452022 systemd[1]: Stopped target cryptsetup.target. Feb 12 20:26:28.454567 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 20:26:28.454648 systemd[1]: Stopped dracut-initqueue.service. Feb 12 20:26:28.454988 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 20:26:28.455075 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 20:26:28.457798 systemd[1]: Stopped target paths.target. Feb 12 20:26:28.458053 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 20:26:28.458368 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 20:26:28.458647 systemd[1]: Stopped target slices.target. Feb 12 20:26:28.458756 systemd[1]: Stopped target sockets.target. Feb 12 20:26:28.458865 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 20:26:28.458923 systemd[1]: Closed iscsid.socket. Feb 12 20:26:28.459302 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 20:26:28.459413 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 20:26:28.459677 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 20:26:28.459765 systemd[1]: Stopped ignition-files.service. Feb 12 20:26:28.460820 systemd[1]: Stopping ignition-mount.service... Feb 12 20:26:28.461269 systemd[1]: Stopping iscsiuio.service... Feb 12 20:26:28.462112 systemd[1]: Stopping sysroot-boot.service... Feb 12 20:26:28.462500 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 20:26:28.462623 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 20:26:28.463001 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 20:26:28.463098 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 20:26:28.465602 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 20:26:28.468340 systemd[1]: Stopped iscsiuio.service. Feb 12 20:26:28.469023 systemd[1]: Stopped target network.target. Feb 12 20:26:28.469277 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 20:26:28.542115 iscsid[715]: iscsid shutting down. Feb 12 20:26:28.542731 systemd-journald[197]: Received SIGTERM from PID 1 (n/a). Feb 12 20:26:28.469375 systemd[1]: Closed iscsiuio.socket. Feb 12 20:26:28.469840 systemd[1]: Stopping systemd-networkd.service... Feb 12 20:26:28.471314 systemd[1]: Stopping systemd-resolved.service... Feb 12 20:26:28.472749 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 20:26:28.472831 systemd[1]: Finished initrd-cleanup.service. Feb 12 20:26:28.475185 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 20:26:28.475263 systemd[1]: Stopped ignition-mount.service. Feb 12 20:26:28.475453 systemd-networkd[709]: eth0: DHCPv6 lease lost Feb 12 20:26:28.547000 audit: BPF prog-id=9 op=UNLOAD Feb 12 20:26:28.477099 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 20:26:28.477194 systemd[1]: Stopped systemd-networkd.service. Feb 12 20:26:28.478483 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 20:26:28.478574 systemd[1]: Stopped systemd-resolved.service. Feb 12 20:26:28.482149 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 20:26:28.482738 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 20:26:28.482772 systemd[1]: Closed systemd-networkd.socket. Feb 12 20:26:28.483837 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 20:26:28.483879 systemd[1]: Stopped ignition-disks.service. Feb 12 20:26:28.485355 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 20:26:28.485385 systemd[1]: Stopped ignition-kargs.service. Feb 12 20:26:28.486541 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 20:26:28.486572 systemd[1]: Stopped ignition-setup.service. Feb 12 20:26:28.488732 systemd[1]: Stopping network-cleanup.service... Feb 12 20:26:28.489270 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 20:26:28.489313 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 20:26:28.490141 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 20:26:28.490175 systemd[1]: Stopped systemd-sysctl.service. Feb 12 20:26:28.491439 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 20:26:28.491471 systemd[1]: Stopped systemd-modules-load.service. Feb 12 20:26:28.492228 systemd[1]: Stopping systemd-udevd.service... Feb 12 20:26:28.494613 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 20:26:28.495124 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 20:26:28.495191 systemd[1]: Stopped sysroot-boot.service. Feb 12 20:26:28.496490 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 20:26:28.496537 systemd[1]: Stopped initrd-setup-root.service. Feb 12 20:26:28.498234 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 20:26:28.498314 systemd[1]: Stopped network-cleanup.service. Feb 12 20:26:28.501564 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 20:26:28.501652 systemd[1]: Stopped systemd-udevd.service. Feb 12 20:26:28.503764 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 20:26:28.503792 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 20:26:28.505042 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 20:26:28.505064 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 20:26:28.506331 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 20:26:28.506373 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 20:26:28.507653 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 20:26:28.507682 systemd[1]: Stopped dracut-cmdline.service. Feb 12 20:26:28.508962 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 20:26:28.508991 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 20:26:28.510959 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 20:26:28.512244 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 12 20:26:28.512282 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 12 20:26:28.513591 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 20:26:28.513623 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 20:26:28.514800 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 20:26:28.514827 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 20:26:28.516198 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 12 20:26:28.516706 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 20:26:28.516766 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 20:26:28.517594 systemd[1]: Reached target initrd-switch-root.target. Feb 12 20:26:28.519589 systemd[1]: Starting initrd-switch-root.service... Feb 12 20:26:28.533248 systemd[1]: Switching root. Feb 12 20:26:28.552050 systemd-journald[197]: Journal stopped Feb 12 20:26:32.038963 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 20:26:32.039043 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 20:26:32.039089 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 20:26:32.039102 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 20:26:32.039125 kernel: SELinux: policy capability open_perms=1 Feb 12 20:26:32.039138 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 20:26:32.039157 kernel: SELinux: policy capability always_check_network=0 Feb 12 20:26:32.039170 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 20:26:32.039184 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 20:26:32.039196 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 20:26:32.039208 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 20:26:32.039222 systemd[1]: Successfully loaded SELinux policy in 40.551ms. Feb 12 20:26:32.039247 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 8.603ms. Feb 12 20:26:32.039261 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 20:26:32.039275 systemd[1]: Detected virtualization kvm. Feb 12 20:26:32.039310 systemd[1]: Detected architecture x86-64. Feb 12 20:26:32.039332 systemd[1]: Detected first boot. Feb 12 20:26:32.039385 systemd[1]: Initializing machine ID from VM UUID. Feb 12 20:26:32.039412 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 20:26:32.039425 systemd[1]: Populated /etc with preset unit settings. Feb 12 20:26:32.039446 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:26:32.039480 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:26:32.039509 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:26:32.039525 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 20:26:32.039550 systemd[1]: Stopped iscsid.service. Feb 12 20:26:32.039569 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 20:26:32.039582 systemd[1]: Stopped initrd-switch-root.service. Feb 12 20:26:32.039595 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 20:26:32.039608 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 20:26:32.039622 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 20:26:32.039635 systemd[1]: Created slice system-getty.slice. Feb 12 20:26:32.039648 systemd[1]: Created slice system-modprobe.slice. Feb 12 20:26:32.039664 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 20:26:32.039678 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 20:26:32.039691 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 20:26:32.039705 systemd[1]: Created slice user.slice. Feb 12 20:26:32.039717 systemd[1]: Started systemd-ask-password-console.path. Feb 12 20:26:32.039730 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 20:26:32.039752 systemd[1]: Set up automount boot.automount. Feb 12 20:26:32.039766 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 20:26:32.039779 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 20:26:32.039802 systemd[1]: Stopped target initrd-fs.target. Feb 12 20:26:32.039830 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 20:26:32.039873 systemd[1]: Reached target integritysetup.target. Feb 12 20:26:32.039893 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 20:26:32.039906 systemd[1]: Reached target remote-fs.target. Feb 12 20:26:32.039934 systemd[1]: Reached target slices.target. Feb 12 20:26:32.039955 systemd[1]: Reached target swap.target. Feb 12 20:26:32.039967 systemd[1]: Reached target torcx.target. Feb 12 20:26:32.039983 systemd[1]: Reached target veritysetup.target. Feb 12 20:26:32.039996 systemd[1]: Listening on systemd-coredump.socket. Feb 12 20:26:32.040009 systemd[1]: Listening on systemd-initctl.socket. Feb 12 20:26:32.040022 systemd[1]: Listening on systemd-networkd.socket. Feb 12 20:26:32.040034 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 20:26:32.040047 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 20:26:32.040060 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 20:26:32.040073 systemd[1]: Mounting dev-hugepages.mount... Feb 12 20:26:32.040088 systemd[1]: Mounting dev-mqueue.mount... Feb 12 20:26:32.040101 systemd[1]: Mounting media.mount... Feb 12 20:26:32.040115 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 20:26:32.040128 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 20:26:32.040149 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 20:26:32.040168 systemd[1]: Mounting tmp.mount... Feb 12 20:26:32.040185 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 20:26:32.040199 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 20:26:32.040228 systemd[1]: Starting kmod-static-nodes.service... Feb 12 20:26:32.040258 systemd[1]: Starting modprobe@configfs.service... Feb 12 20:26:32.040282 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 20:26:32.040334 systemd[1]: Starting modprobe@drm.service... Feb 12 20:26:32.040348 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 20:26:32.040362 systemd[1]: Starting modprobe@fuse.service... Feb 12 20:26:32.040376 systemd[1]: Starting modprobe@loop.service... Feb 12 20:26:32.040402 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 20:26:32.040417 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 20:26:32.040432 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 20:26:32.040446 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 20:26:32.040463 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 20:26:32.040478 systemd[1]: Stopped systemd-journald.service. Feb 12 20:26:32.040492 systemd[1]: Starting systemd-journald.service... Feb 12 20:26:32.040506 kernel: loop: module loaded Feb 12 20:26:32.040520 kernel: fuse: init (API version 7.34) Feb 12 20:26:32.040534 systemd[1]: Starting systemd-modules-load.service... Feb 12 20:26:32.040547 systemd[1]: Starting systemd-network-generator.service... Feb 12 20:26:32.040561 systemd[1]: Starting systemd-remount-fs.service... Feb 12 20:26:32.040575 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 20:26:32.040592 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 20:26:32.040609 systemd[1]: Stopped verity-setup.service. Feb 12 20:26:32.040624 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 20:26:32.040639 systemd[1]: Mounted dev-hugepages.mount. Feb 12 20:26:32.040653 systemd[1]: Mounted dev-mqueue.mount. Feb 12 20:26:32.040667 systemd[1]: Mounted media.mount. Feb 12 20:26:32.040682 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 20:26:32.040698 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 20:26:32.040713 systemd[1]: Mounted tmp.mount. Feb 12 20:26:32.040727 systemd[1]: Finished kmod-static-nodes.service. Feb 12 20:26:32.040743 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 20:26:32.040758 systemd[1]: Finished modprobe@configfs.service. Feb 12 20:26:32.040772 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 20:26:32.040787 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 20:26:32.040802 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 20:26:32.040819 systemd[1]: Finished modprobe@drm.service. Feb 12 20:26:32.040843 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 20:26:32.040861 systemd-journald[972]: Journal started Feb 12 20:26:32.040922 systemd-journald[972]: Runtime Journal (/run/log/journal/26f6cdfee24b45f9b35f2e0cb5f4ec48) is 6.0M, max 48.5M, 42.5M free. Feb 12 20:26:28.602000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 20:26:29.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 20:26:29.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 20:26:29.793000 audit: BPF prog-id=10 op=LOAD Feb 12 20:26:29.793000 audit: BPF prog-id=10 op=UNLOAD Feb 12 20:26:29.793000 audit: BPF prog-id=11 op=LOAD Feb 12 20:26:29.793000 audit: BPF prog-id=11 op=UNLOAD Feb 12 20:26:29.820000 audit[899]: AVC avc: denied { associate } for pid=899 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 20:26:29.820000 audit[899]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001178dc a1=c00002ae40 a2=c000029b00 a3=32 items=0 ppid=882 pid=899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:29.820000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 20:26:29.826000 audit[899]: AVC avc: denied { associate } for pid=899 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 20:26:29.826000 audit[899]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001179b5 a2=1ed a3=0 items=2 ppid=882 pid=899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:29.826000 audit: CWD cwd="/" Feb 12 20:26:29.826000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:29.826000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:29.826000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 20:26:31.926000 audit: BPF prog-id=12 op=LOAD Feb 12 20:26:31.926000 audit: BPF prog-id=3 op=UNLOAD Feb 12 20:26:31.926000 audit: BPF prog-id=13 op=LOAD Feb 12 20:26:31.926000 audit: BPF prog-id=14 op=LOAD Feb 12 20:26:31.926000 audit: BPF prog-id=4 op=UNLOAD Feb 12 20:26:31.926000 audit: BPF prog-id=5 op=UNLOAD Feb 12 20:26:31.926000 audit: BPF prog-id=15 op=LOAD Feb 12 20:26:31.926000 audit: BPF prog-id=12 op=UNLOAD Feb 12 20:26:31.926000 audit: BPF prog-id=16 op=LOAD Feb 12 20:26:31.926000 audit: BPF prog-id=17 op=LOAD Feb 12 20:26:31.926000 audit: BPF prog-id=13 op=UNLOAD Feb 12 20:26:31.926000 audit: BPF prog-id=14 op=UNLOAD Feb 12 20:26:31.927000 audit: BPF prog-id=18 op=LOAD Feb 12 20:26:31.927000 audit: BPF prog-id=15 op=UNLOAD Feb 12 20:26:31.928000 audit: BPF prog-id=19 op=LOAD Feb 12 20:26:31.928000 audit: BPF prog-id=20 op=LOAD Feb 12 20:26:31.928000 audit: BPF prog-id=16 op=UNLOAD Feb 12 20:26:31.928000 audit: BPF prog-id=17 op=UNLOAD Feb 12 20:26:31.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:31.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:31.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.042386 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 20:26:31.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:31.941000 audit: BPF prog-id=18 op=UNLOAD Feb 12 20:26:32.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.007000 audit: BPF prog-id=21 op=LOAD Feb 12 20:26:32.007000 audit: BPF prog-id=22 op=LOAD Feb 12 20:26:32.008000 audit: BPF prog-id=23 op=LOAD Feb 12 20:26:32.008000 audit: BPF prog-id=19 op=UNLOAD Feb 12 20:26:32.008000 audit: BPF prog-id=20 op=UNLOAD Feb 12 20:26:32.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.037000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 20:26:32.037000 audit[972]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fff0e0ae400 a2=4000 a3=7fff0e0ae49c items=0 ppid=1 pid=972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:32.037000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 20:26:32.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:31.924973 systemd[1]: Queued start job for default target multi-user.target. Feb 12 20:26:29.819179 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-12T20:26:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:26:31.924985 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 12 20:26:29.819398 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-12T20:26:29Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 20:26:31.928794 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 20:26:29.819418 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-12T20:26:29Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 20:26:32.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:29.819449 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-12T20:26:29Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 20:26:29.819461 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-12T20:26:29Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 20:26:29.819492 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-12T20:26:29Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 20:26:32.044421 systemd[1]: Started systemd-journald.service. Feb 12 20:26:32.044253 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 20:26:29.819507 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-12T20:26:29Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 20:26:29.819704 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-12T20:26:29Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 20:26:29.819732 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-12T20:26:29Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 20:26:29.819743 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-12T20:26:29Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 20:26:32.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:29.820014 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-12T20:26:29Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 20:26:29.820042 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-12T20:26:29Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 20:26:29.820057 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-12T20:26:29Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 20:26:29.820069 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-12T20:26:29Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 20:26:32.045154 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 20:26:29.820082 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-12T20:26:29Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 20:26:32.045360 systemd[1]: Finished modprobe@fuse.service. Feb 12 20:26:29.820094 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-12T20:26:29Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 20:26:31.648469 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-12T20:26:31Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:26:31.648715 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-12T20:26:31Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:26:31.648807 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-12T20:26:31Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:26:31.648965 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-12T20:26:31Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:26:31.649009 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-12T20:26:31Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 20:26:31.649059 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-12T20:26:31Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 20:26:32.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.046230 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 20:26:32.046453 systemd[1]: Finished modprobe@loop.service. Feb 12 20:26:32.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.047282 systemd[1]: Finished systemd-modules-load.service. Feb 12 20:26:32.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.048176 systemd[1]: Finished systemd-network-generator.service. Feb 12 20:26:32.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.049066 systemd[1]: Finished systemd-remount-fs.service. Feb 12 20:26:32.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.050043 systemd[1]: Reached target network-pre.target. Feb 12 20:26:32.051604 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 20:26:32.053121 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 20:26:32.053660 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 20:26:32.056120 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 20:26:32.057503 systemd[1]: Starting systemd-journal-flush.service... Feb 12 20:26:32.058081 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 20:26:32.058845 systemd[1]: Starting systemd-random-seed.service... Feb 12 20:26:32.059504 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 20:26:32.060243 systemd[1]: Starting systemd-sysctl.service... Feb 12 20:26:32.061624 systemd[1]: Starting systemd-sysusers.service... Feb 12 20:26:32.066169 systemd-journald[972]: Time spent on flushing to /var/log/journal/26f6cdfee24b45f9b35f2e0cb5f4ec48 is 15.040ms for 1135 entries. Feb 12 20:26:32.066169 systemd-journald[972]: System Journal (/var/log/journal/26f6cdfee24b45f9b35f2e0cb5f4ec48) is 8.0M, max 195.6M, 187.6M free. Feb 12 20:26:32.096017 systemd-journald[972]: Received client request to flush runtime journal. Feb 12 20:26:32.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.064722 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 20:26:32.067121 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 20:26:32.097513 udevadm[1002]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 12 20:26:32.068077 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 20:26:32.069863 systemd[1]: Starting systemd-udev-settle.service... Feb 12 20:26:32.072765 systemd[1]: Finished systemd-random-seed.service. Feb 12 20:26:32.073588 systemd[1]: Reached target first-boot-complete.target. Feb 12 20:26:32.079587 systemd[1]: Finished systemd-sysusers.service. Feb 12 20:26:32.081084 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 20:26:32.082878 systemd[1]: Finished systemd-sysctl.service. Feb 12 20:26:32.093673 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 20:26:32.096600 systemd[1]: Finished systemd-journal-flush.service. Feb 12 20:26:32.557641 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 20:26:32.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.558000 audit: BPF prog-id=24 op=LOAD Feb 12 20:26:32.558000 audit: BPF prog-id=25 op=LOAD Feb 12 20:26:32.558000 audit: BPF prog-id=7 op=UNLOAD Feb 12 20:26:32.558000 audit: BPF prog-id=8 op=UNLOAD Feb 12 20:26:32.560073 systemd[1]: Starting systemd-udevd.service... Feb 12 20:26:32.574462 systemd-udevd[1008]: Using default interface naming scheme 'v252'. Feb 12 20:26:32.585233 systemd[1]: Started systemd-udevd.service. Feb 12 20:26:32.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.587424 systemd[1]: Starting systemd-networkd.service... Feb 12 20:26:32.586000 audit: BPF prog-id=26 op=LOAD Feb 12 20:26:32.593000 audit: BPF prog-id=27 op=LOAD Feb 12 20:26:32.593000 audit: BPF prog-id=28 op=LOAD Feb 12 20:26:32.593000 audit: BPF prog-id=29 op=LOAD Feb 12 20:26:32.594593 systemd[1]: Starting systemd-userdbd.service... Feb 12 20:26:32.620655 systemd[1]: Started systemd-userdbd.service. Feb 12 20:26:32.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.626651 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 12 20:26:32.644313 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 12 20:26:32.649345 kernel: ACPI: button: Power Button [PWRF] Feb 12 20:26:32.657915 systemd-networkd[1018]: lo: Link UP Feb 12 20:26:32.657927 systemd-networkd[1018]: lo: Gained carrier Feb 12 20:26:32.658265 systemd-networkd[1018]: Enumeration completed Feb 12 20:26:32.658431 systemd[1]: Started systemd-networkd.service. Feb 12 20:26:32.658715 systemd-networkd[1018]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 20:26:32.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.659827 systemd-networkd[1018]: eth0: Link UP Feb 12 20:26:32.659838 systemd-networkd[1018]: eth0: Gained carrier Feb 12 20:26:32.661280 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 20:26:32.657000 audit[1009]: AVC avc: denied { confidentiality } for pid=1009 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 20:26:32.657000 audit[1009]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=555f02a87800 a1=32194 a2=7f44394b4bc5 a3=5 items=108 ppid=1008 pid=1009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:32.657000 audit: CWD cwd="/" Feb 12 20:26:32.657000 audit: PATH item=0 name=(null) inode=44 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=1 name=(null) inode=13910 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=2 name=(null) inode=13910 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=3 name=(null) inode=13911 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=4 name=(null) inode=13910 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=5 name=(null) inode=13912 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=6 name=(null) inode=13910 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=7 name=(null) inode=13913 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=8 name=(null) inode=13913 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=9 name=(null) inode=13914 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=10 name=(null) inode=13913 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=11 name=(null) inode=13915 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=12 name=(null) inode=13913 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=13 name=(null) inode=13916 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=14 name=(null) inode=13913 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=15 name=(null) inode=13917 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=16 name=(null) inode=13913 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=17 name=(null) inode=13918 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=18 name=(null) inode=13910 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=19 name=(null) inode=13919 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=20 name=(null) inode=13919 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=21 name=(null) inode=13920 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=22 name=(null) inode=13919 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=23 name=(null) inode=13921 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=24 name=(null) inode=13919 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=25 name=(null) inode=13922 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=26 name=(null) inode=13919 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=27 name=(null) inode=13923 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=28 name=(null) inode=13919 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=29 name=(null) inode=13924 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=30 name=(null) inode=13910 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=31 name=(null) inode=13925 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=32 name=(null) inode=13925 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=33 name=(null) inode=13926 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=34 name=(null) inode=13925 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=35 name=(null) inode=13927 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=36 name=(null) inode=13925 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=37 name=(null) inode=13928 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=38 name=(null) inode=13925 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=39 name=(null) inode=13929 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=40 name=(null) inode=13925 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=41 name=(null) inode=13930 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=42 name=(null) inode=13910 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=43 name=(null) inode=13931 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=44 name=(null) inode=13931 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=45 name=(null) inode=13932 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=46 name=(null) inode=13931 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=47 name=(null) inode=13933 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=48 name=(null) inode=13931 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=49 name=(null) inode=13934 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=50 name=(null) inode=13931 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=51 name=(null) inode=13935 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=52 name=(null) inode=13931 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=53 name=(null) inode=13936 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=54 name=(null) inode=44 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=55 name=(null) inode=13937 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=56 name=(null) inode=13937 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=57 name=(null) inode=13938 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=58 name=(null) inode=13937 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=59 name=(null) inode=13939 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=60 name=(null) inode=13937 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=61 name=(null) inode=13940 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=62 name=(null) inode=13940 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=63 name=(null) inode=13941 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=64 name=(null) inode=13940 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=65 name=(null) inode=13942 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=66 name=(null) inode=13940 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=67 name=(null) inode=13943 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=68 name=(null) inode=13940 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=69 name=(null) inode=13944 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=70 name=(null) inode=13940 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=71 name=(null) inode=13945 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=72 name=(null) inode=13937 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=73 name=(null) inode=13946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=74 name=(null) inode=13946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=75 name=(null) inode=13947 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=76 name=(null) inode=13946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=77 name=(null) inode=13948 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=78 name=(null) inode=13946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=79 name=(null) inode=13949 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=80 name=(null) inode=13946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=81 name=(null) inode=13950 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=82 name=(null) inode=13946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=83 name=(null) inode=13951 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=84 name=(null) inode=13937 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=85 name=(null) inode=13952 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=86 name=(null) inode=13952 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=87 name=(null) inode=13953 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=88 name=(null) inode=13952 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=89 name=(null) inode=13954 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=90 name=(null) inode=13952 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=91 name=(null) inode=13955 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=92 name=(null) inode=13952 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=93 name=(null) inode=13956 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=94 name=(null) inode=13952 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=95 name=(null) inode=13957 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=96 name=(null) inode=13937 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=97 name=(null) inode=13958 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=98 name=(null) inode=13958 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=99 name=(null) inode=13959 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=100 name=(null) inode=13958 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=101 name=(null) inode=13960 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=102 name=(null) inode=13958 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=103 name=(null) inode=13961 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=104 name=(null) inode=13958 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=105 name=(null) inode=13962 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=106 name=(null) inode=13958 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PATH item=107 name=(null) inode=13963 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.657000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 20:26:32.667311 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Feb 12 20:26:32.673398 systemd-networkd[1018]: eth0: DHCPv4 address 10.0.0.105/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 12 20:26:32.679316 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Feb 12 20:26:32.696315 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 20:26:32.740003 kernel: kvm: Nested Virtualization enabled Feb 12 20:26:32.740093 kernel: SVM: kvm: Nested Paging enabled Feb 12 20:26:32.740108 kernel: SVM: Virtual VMLOAD VMSAVE supported Feb 12 20:26:32.740125 kernel: SVM: Virtual GIF supported Feb 12 20:26:32.754326 kernel: EDAC MC: Ver: 3.0.0 Feb 12 20:26:32.773717 systemd[1]: Finished systemd-udev-settle.service. Feb 12 20:26:32.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.775742 systemd[1]: Starting lvm2-activation-early.service... Feb 12 20:26:32.782317 lvm[1044]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 20:26:32.808069 systemd[1]: Finished lvm2-activation-early.service. Feb 12 20:26:32.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.808902 systemd[1]: Reached target cryptsetup.target. Feb 12 20:26:32.810571 systemd[1]: Starting lvm2-activation.service... Feb 12 20:26:32.813613 lvm[1045]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 20:26:32.839009 systemd[1]: Finished lvm2-activation.service. Feb 12 20:26:32.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.839742 systemd[1]: Reached target local-fs-pre.target. Feb 12 20:26:32.840381 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 20:26:32.840402 systemd[1]: Reached target local-fs.target. Feb 12 20:26:32.840970 systemd[1]: Reached target machines.target. Feb 12 20:26:32.842640 systemd[1]: Starting ldconfig.service... Feb 12 20:26:32.843480 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 20:26:32.843513 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 20:26:32.844353 systemd[1]: Starting systemd-boot-update.service... Feb 12 20:26:32.845897 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 20:26:32.847762 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 20:26:32.849598 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 20:26:32.849630 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 20:26:32.850594 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 20:26:32.851528 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1047 (bootctl) Feb 12 20:26:32.852659 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 20:26:32.853887 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 20:26:32.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:32.861724 systemd-tmpfiles[1050]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 20:26:32.862207 systemd-tmpfiles[1050]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 20:26:32.863420 systemd-tmpfiles[1050]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 20:26:32.882317 systemd-fsck[1055]: fsck.fat 4.2 (2021-01-31) Feb 12 20:26:32.882317 systemd-fsck[1055]: /dev/vda1: 789 files, 115339/258078 clusters Feb 12 20:26:32.883585 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 20:26:32.885974 systemd[1]: Mounting boot.mount... Feb 12 20:26:32.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:33.042752 systemd[1]: Mounted boot.mount. Feb 12 20:26:33.054886 systemd[1]: Finished systemd-boot-update.service. Feb 12 20:26:33.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:33.228529 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 20:26:33.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:33.230722 systemd[1]: Starting audit-rules.service... Feb 12 20:26:33.232467 systemd[1]: Starting clean-ca-certificates.service... Feb 12 20:26:33.234255 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 20:26:33.235000 audit: BPF prog-id=30 op=LOAD Feb 12 20:26:33.238000 audit: BPF prog-id=31 op=LOAD Feb 12 20:26:33.236979 systemd[1]: Starting systemd-resolved.service... Feb 12 20:26:33.239466 systemd[1]: Starting systemd-timesyncd.service... Feb 12 20:26:33.242562 systemd[1]: Starting systemd-update-utmp.service... Feb 12 20:26:33.245449 ldconfig[1046]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 20:26:33.244840 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 20:26:33.246000 audit[1071]: SYSTEM_BOOT pid=1071 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 20:26:33.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:33.246161 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 20:26:33.247379 systemd[1]: Finished clean-ca-certificates.service. Feb 12 20:26:33.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:33.250539 systemd[1]: Finished ldconfig.service. Feb 12 20:26:33.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:33.251455 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 20:26:33.252780 systemd[1]: Finished systemd-update-utmp.service. Feb 12 20:26:33.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:33.254138 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 20:26:33.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:33.257945 systemd[1]: Starting systemd-update-done.service... Feb 12 20:26:33.263847 systemd[1]: Finished systemd-update-done.service. Feb 12 20:26:33.263000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 20:26:33.263000 audit[1080]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffe1d3ee40 a2=420 a3=0 items=0 ppid=1059 pid=1080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:33.263000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 20:26:33.264239 augenrules[1080]: No rules Feb 12 20:26:33.264893 systemd[1]: Finished audit-rules.service. Feb 12 20:26:33.288055 systemd-resolved[1066]: Positive Trust Anchors: Feb 12 20:26:33.288068 systemd-resolved[1066]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 20:26:33.288095 systemd-resolved[1066]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 20:26:33.294781 systemd-resolved[1066]: Defaulting to hostname 'linux'. Feb 12 20:26:33.296145 systemd[1]: Started systemd-resolved.service. Feb 12 20:26:33.297047 systemd[1]: Reached target network.target. Feb 12 20:26:33.297773 systemd[1]: Reached target nss-lookup.target. Feb 12 20:26:33.299262 systemd[1]: Started systemd-timesyncd.service. Feb 12 20:26:33.300103 systemd[1]: Reached target sysinit.target. Feb 12 20:26:34.292878 systemd-resolved[1066]: Clock change detected. Flushing caches. Feb 12 20:26:34.292922 systemd-timesyncd[1069]: Contacted time server 10.0.0.1:123 (10.0.0.1). Feb 12 20:26:34.292988 systemd-timesyncd[1069]: Initial clock synchronization to Mon 2024-02-12 20:26:34.292842 UTC. Feb 12 20:26:34.293497 systemd[1]: Started motdgen.path. Feb 12 20:26:34.294022 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 20:26:34.294780 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 20:26:34.295381 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 20:26:34.295404 systemd[1]: Reached target paths.target. Feb 12 20:26:34.295930 systemd[1]: Reached target time-set.target. Feb 12 20:26:34.296591 systemd[1]: Started logrotate.timer. Feb 12 20:26:34.297197 systemd[1]: Started mdadm.timer. Feb 12 20:26:34.297691 systemd[1]: Reached target timers.target. Feb 12 20:26:34.298483 systemd[1]: Listening on dbus.socket. Feb 12 20:26:34.299793 systemd[1]: Starting docker.socket... Feb 12 20:26:34.301908 systemd[1]: Listening on sshd.socket. Feb 12 20:26:34.302564 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 20:26:34.302871 systemd[1]: Listening on docker.socket. Feb 12 20:26:34.303585 systemd[1]: Reached target sockets.target. Feb 12 20:26:34.304206 systemd[1]: Reached target basic.target. Feb 12 20:26:34.304772 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 20:26:34.304790 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 20:26:34.305462 systemd[1]: Starting containerd.service... Feb 12 20:26:34.306925 systemd[1]: Starting dbus.service... Feb 12 20:26:34.308254 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 20:26:34.309993 systemd[1]: Starting extend-filesystems.service... Feb 12 20:26:34.310910 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 20:26:34.311691 jq[1091]: false Feb 12 20:26:34.311938 systemd[1]: Starting motdgen.service... Feb 12 20:26:34.313552 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 20:26:34.316627 systemd[1]: Starting prepare-critools.service... Feb 12 20:26:34.318653 systemd[1]: Starting prepare-helm.service... Feb 12 20:26:34.319763 extend-filesystems[1092]: Found sr0 Feb 12 20:26:34.319763 extend-filesystems[1092]: Found vda Feb 12 20:26:34.319763 extend-filesystems[1092]: Found vda1 Feb 12 20:26:34.319763 extend-filesystems[1092]: Found vda2 Feb 12 20:26:34.319763 extend-filesystems[1092]: Found vda3 Feb 12 20:26:34.319763 extend-filesystems[1092]: Found usr Feb 12 20:26:34.319763 extend-filesystems[1092]: Found vda4 Feb 12 20:26:34.319763 extend-filesystems[1092]: Found vda6 Feb 12 20:26:34.319763 extend-filesystems[1092]: Found vda7 Feb 12 20:26:34.319763 extend-filesystems[1092]: Found vda9 Feb 12 20:26:34.319763 extend-filesystems[1092]: Checking size of /dev/vda9 Feb 12 20:26:34.339010 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Feb 12 20:26:34.339410 extend-filesystems[1092]: Resized partition /dev/vda9 Feb 12 20:26:34.322014 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 20:26:34.345841 extend-filesystems[1110]: resize2fs 1.46.5 (30-Dec-2021) Feb 12 20:26:34.343391 dbus-daemon[1090]: [system] SELinux support is enabled Feb 12 20:26:34.323249 systemd[1]: Starting sshd-keygen.service... Feb 12 20:26:34.326614 systemd[1]: Starting systemd-logind.service... Feb 12 20:26:34.327236 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 20:26:34.327284 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 20:26:34.327691 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 20:26:34.353379 jq[1113]: true Feb 12 20:26:34.328325 systemd[1]: Starting update-engine.service... Feb 12 20:26:34.353577 tar[1116]: crictl Feb 12 20:26:34.330254 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 20:26:34.353894 tar[1117]: linux-amd64/helm Feb 12 20:26:34.332578 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 20:26:34.355790 jq[1118]: true Feb 12 20:26:34.332753 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 20:26:34.359881 tar[1115]: ./ Feb 12 20:26:34.359881 tar[1115]: ./loopback Feb 12 20:26:34.333050 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 20:26:34.333207 systemd[1]: Finished motdgen.service. Feb 12 20:26:34.340775 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 20:26:34.340931 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 20:26:34.344659 systemd[1]: Started dbus.service. Feb 12 20:26:34.354025 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 20:26:34.354052 systemd[1]: Reached target system-config.target. Feb 12 20:26:34.355015 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 20:26:34.355035 systemd[1]: Reached target user-config.target. Feb 12 20:26:34.369976 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Feb 12 20:26:34.377040 update_engine[1112]: I0212 20:26:34.376922 1112 main.cc:92] Flatcar Update Engine starting Feb 12 20:26:34.388436 update_engine[1112]: I0212 20:26:34.386806 1112 update_check_scheduler.cc:74] Next update check in 2m42s Feb 12 20:26:34.386204 systemd[1]: Started update-engine.service. Feb 12 20:26:34.388347 systemd[1]: Started locksmithd.service. Feb 12 20:26:34.392688 extend-filesystems[1110]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 12 20:26:34.392688 extend-filesystems[1110]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 12 20:26:34.392688 extend-filesystems[1110]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Feb 12 20:26:34.400248 env[1123]: time="2024-02-12T20:26:34.389994940Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 20:26:34.401981 extend-filesystems[1092]: Resized filesystem in /dev/vda9 Feb 12 20:26:34.392920 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 20:26:34.393110 systemd[1]: Finished extend-filesystems.service. Feb 12 20:26:34.404119 bash[1146]: Updated "/home/core/.ssh/authorized_keys" Feb 12 20:26:34.406422 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 20:26:34.426530 systemd-logind[1111]: Watching system buttons on /dev/input/event1 (Power Button) Feb 12 20:26:34.426557 systemd-logind[1111]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 12 20:26:34.426747 systemd-logind[1111]: New seat seat0. Feb 12 20:26:34.430139 systemd[1]: Started systemd-logind.service. Feb 12 20:26:34.440492 tar[1115]: ./bandwidth Feb 12 20:26:34.441913 env[1123]: time="2024-02-12T20:26:34.441856978Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 20:26:34.442077 env[1123]: time="2024-02-12T20:26:34.442050221Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:26:34.443682 env[1123]: time="2024-02-12T20:26:34.443641947Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 20:26:34.443682 env[1123]: time="2024-02-12T20:26:34.443672885Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:26:34.443918 env[1123]: time="2024-02-12T20:26:34.443876476Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 20:26:34.443918 env[1123]: time="2024-02-12T20:26:34.443891845Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 20:26:34.443918 env[1123]: time="2024-02-12T20:26:34.443905902Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 20:26:34.444039 env[1123]: time="2024-02-12T20:26:34.443916702Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 20:26:34.444039 env[1123]: time="2024-02-12T20:26:34.443994658Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:26:34.444223 env[1123]: time="2024-02-12T20:26:34.444200825Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:26:34.444338 env[1123]: time="2024-02-12T20:26:34.444316552Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 20:26:34.444338 env[1123]: time="2024-02-12T20:26:34.444334365Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 20:26:34.444433 env[1123]: time="2024-02-12T20:26:34.444378789Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 20:26:34.444433 env[1123]: time="2024-02-12T20:26:34.444391462Z" level=info msg="metadata content store policy set" policy=shared Feb 12 20:26:34.467107 env[1123]: time="2024-02-12T20:26:34.466182937Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 20:26:34.467107 env[1123]: time="2024-02-12T20:26:34.466224545Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 20:26:34.467107 env[1123]: time="2024-02-12T20:26:34.466266554Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 20:26:34.467107 env[1123]: time="2024-02-12T20:26:34.466297271Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 20:26:34.467107 env[1123]: time="2024-02-12T20:26:34.466320174Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 20:26:34.467107 env[1123]: time="2024-02-12T20:26:34.466334481Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 20:26:34.467107 env[1123]: time="2024-02-12T20:26:34.466348397Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 20:26:34.467107 env[1123]: time="2024-02-12T20:26:34.466381530Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 20:26:34.467107 env[1123]: time="2024-02-12T20:26:34.466405565Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 20:26:34.467107 env[1123]: time="2024-02-12T20:26:34.466418108Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 20:26:34.467107 env[1123]: time="2024-02-12T20:26:34.466430582Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 20:26:34.467107 env[1123]: time="2024-02-12T20:26:34.466442404Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 20:26:34.467107 env[1123]: time="2024-02-12T20:26:34.466596393Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 20:26:34.467107 env[1123]: time="2024-02-12T20:26:34.466692713Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 20:26:34.467574 env[1123]: time="2024-02-12T20:26:34.467045976Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 20:26:34.467574 env[1123]: time="2024-02-12T20:26:34.467068989Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 20:26:34.467574 env[1123]: time="2024-02-12T20:26:34.467080971Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 20:26:34.467843 env[1123]: time="2024-02-12T20:26:34.467761047Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 20:26:34.467843 env[1123]: time="2024-02-12T20:26:34.467795612Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 20:26:34.467945 env[1123]: time="2024-02-12T20:26:34.467925175Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 20:26:34.468072 env[1123]: time="2024-02-12T20:26:34.468051201Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 20:26:34.468211 env[1123]: time="2024-02-12T20:26:34.468187297Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 20:26:34.468366 env[1123]: time="2024-02-12T20:26:34.468329724Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 20:26:34.468577 env[1123]: time="2024-02-12T20:26:34.468558533Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 20:26:34.468685 env[1123]: time="2024-02-12T20:26:34.468665403Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 20:26:34.468810 env[1123]: time="2024-02-12T20:26:34.468790318Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 20:26:34.469141 env[1123]: time="2024-02-12T20:26:34.469108234Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 20:26:34.469271 env[1123]: time="2024-02-12T20:26:34.469231355Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 20:26:34.469420 env[1123]: time="2024-02-12T20:26:34.469369404Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 20:26:34.469537 env[1123]: time="2024-02-12T20:26:34.469514967Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 20:26:34.469653 env[1123]: time="2024-02-12T20:26:34.469630253Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 20:26:34.469758 env[1123]: time="2024-02-12T20:26:34.469737645Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 20:26:34.469872 env[1123]: time="2024-02-12T20:26:34.469850386Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 20:26:34.470032 env[1123]: time="2024-02-12T20:26:34.469997853Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 20:26:34.470443 env[1123]: time="2024-02-12T20:26:34.470370482Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 20:26:34.471060 env[1123]: time="2024-02-12T20:26:34.470609300Z" level=info msg="Connect containerd service" Feb 12 20:26:34.471060 env[1123]: time="2024-02-12T20:26:34.470680293Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 20:26:34.471453 env[1123]: time="2024-02-12T20:26:34.471385606Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 20:26:34.471920 env[1123]: time="2024-02-12T20:26:34.471643930Z" level=info msg="Start subscribing containerd event" Feb 12 20:26:34.471920 env[1123]: time="2024-02-12T20:26:34.471674337Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 20:26:34.471920 env[1123]: time="2024-02-12T20:26:34.471701869Z" level=info msg="Start recovering state" Feb 12 20:26:34.471920 env[1123]: time="2024-02-12T20:26:34.471726605Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 20:26:34.471920 env[1123]: time="2024-02-12T20:26:34.471752504Z" level=info msg="Start event monitor" Feb 12 20:26:34.471920 env[1123]: time="2024-02-12T20:26:34.471765348Z" level=info msg="Start snapshots syncer" Feb 12 20:26:34.471920 env[1123]: time="2024-02-12T20:26:34.471772782Z" level=info msg="Start cni network conf syncer for default" Feb 12 20:26:34.471920 env[1123]: time="2024-02-12T20:26:34.471787970Z" level=info msg="Start streaming server" Feb 12 20:26:34.471920 env[1123]: time="2024-02-12T20:26:34.471775467Z" level=info msg="containerd successfully booted in 0.092056s" Feb 12 20:26:34.471854 systemd[1]: Started containerd.service. Feb 12 20:26:34.481561 tar[1115]: ./ptp Feb 12 20:26:34.524753 tar[1115]: ./vlan Feb 12 20:26:34.565901 tar[1115]: ./host-device Feb 12 20:26:34.604565 tar[1115]: ./tuning Feb 12 20:26:34.639567 tar[1115]: ./vrf Feb 12 20:26:34.675769 tar[1115]: ./sbr Feb 12 20:26:34.711108 tar[1115]: ./tap Feb 12 20:26:34.752318 tar[1115]: ./dhcp Feb 12 20:26:34.785924 tar[1117]: linux-amd64/LICENSE Feb 12 20:26:34.786025 tar[1117]: linux-amd64/README.md Feb 12 20:26:34.790145 systemd[1]: Finished prepare-helm.service. Feb 12 20:26:34.804484 locksmithd[1148]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 20:26:34.819002 systemd[1]: Finished prepare-critools.service. Feb 12 20:26:34.838479 tar[1115]: ./static Feb 12 20:26:34.861038 tar[1115]: ./firewall Feb 12 20:26:34.893371 tar[1115]: ./macvlan Feb 12 20:26:34.924735 tar[1115]: ./dummy Feb 12 20:26:34.959833 tar[1115]: ./bridge Feb 12 20:26:35.000135 tar[1115]: ./ipvlan Feb 12 20:26:35.037499 tar[1115]: ./portmap Feb 12 20:26:35.070551 tar[1115]: ./host-local Feb 12 20:26:35.107340 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 20:26:35.262816 sshd_keygen[1135]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 20:26:35.278074 systemd[1]: Finished sshd-keygen.service. Feb 12 20:26:35.279850 systemd[1]: Starting issuegen.service... Feb 12 20:26:35.283542 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 20:26:35.283648 systemd[1]: Finished issuegen.service. Feb 12 20:26:35.285363 systemd[1]: Starting systemd-user-sessions.service... Feb 12 20:26:35.289969 systemd[1]: Finished systemd-user-sessions.service. Feb 12 20:26:35.291732 systemd[1]: Started getty@tty1.service. Feb 12 20:26:35.293269 systemd[1]: Started serial-getty@ttyS0.service. Feb 12 20:26:35.294054 systemd[1]: Reached target getty.target. Feb 12 20:26:35.294695 systemd[1]: Reached target multi-user.target. Feb 12 20:26:35.296156 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 20:26:35.301671 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 20:26:35.301791 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 20:26:35.302583 systemd[1]: Startup finished in 567ms (kernel) + 5.871s (initrd) + 5.749s (userspace) = 12.188s. Feb 12 20:26:35.661360 systemd-networkd[1018]: eth0: Gained IPv6LL Feb 12 20:26:43.838861 systemd[1]: Created slice system-sshd.slice. Feb 12 20:26:43.839800 systemd[1]: Started sshd@0-10.0.0.105:22-10.0.0.1:46680.service. Feb 12 20:26:43.877810 sshd[1180]: Accepted publickey for core from 10.0.0.1 port 46680 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:26:43.879249 sshd[1180]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:26:43.888457 systemd-logind[1111]: New session 1 of user core. Feb 12 20:26:43.889643 systemd[1]: Created slice user-500.slice. Feb 12 20:26:43.890916 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 20:26:43.899081 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 20:26:43.900301 systemd[1]: Starting user@500.service... Feb 12 20:26:43.902529 (systemd)[1183]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:26:43.967876 systemd[1183]: Queued start job for default target default.target. Feb 12 20:26:43.968343 systemd[1183]: Reached target paths.target. Feb 12 20:26:43.968360 systemd[1183]: Reached target sockets.target. Feb 12 20:26:43.968370 systemd[1183]: Reached target timers.target. Feb 12 20:26:43.968380 systemd[1183]: Reached target basic.target. Feb 12 20:26:43.968415 systemd[1183]: Reached target default.target. Feb 12 20:26:43.968436 systemd[1183]: Startup finished in 60ms. Feb 12 20:26:43.968516 systemd[1]: Started user@500.service. Feb 12 20:26:43.969459 systemd[1]: Started session-1.scope. Feb 12 20:26:44.021026 systemd[1]: Started sshd@1-10.0.0.105:22-10.0.0.1:46694.service. Feb 12 20:26:44.057549 sshd[1192]: Accepted publickey for core from 10.0.0.1 port 46694 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:26:44.058789 sshd[1192]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:26:44.062266 systemd-logind[1111]: New session 2 of user core. Feb 12 20:26:44.063010 systemd[1]: Started session-2.scope. Feb 12 20:26:44.117856 sshd[1192]: pam_unix(sshd:session): session closed for user core Feb 12 20:26:44.120380 systemd[1]: sshd@1-10.0.0.105:22-10.0.0.1:46694.service: Deactivated successfully. Feb 12 20:26:44.120881 systemd[1]: session-2.scope: Deactivated successfully. Feb 12 20:26:44.121428 systemd-logind[1111]: Session 2 logged out. Waiting for processes to exit. Feb 12 20:26:44.122526 systemd[1]: Started sshd@2-10.0.0.105:22-10.0.0.1:46700.service. Feb 12 20:26:44.123227 systemd-logind[1111]: Removed session 2. Feb 12 20:26:44.157521 sshd[1198]: Accepted publickey for core from 10.0.0.1 port 46700 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:26:44.158844 sshd[1198]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:26:44.162679 systemd-logind[1111]: New session 3 of user core. Feb 12 20:26:44.163713 systemd[1]: Started session-3.scope. Feb 12 20:26:44.216142 sshd[1198]: pam_unix(sshd:session): session closed for user core Feb 12 20:26:44.219387 systemd[1]: sshd@2-10.0.0.105:22-10.0.0.1:46700.service: Deactivated successfully. Feb 12 20:26:44.220044 systemd[1]: session-3.scope: Deactivated successfully. Feb 12 20:26:44.220632 systemd-logind[1111]: Session 3 logged out. Waiting for processes to exit. Feb 12 20:26:44.222016 systemd[1]: Started sshd@3-10.0.0.105:22-10.0.0.1:46702.service. Feb 12 20:26:44.222788 systemd-logind[1111]: Removed session 3. Feb 12 20:26:44.259288 sshd[1204]: Accepted publickey for core from 10.0.0.1 port 46702 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:26:44.260460 sshd[1204]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:26:44.263640 systemd-logind[1111]: New session 4 of user core. Feb 12 20:26:44.264411 systemd[1]: Started session-4.scope. Feb 12 20:26:44.317525 sshd[1204]: pam_unix(sshd:session): session closed for user core Feb 12 20:26:44.320252 systemd[1]: sshd@3-10.0.0.105:22-10.0.0.1:46702.service: Deactivated successfully. Feb 12 20:26:44.320751 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 20:26:44.321345 systemd-logind[1111]: Session 4 logged out. Waiting for processes to exit. Feb 12 20:26:44.322610 systemd[1]: Started sshd@4-10.0.0.105:22-10.0.0.1:46704.service. Feb 12 20:26:44.323501 systemd-logind[1111]: Removed session 4. Feb 12 20:26:44.357724 sshd[1210]: Accepted publickey for core from 10.0.0.1 port 46704 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:26:44.359081 sshd[1210]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:26:44.362547 systemd-logind[1111]: New session 5 of user core. Feb 12 20:26:44.363502 systemd[1]: Started session-5.scope. Feb 12 20:26:44.418248 sudo[1213]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 20:26:44.418405 sudo[1213]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:26:44.425157 dbus-daemon[1090]: ЍPA\xa1U: received setenforce notice (enforcing=1057300192) Feb 12 20:26:44.427193 sudo[1213]: pam_unix(sudo:session): session closed for user root Feb 12 20:26:44.429066 sshd[1210]: pam_unix(sshd:session): session closed for user core Feb 12 20:26:44.432046 systemd[1]: sshd@4-10.0.0.105:22-10.0.0.1:46704.service: Deactivated successfully. Feb 12 20:26:44.432665 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 20:26:44.433231 systemd-logind[1111]: Session 5 logged out. Waiting for processes to exit. Feb 12 20:26:44.434395 systemd[1]: Started sshd@5-10.0.0.105:22-10.0.0.1:58748.service. Feb 12 20:26:44.435085 systemd-logind[1111]: Removed session 5. Feb 12 20:26:44.470019 sshd[1217]: Accepted publickey for core from 10.0.0.1 port 58748 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:26:44.471115 sshd[1217]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:26:44.474461 systemd-logind[1111]: New session 6 of user core. Feb 12 20:26:44.475448 systemd[1]: Started session-6.scope. Feb 12 20:26:44.527992 sudo[1221]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 20:26:44.528149 sudo[1221]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:26:44.531064 sudo[1221]: pam_unix(sudo:session): session closed for user root Feb 12 20:26:44.534627 sudo[1220]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 20:26:44.534779 sudo[1220]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:26:44.542094 systemd[1]: Stopping audit-rules.service... Feb 12 20:26:44.541000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 20:26:44.542979 auditctl[1224]: No rules Feb 12 20:26:44.543213 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 20:26:44.543331 systemd[1]: Stopped audit-rules.service. Feb 12 20:26:44.543507 kernel: kauditd_printk_skb: 249 callbacks suppressed Feb 12 20:26:44.543535 kernel: audit: type=1305 audit(1707769604.541:172): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 20:26:44.544355 systemd[1]: Starting audit-rules.service... Feb 12 20:26:44.544975 kernel: audit: type=1300 audit(1707769604.541:172): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc19bc8f10 a2=420 a3=0 items=0 ppid=1 pid=1224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:44.541000 audit[1224]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc19bc8f10 a2=420 a3=0 items=0 ppid=1 pid=1224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:44.541000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 20:26:44.548774 kernel: audit: type=1327 audit(1707769604.541:172): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 20:26:44.548806 kernel: audit: type=1131 audit(1707769604.542:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:44.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:44.559544 augenrules[1241]: No rules Feb 12 20:26:44.560136 systemd[1]: Finished audit-rules.service. Feb 12 20:26:44.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:44.560885 sudo[1220]: pam_unix(sudo:session): session closed for user root Feb 12 20:26:44.584824 sshd[1217]: pam_unix(sshd:session): session closed for user core Feb 12 20:26:44.559000 audit[1220]: USER_END pid=1220 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:26:44.587423 systemd[1]: sshd@5-10.0.0.105:22-10.0.0.1:58748.service: Deactivated successfully. Feb 12 20:26:44.587858 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 20:26:44.588275 systemd-logind[1111]: Session 6 logged out. Waiting for processes to exit. Feb 12 20:26:44.589417 kernel: audit: type=1130 audit(1707769604.559:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:44.589460 kernel: audit: type=1106 audit(1707769604.559:175): pid=1220 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:26:44.589476 kernel: audit: type=1104 audit(1707769604.560:176): pid=1220 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:26:44.560000 audit[1220]: CRED_DISP pid=1220 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:26:44.589148 systemd[1]: Started sshd@6-10.0.0.105:22-10.0.0.1:58756.service. Feb 12 20:26:44.590054 systemd-logind[1111]: Removed session 6. Feb 12 20:26:44.584000 audit[1217]: USER_END pid=1217 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:26:44.594732 kernel: audit: type=1106 audit(1707769604.584:177): pid=1217 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:26:44.594770 kernel: audit: type=1104 audit(1707769604.584:178): pid=1217 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:26:44.584000 audit[1217]: CRED_DISP pid=1217 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:26:44.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.105:22-10.0.0.1:58748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:44.599325 kernel: audit: type=1131 audit(1707769604.586:179): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.105:22-10.0.0.1:58748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:44.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.105:22-10.0.0.1:58756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:44.625000 audit[1247]: USER_ACCT pid=1247 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:26:44.627106 sshd[1247]: Accepted publickey for core from 10.0.0.1 port 58756 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:26:44.626000 audit[1247]: CRED_ACQ pid=1247 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:26:44.626000 audit[1247]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7421db30 a2=3 a3=0 items=0 ppid=1 pid=1247 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:44.626000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:26:44.628211 sshd[1247]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:26:44.631447 systemd-logind[1111]: New session 7 of user core. Feb 12 20:26:44.632215 systemd[1]: Started session-7.scope. Feb 12 20:26:44.634000 audit[1247]: USER_START pid=1247 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:26:44.635000 audit[1249]: CRED_ACQ pid=1249 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:26:44.682000 audit[1250]: USER_ACCT pid=1250 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:26:44.682000 audit[1250]: CRED_REFR pid=1250 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:26:44.683068 sudo[1250]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 20:26:44.683229 sudo[1250]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:26:44.683000 audit[1250]: USER_START pid=1250 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:26:45.849098 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 20:26:45.853376 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 20:26:45.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:45.853683 systemd[1]: Reached target network-online.target. Feb 12 20:26:45.854699 systemd[1]: Starting docker.service... Feb 12 20:26:45.883423 env[1269]: time="2024-02-12T20:26:45.883370397Z" level=info msg="Starting up" Feb 12 20:26:45.884484 env[1269]: time="2024-02-12T20:26:45.884462876Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 20:26:45.884484 env[1269]: time="2024-02-12T20:26:45.884478075Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 20:26:45.884580 env[1269]: time="2024-02-12T20:26:45.884503773Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 20:26:45.884580 env[1269]: time="2024-02-12T20:26:45.884518701Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 20:26:45.885835 env[1269]: time="2024-02-12T20:26:45.885816285Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 20:26:45.885929 env[1269]: time="2024-02-12T20:26:45.885831684Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 20:26:45.885929 env[1269]: time="2024-02-12T20:26:45.885850569Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 20:26:45.885929 env[1269]: time="2024-02-12T20:26:45.885860528Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 20:26:46.555917 env[1269]: time="2024-02-12T20:26:46.555854345Z" level=info msg="Loading containers: start." Feb 12 20:26:46.593000 audit[1305]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1305 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:46.593000 audit[1305]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffed3252c00 a2=0 a3=7ffed3252bec items=0 ppid=1269 pid=1305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:46.593000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 12 20:26:46.595000 audit[1307]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1307 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:46.595000 audit[1307]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff81e58200 a2=0 a3=7fff81e581ec items=0 ppid=1269 pid=1307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:46.595000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 12 20:26:46.596000 audit[1309]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1309 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:46.596000 audit[1309]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe2efbae90 a2=0 a3=7ffe2efbae7c items=0 ppid=1269 pid=1309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:46.596000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 20:26:46.597000 audit[1311]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1311 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:46.597000 audit[1311]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe3806c060 a2=0 a3=7ffe3806c04c items=0 ppid=1269 pid=1311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:46.597000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 20:26:46.599000 audit[1313]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1313 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:46.599000 audit[1313]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe66242e20 a2=0 a3=7ffe66242e0c items=0 ppid=1269 pid=1313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:46.599000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 12 20:26:46.614000 audit[1318]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1318 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:46.614000 audit[1318]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe75c46170 a2=0 a3=7ffe75c4615c items=0 ppid=1269 pid=1318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:46.614000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 12 20:26:46.830000 audit[1320]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1320 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:46.830000 audit[1320]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc6cd70200 a2=0 a3=7ffc6cd701ec items=0 ppid=1269 pid=1320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:46.830000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 12 20:26:46.832000 audit[1322]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1322 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:46.832000 audit[1322]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffde3c648a0 a2=0 a3=7ffde3c6488c items=0 ppid=1269 pid=1322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:46.832000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 12 20:26:46.834000 audit[1324]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1324 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:46.834000 audit[1324]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe2d53b860 a2=0 a3=7ffe2d53b84c items=0 ppid=1269 pid=1324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:46.834000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 20:26:47.115000 audit[1328]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1328 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:47.115000 audit[1328]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff4b118410 a2=0 a3=7fff4b1183fc items=0 ppid=1269 pid=1328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:47.115000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 20:26:47.116000 audit[1329]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1329 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:47.116000 audit[1329]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffdd568be50 a2=0 a3=7ffdd568be3c items=0 ppid=1269 pid=1329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:47.116000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 20:26:47.123981 kernel: Initializing XFRM netlink socket Feb 12 20:26:47.148431 env[1269]: time="2024-02-12T20:26:47.148388149Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 12 20:26:47.162000 audit[1337]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1337 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:47.162000 audit[1337]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffd3c7ce8b0 a2=0 a3=7ffd3c7ce89c items=0 ppid=1269 pid=1337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:47.162000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 12 20:26:47.172000 audit[1340]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1340 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:47.172000 audit[1340]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffd7f711940 a2=0 a3=7ffd7f71192c items=0 ppid=1269 pid=1340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:47.172000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 12 20:26:47.174000 audit[1343]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1343 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:47.174000 audit[1343]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffcb3240730 a2=0 a3=7ffcb324071c items=0 ppid=1269 pid=1343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:47.174000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 12 20:26:47.176000 audit[1345]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1345 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:47.176000 audit[1345]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffea1a323e0 a2=0 a3=7ffea1a323cc items=0 ppid=1269 pid=1345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:47.176000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 12 20:26:47.177000 audit[1347]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1347 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:47.177000 audit[1347]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffc19988bc0 a2=0 a3=7ffc19988bac items=0 ppid=1269 pid=1347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:47.177000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 12 20:26:47.179000 audit[1349]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1349 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:47.179000 audit[1349]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffc00aa6b50 a2=0 a3=7ffc00aa6b3c items=0 ppid=1269 pid=1349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:47.179000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 12 20:26:47.180000 audit[1351]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1351 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:47.180000 audit[1351]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc9ff5ba70 a2=0 a3=7ffc9ff5ba5c items=0 ppid=1269 pid=1351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:47.180000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 12 20:26:47.186000 audit[1354]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1354 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:47.186000 audit[1354]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffca32260c0 a2=0 a3=7ffca32260ac items=0 ppid=1269 pid=1354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:47.186000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 12 20:26:47.188000 audit[1356]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1356 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:47.188000 audit[1356]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe9645f540 a2=0 a3=7ffe9645f52c items=0 ppid=1269 pid=1356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:47.188000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 20:26:47.189000 audit[1358]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1358 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:47.189000 audit[1358]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffda6ec25b0 a2=0 a3=7ffda6ec259c items=0 ppid=1269 pid=1358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:47.189000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 20:26:47.191000 audit[1360]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1360 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:47.191000 audit[1360]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdd7ed0cc0 a2=0 a3=7ffdd7ed0cac items=0 ppid=1269 pid=1360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:47.191000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 12 20:26:47.192502 systemd-networkd[1018]: docker0: Link UP Feb 12 20:26:47.552000 audit[1364]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1364 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:47.552000 audit[1364]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffeaa37aea0 a2=0 a3=7ffeaa37ae8c items=0 ppid=1269 pid=1364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:47.552000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 20:26:47.553000 audit[1365]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1365 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:47.553000 audit[1365]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc039c0750 a2=0 a3=7ffc039c073c items=0 ppid=1269 pid=1365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:47.553000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 20:26:47.554468 env[1269]: time="2024-02-12T20:26:47.554442661Z" level=info msg="Loading containers: done." Feb 12 20:26:47.760370 env[1269]: time="2024-02-12T20:26:47.760299460Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 12 20:26:47.760582 env[1269]: time="2024-02-12T20:26:47.760513291Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 12 20:26:47.760613 env[1269]: time="2024-02-12T20:26:47.760604312Z" level=info msg="Daemon has completed initialization" Feb 12 20:26:48.137074 systemd[1]: Started docker.service. Feb 12 20:26:48.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:48.140489 env[1269]: time="2024-02-12T20:26:48.140443982Z" level=info msg="API listen on /run/docker.sock" Feb 12 20:26:48.155613 systemd[1]: Reloading. Feb 12 20:26:48.221011 /usr/lib/systemd/system-generators/torcx-generator[1414]: time="2024-02-12T20:26:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:26:48.221044 /usr/lib/systemd/system-generators/torcx-generator[1414]: time="2024-02-12T20:26:48Z" level=info msg="torcx already run" Feb 12 20:26:48.275853 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:26:48.275875 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:26:48.294756 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:26:48.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.346000 audit: BPF prog-id=37 op=LOAD Feb 12 20:26:48.346000 audit: BPF prog-id=26 op=UNLOAD Feb 12 20:26:48.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.347000 audit: BPF prog-id=38 op=LOAD Feb 12 20:26:48.347000 audit: BPF prog-id=30 op=UNLOAD Feb 12 20:26:48.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.350000 audit: BPF prog-id=39 op=LOAD Feb 12 20:26:48.350000 audit: BPF prog-id=35 op=UNLOAD Feb 12 20:26:48.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.350000 audit: BPF prog-id=40 op=LOAD Feb 12 20:26:48.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.350000 audit: BPF prog-id=41 op=LOAD Feb 12 20:26:48.350000 audit: BPF prog-id=24 op=UNLOAD Feb 12 20:26:48.350000 audit: BPF prog-id=25 op=UNLOAD Feb 12 20:26:48.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.351000 audit: BPF prog-id=42 op=LOAD Feb 12 20:26:48.351000 audit: BPF prog-id=31 op=UNLOAD Feb 12 20:26:48.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.352000 audit: BPF prog-id=43 op=LOAD Feb 12 20:26:48.352000 audit: BPF prog-id=32 op=UNLOAD Feb 12 20:26:48.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.352000 audit: BPF prog-id=44 op=LOAD Feb 12 20:26:48.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.352000 audit: BPF prog-id=45 op=LOAD Feb 12 20:26:48.352000 audit: BPF prog-id=33 op=UNLOAD Feb 12 20:26:48.352000 audit: BPF prog-id=34 op=UNLOAD Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit: BPF prog-id=46 op=LOAD Feb 12 20:26:48.353000 audit: BPF prog-id=21 op=UNLOAD Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit: BPF prog-id=47 op=LOAD Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit: BPF prog-id=48 op=LOAD Feb 12 20:26:48.353000 audit: BPF prog-id=22 op=UNLOAD Feb 12 20:26:48.353000 audit: BPF prog-id=23 op=UNLOAD Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.354000 audit: BPF prog-id=49 op=LOAD Feb 12 20:26:48.354000 audit: BPF prog-id=27 op=UNLOAD Feb 12 20:26:48.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.354000 audit: BPF prog-id=50 op=LOAD Feb 12 20:26:48.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.354000 audit: BPF prog-id=51 op=LOAD Feb 12 20:26:48.354000 audit: BPF prog-id=28 op=UNLOAD Feb 12 20:26:48.354000 audit: BPF prog-id=29 op=UNLOAD Feb 12 20:26:48.360697 systemd[1]: Started kubelet.service. Feb 12 20:26:48.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:48.406970 kubelet[1454]: E0212 20:26:48.404357 1454 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 12 20:26:48.408924 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 20:26:48.409041 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 20:26:48.408000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 20:26:48.724158 env[1123]: time="2024-02-12T20:26:48.724048818Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\"" Feb 12 20:26:49.375530 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1482496966.mount: Deactivated successfully. Feb 12 20:26:51.843157 env[1123]: time="2024-02-12T20:26:51.842726526Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:51.845237 env[1123]: time="2024-02-12T20:26:51.845180880Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7968fc5c824ed95404f421a90882835f250220c0fd799b4fceef340dd5585ed5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:51.847213 env[1123]: time="2024-02-12T20:26:51.847158940Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:51.849046 env[1123]: time="2024-02-12T20:26:51.849006345Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:cfcebda74d6e665b68931d3589ee69fde81cd503ff3169888e4502af65579d98,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:51.849730 env[1123]: time="2024-02-12T20:26:51.849681832Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\" returns image reference \"sha256:7968fc5c824ed95404f421a90882835f250220c0fd799b4fceef340dd5585ed5\"" Feb 12 20:26:51.858038 env[1123]: time="2024-02-12T20:26:51.858017878Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\"" Feb 12 20:26:54.567960 env[1123]: time="2024-02-12T20:26:54.567893340Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:54.569558 env[1123]: time="2024-02-12T20:26:54.569504863Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c8134be729ba23c6e0c3e5dd52c393fc8d3cfc688bcec33540f64bb0137b67e0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:54.571164 env[1123]: time="2024-02-12T20:26:54.571133337Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:54.572749 env[1123]: time="2024-02-12T20:26:54.572726566Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fa168ebca1f6dbfe86ef0a690e007531c1f53569274fc7dc2774fe228b6ce8c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:54.573500 env[1123]: time="2024-02-12T20:26:54.573474288Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\" returns image reference \"sha256:c8134be729ba23c6e0c3e5dd52c393fc8d3cfc688bcec33540f64bb0137b67e0\"" Feb 12 20:26:54.582784 env[1123]: time="2024-02-12T20:26:54.582752582Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\"" Feb 12 20:26:56.819261 env[1123]: time="2024-02-12T20:26:56.819194828Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:56.820911 env[1123]: time="2024-02-12T20:26:56.820879027Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5eed9876e7181341b7015e3486dfd234f8e0d0d7d3d19b1bb971d720cd320975,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:56.822651 env[1123]: time="2024-02-12T20:26:56.822614062Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:56.824290 env[1123]: time="2024-02-12T20:26:56.824264808Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09294de61e63987f181077cbc2f5c82463878af9cd8ecc6110c54150c9ae3143,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:56.824771 env[1123]: time="2024-02-12T20:26:56.824741562Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\" returns image reference \"sha256:5eed9876e7181341b7015e3486dfd234f8e0d0d7d3d19b1bb971d720cd320975\"" Feb 12 20:26:56.832698 env[1123]: time="2024-02-12T20:26:56.832657280Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\"" Feb 12 20:26:57.920946 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2852086825.mount: Deactivated successfully. Feb 12 20:26:58.659794 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 12 20:26:58.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:58.660014 systemd[1]: Stopped kubelet.service. Feb 12 20:26:58.661337 systemd[1]: Started kubelet.service. Feb 12 20:26:58.662659 kernel: kauditd_printk_skb: 259 callbacks suppressed Feb 12 20:26:58.662707 kernel: audit: type=1130 audit(1707769618.659:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:58.662730 kernel: audit: type=1131 audit(1707769618.659:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:58.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:58.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:58.666894 kernel: audit: type=1130 audit(1707769618.660:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:58.701868 kubelet[1495]: E0212 20:26:58.701808 1495 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 12 20:26:58.704678 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 20:26:58.704796 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 20:26:58.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 20:26:58.707980 kernel: audit: type=1131 audit(1707769618.704:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 20:26:58.917882 env[1123]: time="2024-02-12T20:26:58.917718649Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:59.003060 env[1123]: time="2024-02-12T20:26:59.002996987Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:59.006684 env[1123]: time="2024-02-12T20:26:59.006627797Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:59.008344 env[1123]: time="2024-02-12T20:26:59.008317296Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:59.008869 env[1123]: time="2024-02-12T20:26:59.008837552Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\" returns image reference \"sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae\"" Feb 12 20:26:59.019252 env[1123]: time="2024-02-12T20:26:59.019222531Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 12 20:26:59.557348 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2297445544.mount: Deactivated successfully. Feb 12 20:26:59.563047 env[1123]: time="2024-02-12T20:26:59.563003248Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:59.564713 env[1123]: time="2024-02-12T20:26:59.564672239Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:59.566434 env[1123]: time="2024-02-12T20:26:59.566400230Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:59.567733 env[1123]: time="2024-02-12T20:26:59.567705268Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:59.568159 env[1123]: time="2024-02-12T20:26:59.568128572Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 12 20:26:59.576377 env[1123]: time="2024-02-12T20:26:59.576343471Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Feb 12 20:27:00.381598 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount476260573.mount: Deactivated successfully. Feb 12 20:27:05.689650 env[1123]: time="2024-02-12T20:27:05.689570327Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:05.800438 env[1123]: time="2024-02-12T20:27:05.800389943Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:05.846344 env[1123]: time="2024-02-12T20:27:05.846294296Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:05.848600 env[1123]: time="2024-02-12T20:27:05.848572630Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:05.849274 env[1123]: time="2024-02-12T20:27:05.849237196Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681\"" Feb 12 20:27:05.857873 env[1123]: time="2024-02-12T20:27:05.857842588Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 12 20:27:07.085646 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2315160227.mount: Deactivated successfully. Feb 12 20:27:08.332397 env[1123]: time="2024-02-12T20:27:08.332347573Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:08.334394 env[1123]: time="2024-02-12T20:27:08.334346365Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:08.335901 env[1123]: time="2024-02-12T20:27:08.335871413Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:08.337284 env[1123]: time="2024-02-12T20:27:08.337259108Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:08.337785 env[1123]: time="2024-02-12T20:27:08.337761507Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Feb 12 20:27:08.735652 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Feb 12 20:27:08.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:08.735854 systemd[1]: Stopped kubelet.service. Feb 12 20:27:08.737041 systemd[1]: Started kubelet.service. Feb 12 20:27:08.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:08.743975 kernel: audit: type=1130 audit(1707769628.734:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:08.744048 kernel: audit: type=1131 audit(1707769628.734:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:08.744072 kernel: audit: type=1130 audit(1707769628.736:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:08.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:08.784839 kubelet[1549]: E0212 20:27:08.784785 1549 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 12 20:27:08.786591 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 20:27:08.786736 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 20:27:08.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 20:27:08.790019 kernel: audit: type=1131 audit(1707769628.786:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 20:27:10.369698 systemd[1]: Stopped kubelet.service. Feb 12 20:27:10.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:10.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:10.374097 kernel: audit: type=1130 audit(1707769630.368:397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:10.374191 kernel: audit: type=1131 audit(1707769630.370:398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:10.385410 systemd[1]: Reloading. Feb 12 20:27:10.453979 /usr/lib/systemd/system-generators/torcx-generator[1628]: time="2024-02-12T20:27:10Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:27:10.454007 /usr/lib/systemd/system-generators/torcx-generator[1628]: time="2024-02-12T20:27:10Z" level=info msg="torcx already run" Feb 12 20:27:10.514116 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:27:10.514133 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:27:10.537831 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:27:10.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.599184 kernel: audit: type=1400 audit(1707769630.594:399): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.599226 kernel: audit: type=1400 audit(1707769630.594:400): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.599246 kernel: audit: type=1400 audit(1707769630.594:401): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.603097 kernel: audit: type=1400 audit(1707769630.594:402): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.598000 audit: BPF prog-id=52 op=LOAD Feb 12 20:27:10.598000 audit: BPF prog-id=37 op=UNLOAD Feb 12 20:27:10.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.602000 audit: BPF prog-id=53 op=LOAD Feb 12 20:27:10.602000 audit: BPF prog-id=38 op=UNLOAD Feb 12 20:27:10.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.604000 audit: BPF prog-id=54 op=LOAD Feb 12 20:27:10.604000 audit: BPF prog-id=39 op=UNLOAD Feb 12 20:27:10.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.605000 audit: BPF prog-id=55 op=LOAD Feb 12 20:27:10.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.605000 audit: BPF prog-id=56 op=LOAD Feb 12 20:27:10.605000 audit: BPF prog-id=40 op=UNLOAD Feb 12 20:27:10.605000 audit: BPF prog-id=41 op=UNLOAD Feb 12 20:27:10.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.605000 audit: BPF prog-id=57 op=LOAD Feb 12 20:27:10.605000 audit: BPF prog-id=42 op=UNLOAD Feb 12 20:27:10.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.607000 audit: BPF prog-id=58 op=LOAD Feb 12 20:27:10.607000 audit: BPF prog-id=43 op=UNLOAD Feb 12 20:27:10.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.607000 audit: BPF prog-id=59 op=LOAD Feb 12 20:27:10.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.607000 audit: BPF prog-id=60 op=LOAD Feb 12 20:27:10.607000 audit: BPF prog-id=44 op=UNLOAD Feb 12 20:27:10.607000 audit: BPF prog-id=45 op=UNLOAD Feb 12 20:27:10.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit: BPF prog-id=61 op=LOAD Feb 12 20:27:10.608000 audit: BPF prog-id=46 op=UNLOAD Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit: BPF prog-id=62 op=LOAD Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit: BPF prog-id=63 op=LOAD Feb 12 20:27:10.608000 audit: BPF prog-id=47 op=UNLOAD Feb 12 20:27:10.608000 audit: BPF prog-id=48 op=UNLOAD Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit: BPF prog-id=64 op=LOAD Feb 12 20:27:10.608000 audit: BPF prog-id=49 op=UNLOAD Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.609000 audit: BPF prog-id=65 op=LOAD Feb 12 20:27:10.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:10.609000 audit: BPF prog-id=66 op=LOAD Feb 12 20:27:10.609000 audit: BPF prog-id=50 op=UNLOAD Feb 12 20:27:10.609000 audit: BPF prog-id=51 op=UNLOAD Feb 12 20:27:10.626304 systemd[1]: Started kubelet.service. Feb 12 20:27:10.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:10.670732 kubelet[1669]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 20:27:10.670732 kubelet[1669]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 20:27:10.670732 kubelet[1669]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 20:27:10.671026 kubelet[1669]: I0212 20:27:10.670768 1669 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 20:27:11.031065 kubelet[1669]: I0212 20:27:11.030965 1669 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 12 20:27:11.031065 kubelet[1669]: I0212 20:27:11.030995 1669 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 20:27:11.031278 kubelet[1669]: I0212 20:27:11.031265 1669 server.go:837] "Client rotation is on, will bootstrap in background" Feb 12 20:27:11.034510 kubelet[1669]: I0212 20:27:11.034460 1669 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 20:27:11.035392 kubelet[1669]: E0212 20:27:11.035366 1669 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.105:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.105:6443: connect: connection refused Feb 12 20:27:11.038501 kubelet[1669]: I0212 20:27:11.038469 1669 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 20:27:11.038772 kubelet[1669]: I0212 20:27:11.038673 1669 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 20:27:11.039121 kubelet[1669]: I0212 20:27:11.039099 1669 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 20:27:11.039256 kubelet[1669]: I0212 20:27:11.039130 1669 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 20:27:11.039256 kubelet[1669]: I0212 20:27:11.039144 1669 container_manager_linux.go:302] "Creating device plugin manager" Feb 12 20:27:11.039306 kubelet[1669]: I0212 20:27:11.039261 1669 state_mem.go:36] "Initialized new in-memory state store" Feb 12 20:27:11.041860 kubelet[1669]: I0212 20:27:11.041834 1669 kubelet.go:405] "Attempting to sync node with API server" Feb 12 20:27:11.041860 kubelet[1669]: I0212 20:27:11.041856 1669 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 20:27:11.041977 kubelet[1669]: I0212 20:27:11.041877 1669 kubelet.go:309] "Adding apiserver pod source" Feb 12 20:27:11.041977 kubelet[1669]: I0212 20:27:11.041894 1669 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 20:27:11.042482 kubelet[1669]: W0212 20:27:11.042436 1669 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.0.0.105:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.105:6443: connect: connection refused Feb 12 20:27:11.042482 kubelet[1669]: W0212 20:27:11.042443 1669 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.0.0.105:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.105:6443: connect: connection refused Feb 12 20:27:11.042586 kubelet[1669]: E0212 20:27:11.042494 1669 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.105:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.105:6443: connect: connection refused Feb 12 20:27:11.042586 kubelet[1669]: E0212 20:27:11.042504 1669 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.105:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.105:6443: connect: connection refused Feb 12 20:27:11.042586 kubelet[1669]: I0212 20:27:11.042572 1669 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 20:27:11.042857 kubelet[1669]: W0212 20:27:11.042834 1669 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 20:27:11.043232 kubelet[1669]: I0212 20:27:11.043208 1669 server.go:1168] "Started kubelet" Feb 12 20:27:11.043355 kubelet[1669]: I0212 20:27:11.043335 1669 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 20:27:11.043465 kubelet[1669]: I0212 20:27:11.043448 1669 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 20:27:11.044052 kubelet[1669]: E0212 20:27:11.043432 1669 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.17b3376e68877c23", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 27, 11, 43189795, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 27, 11, 43189795, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.0.0.105:6443/api/v1/namespaces/default/events": dial tcp 10.0.0.105:6443: connect: connection refused'(may retry after sleeping) Feb 12 20:27:11.044216 kubelet[1669]: I0212 20:27:11.044149 1669 server.go:461] "Adding debug handlers to kubelet server" Feb 12 20:27:11.044522 kubelet[1669]: E0212 20:27:11.044212 1669 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 20:27:11.044522 kubelet[1669]: E0212 20:27:11.044525 1669 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 20:27:11.044000 audit[1669]: AVC avc: denied { mac_admin } for pid=1669 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:11.044000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:27:11.044000 audit[1669]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e7c300 a1=c000645350 a2=c000e7c2d0 a3=25 items=0 ppid=1 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:11.044000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:27:11.044000 audit[1669]: AVC avc: denied { mac_admin } for pid=1669 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:11.044000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:27:11.044000 audit[1669]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00039b780 a1=c000645368 a2=c000e7c390 a3=25 items=0 ppid=1 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:11.044000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:27:11.045623 kubelet[1669]: I0212 20:27:11.045131 1669 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 20:27:11.045623 kubelet[1669]: I0212 20:27:11.045177 1669 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 20:27:11.045623 kubelet[1669]: I0212 20:27:11.045247 1669 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 20:27:11.045623 kubelet[1669]: I0212 20:27:11.045364 1669 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 12 20:27:11.046475 kubelet[1669]: E0212 20:27:11.046441 1669 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 12 20:27:11.046475 kubelet[1669]: I0212 20:27:11.046471 1669 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 12 20:27:11.046704 kubelet[1669]: E0212 20:27:11.046674 1669 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.105:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.105:6443: connect: connection refused" interval="200ms" Feb 12 20:27:11.046811 kubelet[1669]: W0212 20:27:11.046754 1669 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.0.0.105:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.105:6443: connect: connection refused Feb 12 20:27:11.046845 kubelet[1669]: E0212 20:27:11.046826 1669 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.105:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.105:6443: connect: connection refused Feb 12 20:27:11.047000 audit[1681]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1681 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:11.047000 audit[1681]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffe2f10890 a2=0 a3=7fffe2f1087c items=0 ppid=1669 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:11.047000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 20:27:11.051000 audit[1682]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1682 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:11.051000 audit[1682]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea1d82930 a2=0 a3=7ffea1d8291c items=0 ppid=1669 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:11.051000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 20:27:11.053000 audit[1684]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1684 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:11.053000 audit[1684]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe526e70a0 a2=0 a3=7ffe526e708c items=0 ppid=1669 pid=1684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:11.053000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 20:27:11.055000 audit[1686]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1686 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:11.055000 audit[1686]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe10cd0010 a2=0 a3=7ffe10ccfffc items=0 ppid=1669 pid=1686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:11.055000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 20:27:11.066000 audit[1691]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1691 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:11.066000 audit[1691]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffee69e5320 a2=0 a3=7ffee69e530c items=0 ppid=1669 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:11.066000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 20:27:11.067874 kubelet[1669]: I0212 20:27:11.067735 1669 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 20:27:11.067000 audit[1694]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1694 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:11.067000 audit[1694]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffee62438d0 a2=0 a3=7ffee62438bc items=0 ppid=1669 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:11.067000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 20:27:11.067000 audit[1696]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1696 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:11.067000 audit[1696]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe27f58a20 a2=0 a3=7ffe27f58a0c items=0 ppid=1669 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:11.067000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 20:27:11.069782 kubelet[1669]: I0212 20:27:11.069753 1669 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 20:27:11.069843 kubelet[1669]: I0212 20:27:11.069792 1669 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 12 20:27:11.069843 kubelet[1669]: I0212 20:27:11.069813 1669 kubelet.go:2257] "Starting kubelet main sync loop" Feb 12 20:27:11.069889 kubelet[1669]: E0212 20:27:11.069870 1669 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 20:27:11.070321 kubelet[1669]: W0212 20:27:11.070279 1669 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.0.0.105:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.105:6443: connect: connection refused Feb 12 20:27:11.069000 audit[1698]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1698 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:11.069000 audit[1698]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc2e8d0c20 a2=0 a3=7ffc2e8d0c0c items=0 ppid=1669 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:11.069000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 20:27:11.070497 kubelet[1669]: E0212 20:27:11.070325 1669 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.105:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.105:6443: connect: connection refused Feb 12 20:27:11.071213 kubelet[1669]: I0212 20:27:11.071184 1669 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 20:27:11.071213 kubelet[1669]: I0212 20:27:11.071210 1669 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 20:27:11.071285 kubelet[1669]: I0212 20:27:11.071231 1669 state_mem.go:36] "Initialized new in-memory state store" Feb 12 20:27:11.070000 audit[1699]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1699 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:11.070000 audit[1699]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffe334bb40 a2=0 a3=7fffe334bb2c items=0 ppid=1669 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:11.070000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 20:27:11.070000 audit[1700]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:11.070000 audit[1700]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca1926590 a2=0 a3=7ffca192657c items=0 ppid=1669 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:11.070000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 20:27:11.071000 audit[1701]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1701 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:11.071000 audit[1701]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe6d44b250 a2=0 a3=7ffe6d44b23c items=0 ppid=1669 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:11.071000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 20:27:11.072000 audit[1702]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1702 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:11.072000 audit[1702]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff193f2d10 a2=0 a3=7fff193f2cfc items=0 ppid=1669 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:11.072000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 20:27:11.076445 kubelet[1669]: I0212 20:27:11.076421 1669 policy_none.go:49] "None policy: Start" Feb 12 20:27:11.076836 kubelet[1669]: I0212 20:27:11.076822 1669 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 20:27:11.076836 kubelet[1669]: I0212 20:27:11.076836 1669 state_mem.go:35] "Initializing new in-memory state store" Feb 12 20:27:11.082757 systemd[1]: Created slice kubepods.slice. Feb 12 20:27:11.086257 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 20:27:11.088556 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 20:27:11.096488 kubelet[1669]: I0212 20:27:11.096466 1669 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 20:27:11.095000 audit[1669]: AVC avc: denied { mac_admin } for pid=1669 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:11.095000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:27:11.095000 audit[1669]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f59320 a1=c00107f620 a2=c000f59230 a3=25 items=0 ppid=1 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:11.095000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:27:11.096716 kubelet[1669]: I0212 20:27:11.096522 1669 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 20:27:11.096716 kubelet[1669]: I0212 20:27:11.096652 1669 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 20:27:11.097300 kubelet[1669]: E0212 20:27:11.097277 1669 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Feb 12 20:27:11.147617 kubelet[1669]: I0212 20:27:11.147575 1669 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 20:27:11.147946 kubelet[1669]: E0212 20:27:11.147919 1669 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.105:6443/api/v1/nodes\": dial tcp 10.0.0.105:6443: connect: connection refused" node="localhost" Feb 12 20:27:11.170012 kubelet[1669]: I0212 20:27:11.169984 1669 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:27:11.170787 kubelet[1669]: I0212 20:27:11.170766 1669 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:27:11.171458 kubelet[1669]: I0212 20:27:11.171443 1669 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:27:11.175468 systemd[1]: Created slice kubepods-burstable-pod1e158560b1e7576cdb3b208f290a2d49.slice. Feb 12 20:27:11.183934 systemd[1]: Created slice kubepods-burstable-pod7709ea05d7cdf82b0d7e594b61a10331.slice. Feb 12 20:27:11.186875 systemd[1]: Created slice kubepods-burstable-pod2b0e94b38682f4e439413801d3cc54db.slice. Feb 12 20:27:11.247402 kubelet[1669]: E0212 20:27:11.247362 1669 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.105:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.105:6443: connect: connection refused" interval="400ms" Feb 12 20:27:11.347834 kubelet[1669]: I0212 20:27:11.347794 1669 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/1e158560b1e7576cdb3b208f290a2d49-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"1e158560b1e7576cdb3b208f290a2d49\") " pod="kube-system/kube-apiserver-localhost" Feb 12 20:27:11.347834 kubelet[1669]: I0212 20:27:11.347833 1669 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/1e158560b1e7576cdb3b208f290a2d49-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"1e158560b1e7576cdb3b208f290a2d49\") " pod="kube-system/kube-apiserver-localhost" Feb 12 20:27:11.348076 kubelet[1669]: I0212 20:27:11.347877 1669 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/1e158560b1e7576cdb3b208f290a2d49-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"1e158560b1e7576cdb3b208f290a2d49\") " pod="kube-system/kube-apiserver-localhost" Feb 12 20:27:11.348076 kubelet[1669]: I0212 20:27:11.347897 1669 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 20:27:11.348076 kubelet[1669]: I0212 20:27:11.347926 1669 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 20:27:11.348076 kubelet[1669]: I0212 20:27:11.347946 1669 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 20:27:11.348076 kubelet[1669]: I0212 20:27:11.347982 1669 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 20:27:11.348188 kubelet[1669]: I0212 20:27:11.348003 1669 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 20:27:11.348188 kubelet[1669]: I0212 20:27:11.348022 1669 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2b0e94b38682f4e439413801d3cc54db-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2b0e94b38682f4e439413801d3cc54db\") " pod="kube-system/kube-scheduler-localhost" Feb 12 20:27:11.348932 kubelet[1669]: I0212 20:27:11.348915 1669 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 20:27:11.349297 kubelet[1669]: E0212 20:27:11.349276 1669 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.105:6443/api/v1/nodes\": dial tcp 10.0.0.105:6443: connect: connection refused" node="localhost" Feb 12 20:27:11.482155 kubelet[1669]: E0212 20:27:11.482108 1669 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:11.482777 env[1123]: time="2024-02-12T20:27:11.482725261Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:1e158560b1e7576cdb3b208f290a2d49,Namespace:kube-system,Attempt:0,}" Feb 12 20:27:11.485951 kubelet[1669]: E0212 20:27:11.485922 1669 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:11.486430 env[1123]: time="2024-02-12T20:27:11.486389188Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:7709ea05d7cdf82b0d7e594b61a10331,Namespace:kube-system,Attempt:0,}" Feb 12 20:27:11.488730 kubelet[1669]: E0212 20:27:11.488686 1669 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:11.489213 env[1123]: time="2024-02-12T20:27:11.489168219Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2b0e94b38682f4e439413801d3cc54db,Namespace:kube-system,Attempt:0,}" Feb 12 20:27:11.648545 kubelet[1669]: E0212 20:27:11.648437 1669 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.105:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.105:6443: connect: connection refused" interval="800ms" Feb 12 20:27:11.750765 kubelet[1669]: I0212 20:27:11.750735 1669 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 20:27:11.751125 kubelet[1669]: E0212 20:27:11.751024 1669 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.105:6443/api/v1/nodes\": dial tcp 10.0.0.105:6443: connect: connection refused" node="localhost" Feb 12 20:27:11.880020 kubelet[1669]: W0212 20:27:11.879932 1669 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.0.0.105:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.105:6443: connect: connection refused Feb 12 20:27:11.880020 kubelet[1669]: E0212 20:27:11.879997 1669 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.105:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.105:6443: connect: connection refused Feb 12 20:27:12.066620 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1289357720.mount: Deactivated successfully. Feb 12 20:27:12.074195 env[1123]: time="2024-02-12T20:27:12.074140929Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:12.076042 env[1123]: time="2024-02-12T20:27:12.075992355Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:12.076748 env[1123]: time="2024-02-12T20:27:12.076728615Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:12.077567 env[1123]: time="2024-02-12T20:27:12.077540520Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:12.079965 env[1123]: time="2024-02-12T20:27:12.079902694Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:12.081132 env[1123]: time="2024-02-12T20:27:12.081098575Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:12.082275 env[1123]: time="2024-02-12T20:27:12.082244830Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:12.083330 env[1123]: time="2024-02-12T20:27:12.083301304Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:12.085245 env[1123]: time="2024-02-12T20:27:12.085221442Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:12.088050 env[1123]: time="2024-02-12T20:27:12.088015444Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:12.089139 env[1123]: time="2024-02-12T20:27:12.089107986Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:12.091267 env[1123]: time="2024-02-12T20:27:12.091231653Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:12.107199 env[1123]: time="2024-02-12T20:27:12.107131077Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:27:12.107199 env[1123]: time="2024-02-12T20:27:12.107170472Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:27:12.107199 env[1123]: time="2024-02-12T20:27:12.107180702Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:27:12.107361 env[1123]: time="2024-02-12T20:27:12.107323555Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/af68686e0b38b41d6b1adf062fba855d8085ec63aa583eacddbd1a44bf0f0031 pid=1711 runtime=io.containerd.runc.v2 Feb 12 20:27:12.118756 env[1123]: time="2024-02-12T20:27:12.118675037Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:27:12.118756 env[1123]: time="2024-02-12T20:27:12.118717619Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:27:12.118756 env[1123]: time="2024-02-12T20:27:12.118728710Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:27:12.119191 env[1123]: time="2024-02-12T20:27:12.119030588Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6a208b769e9806a081f612d049ca36fa3bb6637a7260e5e58b7aad4502ede85b pid=1740 runtime=io.containerd.runc.v2 Feb 12 20:27:12.119191 env[1123]: time="2024-02-12T20:27:12.118987215Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:27:12.119191 env[1123]: time="2024-02-12T20:27:12.119013866Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:27:12.119191 env[1123]: time="2024-02-12T20:27:12.119022934Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:27:12.119405 env[1123]: time="2024-02-12T20:27:12.119371261Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ec56f5c0bd7126f40c43730f4650b76e85c752c4615f8d8f40831ef84d5f6ea9 pid=1746 runtime=io.containerd.runc.v2 Feb 12 20:27:12.120483 systemd[1]: Started cri-containerd-af68686e0b38b41d6b1adf062fba855d8085ec63aa583eacddbd1a44bf0f0031.scope. Feb 12 20:27:12.129577 systemd[1]: Started cri-containerd-ec56f5c0bd7126f40c43730f4650b76e85c752c4615f8d8f40831ef84d5f6ea9.scope. Feb 12 20:27:12.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.134000 audit: BPF prog-id=67 op=LOAD Feb 12 20:27:12.135000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.135000 audit[1721]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1711 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:12.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166363836383665306233386234316436623161646630363266626138 Feb 12 20:27:12.135000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.135000 audit[1721]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1711 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:12.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166363836383665306233386234316436623161646630363266626138 Feb 12 20:27:12.135000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.135000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.135000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.135000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.135000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.135000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.135000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.135000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.135000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.135000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.135000 audit: BPF prog-id=68 op=LOAD Feb 12 20:27:12.135000 audit[1721]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00038c5b0 items=0 ppid=1711 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:12.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166363836383665306233386234316436623161646630363266626138 Feb 12 20:27:12.135000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.135000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.135000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.135000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.135000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.135000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.135000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.135000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.135000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.135000 audit: BPF prog-id=69 op=LOAD Feb 12 20:27:12.135000 audit[1721]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00038c5f8 items=0 ppid=1711 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:12.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166363836383665306233386234316436623161646630363266626138 Feb 12 20:27:12.135000 audit: BPF prog-id=69 op=UNLOAD Feb 12 20:27:12.135000 audit: BPF prog-id=68 op=UNLOAD Feb 12 20:27:12.135000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.135000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.135000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.135000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.135000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.135000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.135000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.135000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.135000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.135000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.135000 audit: BPF prog-id=70 op=LOAD Feb 12 20:27:12.135000 audit[1721]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00038ca08 items=0 ppid=1711 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:12.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166363836383665306233386234316436623161646630363266626138 Feb 12 20:27:12.139021 systemd[1]: Started cri-containerd-6a208b769e9806a081f612d049ca36fa3bb6637a7260e5e58b7aad4502ede85b.scope. Feb 12 20:27:12.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.141000 audit: BPF prog-id=71 op=LOAD Feb 12 20:27:12.142000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.142000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1746 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:12.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563353666356330626437313236663430633433373330663436353062 Feb 12 20:27:12.142000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.142000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1746 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:12.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563353666356330626437313236663430633433373330663436353062 Feb 12 20:27:12.142000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.142000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.142000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.142000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.142000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.142000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.142000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.142000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.142000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.142000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.142000 audit: BPF prog-id=72 op=LOAD Feb 12 20:27:12.142000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002226e0 items=0 ppid=1746 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:12.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563353666356330626437313236663430633433373330663436353062 Feb 12 20:27:12.142000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.142000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.142000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.142000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.142000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.142000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.142000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.142000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.142000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.142000 audit: BPF prog-id=73 op=LOAD Feb 12 20:27:12.142000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000222728 items=0 ppid=1746 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:12.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563353666356330626437313236663430633433373330663436353062 Feb 12 20:27:12.142000 audit: BPF prog-id=73 op=UNLOAD Feb 12 20:27:12.142000 audit: BPF prog-id=72 op=UNLOAD Feb 12 20:27:12.142000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.142000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.142000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.142000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.142000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.142000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.142000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.142000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.142000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.142000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.142000 audit: BPF prog-id=74 op=LOAD Feb 12 20:27:12.142000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000222b38 items=0 ppid=1746 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:12.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563353666356330626437313236663430633433373330663436353062 Feb 12 20:27:12.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit: BPF prog-id=75 op=LOAD Feb 12 20:27:12.147000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1767]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1740 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:12.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661323038623736396539383036613038316636313264303439636133 Feb 12 20:27:12.147000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1767]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1740 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:12.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661323038623736396539383036613038316636313264303439636133 Feb 12 20:27:12.147000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit: BPF prog-id=76 op=LOAD Feb 12 20:27:12.147000 audit[1767]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000224810 items=0 ppid=1740 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:12.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661323038623736396539383036613038316636313264303439636133 Feb 12 20:27:12.147000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit: BPF prog-id=77 op=LOAD Feb 12 20:27:12.147000 audit[1767]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000224858 items=0 ppid=1740 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:12.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661323038623736396539383036613038316636313264303439636133 Feb 12 20:27:12.147000 audit: BPF prog-id=77 op=UNLOAD Feb 12 20:27:12.147000 audit: BPF prog-id=76 op=UNLOAD Feb 12 20:27:12.147000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1767]: AVC avc: denied { perfmon } for pid=1767 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit[1767]: AVC avc: denied { bpf } for pid=1767 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.147000 audit: BPF prog-id=78 op=LOAD Feb 12 20:27:12.147000 audit[1767]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000224c68 items=0 ppid=1740 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:12.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661323038623736396539383036613038316636313264303439636133 Feb 12 20:27:12.166884 env[1123]: time="2024-02-12T20:27:12.166836213Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2b0e94b38682f4e439413801d3cc54db,Namespace:kube-system,Attempt:0,} returns sandbox id \"af68686e0b38b41d6b1adf062fba855d8085ec63aa583eacddbd1a44bf0f0031\"" Feb 12 20:27:12.168014 kubelet[1669]: E0212 20:27:12.167990 1669 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:12.170115 env[1123]: time="2024-02-12T20:27:12.170078773Z" level=info msg="CreateContainer within sandbox \"af68686e0b38b41d6b1adf062fba855d8085ec63aa583eacddbd1a44bf0f0031\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 12 20:27:12.173317 env[1123]: time="2024-02-12T20:27:12.173280796Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:7709ea05d7cdf82b0d7e594b61a10331,Namespace:kube-system,Attempt:0,} returns sandbox id \"ec56f5c0bd7126f40c43730f4650b76e85c752c4615f8d8f40831ef84d5f6ea9\"" Feb 12 20:27:12.175918 kubelet[1669]: E0212 20:27:12.174492 1669 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:12.178008 env[1123]: time="2024-02-12T20:27:12.177917277Z" level=info msg="CreateContainer within sandbox \"ec56f5c0bd7126f40c43730f4650b76e85c752c4615f8d8f40831ef84d5f6ea9\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 12 20:27:12.190747 env[1123]: time="2024-02-12T20:27:12.190690683Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:1e158560b1e7576cdb3b208f290a2d49,Namespace:kube-system,Attempt:0,} returns sandbox id \"6a208b769e9806a081f612d049ca36fa3bb6637a7260e5e58b7aad4502ede85b\"" Feb 12 20:27:12.191374 kubelet[1669]: E0212 20:27:12.191332 1669 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:12.193537 env[1123]: time="2024-02-12T20:27:12.193477650Z" level=info msg="CreateContainer within sandbox \"6a208b769e9806a081f612d049ca36fa3bb6637a7260e5e58b7aad4502ede85b\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 12 20:27:12.197107 env[1123]: time="2024-02-12T20:27:12.197056005Z" level=info msg="CreateContainer within sandbox \"af68686e0b38b41d6b1adf062fba855d8085ec63aa583eacddbd1a44bf0f0031\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"e64fc7e385b31ebdcd3b01926d3405768e5c6b08485ecf47b6965701167d9ac6\"" Feb 12 20:27:12.197766 env[1123]: time="2024-02-12T20:27:12.197695419Z" level=info msg="StartContainer for \"e64fc7e385b31ebdcd3b01926d3405768e5c6b08485ecf47b6965701167d9ac6\"" Feb 12 20:27:12.199153 kubelet[1669]: W0212 20:27:12.199111 1669 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.0.0.105:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.105:6443: connect: connection refused Feb 12 20:27:12.199215 kubelet[1669]: E0212 20:27:12.199173 1669 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.105:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.105:6443: connect: connection refused Feb 12 20:27:12.200034 env[1123]: time="2024-02-12T20:27:12.199993971Z" level=info msg="CreateContainer within sandbox \"ec56f5c0bd7126f40c43730f4650b76e85c752c4615f8d8f40831ef84d5f6ea9\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"3b188897f8e0daf6ed97aa0d3439e05263dabebf25466ddcb0051748651d4c41\"" Feb 12 20:27:12.200365 env[1123]: time="2024-02-12T20:27:12.200339023Z" level=info msg="StartContainer for \"3b188897f8e0daf6ed97aa0d3439e05263dabebf25466ddcb0051748651d4c41\"" Feb 12 20:27:12.208528 env[1123]: time="2024-02-12T20:27:12.208477190Z" level=info msg="CreateContainer within sandbox \"6a208b769e9806a081f612d049ca36fa3bb6637a7260e5e58b7aad4502ede85b\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"777eee47670db72a1427159bdac8984e3c1a04484294af713289807a7eff6733\"" Feb 12 20:27:12.208935 env[1123]: time="2024-02-12T20:27:12.208903056Z" level=info msg="StartContainer for \"777eee47670db72a1427159bdac8984e3c1a04484294af713289807a7eff6733\"" Feb 12 20:27:12.218203 systemd[1]: Started cri-containerd-3b188897f8e0daf6ed97aa0d3439e05263dabebf25466ddcb0051748651d4c41.scope. Feb 12 20:27:12.218880 systemd[1]: Started cri-containerd-e64fc7e385b31ebdcd3b01926d3405768e5c6b08485ecf47b6965701167d9ac6.scope. Feb 12 20:27:12.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.230000 audit: BPF prog-id=79 op=LOAD Feb 12 20:27:12.231000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.231000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=1711 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:12.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536346663376533383562333165626463643362303139323664333430 Feb 12 20:27:12.231000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.231000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=8 items=0 ppid=1711 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:12.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536346663376533383562333165626463643362303139323664333430 Feb 12 20:27:12.231000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.231000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.231000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.231000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.231000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.231000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.231000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.231000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.231000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.231000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.231000 audit: BPF prog-id=80 op=LOAD Feb 12 20:27:12.231000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c00022d270 items=0 ppid=1711 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:12.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536346663376533383562333165626463643362303139323664333430 Feb 12 20:27:12.231000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.231000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.231000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.231000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.231000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.231000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.231000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.231000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.231000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.231000 audit: BPF prog-id=81 op=LOAD Feb 12 20:27:12.231000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c00022d2b8 items=0 ppid=1711 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:12.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536346663376533383562333165626463643362303139323664333430 Feb 12 20:27:12.231000 audit: BPF prog-id=81 op=UNLOAD Feb 12 20:27:12.231000 audit: BPF prog-id=80 op=UNLOAD Feb 12 20:27:12.231000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.231000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.231000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.231000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.231000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.231000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.231000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.231000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.231000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.231000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.231000 audit: BPF prog-id=82 op=LOAD Feb 12 20:27:12.231000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c00022d6c8 items=0 ppid=1711 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:12.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536346663376533383562333165626463643362303139323664333430 Feb 12 20:27:12.229272 systemd[1]: Started cri-containerd-777eee47670db72a1427159bdac8984e3c1a04484294af713289807a7eff6733.scope. Feb 12 20:27:12.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.237000 audit: BPF prog-id=83 op=LOAD Feb 12 20:27:12.238000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.238000 audit[1851]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1746 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:12.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362313838383937663865306461663665643937616130643334333965 Feb 12 20:27:12.238000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.238000 audit[1851]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1746 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:12.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362313838383937663865306461663665643937616130643334333965 Feb 12 20:27:12.239000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.239000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.239000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.239000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.239000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.239000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.239000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.239000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.239000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.239000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.239000 audit: BPF prog-id=84 op=LOAD Feb 12 20:27:12.239000 audit[1851]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000286690 items=0 ppid=1746 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:12.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362313838383937663865306461663665643937616130643334333965 Feb 12 20:27:12.240000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.240000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.240000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.240000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.240000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.240000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.240000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.240000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.240000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.240000 audit: BPF prog-id=85 op=LOAD Feb 12 20:27:12.240000 audit[1851]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002866d8 items=0 ppid=1746 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:12.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362313838383937663865306461663665643937616130643334333965 Feb 12 20:27:12.241000 audit: BPF prog-id=85 op=UNLOAD Feb 12 20:27:12.241000 audit: BPF prog-id=84 op=UNLOAD Feb 12 20:27:12.241000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.241000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.241000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.241000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.241000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.241000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.241000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.241000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.241000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.241000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.241000 audit: BPF prog-id=86 op=LOAD Feb 12 20:27:12.241000 audit[1851]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000286ae8 items=0 ppid=1746 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:12.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362313838383937663865306461663665643937616130643334333965 Feb 12 20:27:12.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.245000 audit: BPF prog-id=87 op=LOAD Feb 12 20:27:12.246000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.246000 audit[1877]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1740 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:12.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737376565653437363730646237326131343237313539626461633839 Feb 12 20:27:12.246000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.246000 audit[1877]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1740 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:12.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737376565653437363730646237326131343237313539626461633839 Feb 12 20:27:12.246000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.246000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.246000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.246000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.246000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.246000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.246000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.246000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.246000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.246000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.246000 audit: BPF prog-id=88 op=LOAD Feb 12 20:27:12.246000 audit[1877]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000394780 items=0 ppid=1740 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:12.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737376565653437363730646237326131343237313539626461633839 Feb 12 20:27:12.246000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.246000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.246000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.246000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.246000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.246000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.246000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.246000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.246000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.246000 audit: BPF prog-id=89 op=LOAD Feb 12 20:27:12.246000 audit[1877]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003947c8 items=0 ppid=1740 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:12.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737376565653437363730646237326131343237313539626461633839 Feb 12 20:27:12.246000 audit: BPF prog-id=89 op=UNLOAD Feb 12 20:27:12.246000 audit: BPF prog-id=88 op=UNLOAD Feb 12 20:27:12.246000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.246000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.246000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.246000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.246000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.246000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.246000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.246000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.246000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.246000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:12.246000 audit: BPF prog-id=90 op=LOAD Feb 12 20:27:12.246000 audit[1877]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000394bd8 items=0 ppid=1740 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:12.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737376565653437363730646237326131343237313539626461633839 Feb 12 20:27:12.268453 env[1123]: time="2024-02-12T20:27:12.267355532Z" level=info msg="StartContainer for \"e64fc7e385b31ebdcd3b01926d3405768e5c6b08485ecf47b6965701167d9ac6\" returns successfully" Feb 12 20:27:12.276659 env[1123]: time="2024-02-12T20:27:12.276606462Z" level=info msg="StartContainer for \"3b188897f8e0daf6ed97aa0d3439e05263dabebf25466ddcb0051748651d4c41\" returns successfully" Feb 12 20:27:12.277939 env[1123]: time="2024-02-12T20:27:12.277913355Z" level=info msg="StartContainer for \"777eee47670db72a1427159bdac8984e3c1a04484294af713289807a7eff6733\" returns successfully" Feb 12 20:27:12.553692 kubelet[1669]: I0212 20:27:12.553353 1669 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 20:27:12.970000 audit[1881]: AVC avc: denied { watch } for pid=1881 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:27:12.970000 audit[1881]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c1e000 a2=fc6 a3=0 items=0 ppid=1746 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 key=(null) Feb 12 20:27:12.970000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:27:12.970000 audit[1881]: AVC avc: denied { watch } for pid=1881 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:27:12.970000 audit[1881]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000300760 a2=fc6 a3=0 items=0 ppid=1746 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 key=(null) Feb 12 20:27:12.970000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:27:13.076794 kubelet[1669]: E0212 20:27:13.076760 1669 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:13.078350 kubelet[1669]: E0212 20:27:13.078327 1669 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:13.079641 kubelet[1669]: E0212 20:27:13.079619 1669 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:13.681000 audit[1903]: AVC avc: denied { watch } for pid=1903 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c36,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:27:13.681000 audit[1903]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3e a1=c009b0e000 a2=fc6 a3=0 items=0 ppid=1740 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c36,c831 key=(null) Feb 12 20:27:13.681000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 20:27:13.681000 audit[1903]: AVC avc: denied { watch } for pid=1903 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c36,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:27:13.681000 audit[1903]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3e a1=c0036a0060 a2=fc6 a3=0 items=0 ppid=1740 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c36,c831 key=(null) Feb 12 20:27:13.681000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 20:27:13.681000 audit[1903]: AVC avc: denied { watch } for pid=1903 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c36,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:27:13.681000 audit[1903]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c00a24c030 a2=fc6 a3=0 items=0 ppid=1740 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c36,c831 key=(null) Feb 12 20:27:13.681000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 20:27:13.689000 audit[1903]: AVC avc: denied { watch } for pid=1903 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c36,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:27:13.689000 audit[1903]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4f a1=c0037c39e0 a2=fc6 a3=0 items=0 ppid=1740 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c36,c831 key=(null) Feb 12 20:27:13.689000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 20:27:13.690000 audit[1903]: AVC avc: denied { watch } for pid=1903 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c36,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:27:13.690000 audit[1903]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=53 a1=c009ae8360 a2=fc6 a3=0 items=0 ppid=1740 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c36,c831 key=(null) Feb 12 20:27:13.690000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 20:27:13.702000 audit[1903]: AVC avc: denied { watch } for pid=1903 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=521018 scontext=system_u:system_r:svirt_lxc_net_t:s0:c36,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:27:13.702000 audit[1903]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c009ae8a80 a2=fc6 a3=0 items=0 ppid=1740 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c36,c831 key=(null) Feb 12 20:27:13.702000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 20:27:13.724819 kubelet[1669]: E0212 20:27:13.724774 1669 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Feb 12 20:27:13.813239 kubelet[1669]: I0212 20:27:13.813191 1669 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Feb 12 20:27:14.044976 kubelet[1669]: I0212 20:27:14.044930 1669 apiserver.go:52] "Watching apiserver" Feb 12 20:27:14.047396 kubelet[1669]: I0212 20:27:14.047375 1669 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 12 20:27:14.071632 kubelet[1669]: I0212 20:27:14.071606 1669 reconciler.go:41] "Reconciler: start to sync state" Feb 12 20:27:14.084444 kubelet[1669]: E0212 20:27:14.084409 1669 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" Feb 12 20:27:14.084832 kubelet[1669]: E0212 20:27:14.084819 1669 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:16.024497 kubelet[1669]: E0212 20:27:16.024454 1669 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:16.083878 kubelet[1669]: E0212 20:27:16.083843 1669 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:16.198689 kubelet[1669]: E0212 20:27:16.198636 1669 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:16.888407 systemd[1]: Reloading. Feb 12 20:27:16.916981 kernel: kauditd_printk_skb: 583 callbacks suppressed Feb 12 20:27:16.917091 kernel: audit: type=1400 audit(1707769636.910:703): avc: denied { watch } for pid=1881 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:27:16.917114 kernel: audit: type=1300 audit(1707769636.910:703): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c7d260 a2=fc6 a3=0 items=0 ppid=1746 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 key=(null) Feb 12 20:27:16.910000 audit[1881]: AVC avc: denied { watch } for pid=1881 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:27:16.910000 audit[1881]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c7d260 a2=fc6 a3=0 items=0 ppid=1746 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 key=(null) Feb 12 20:27:16.920564 kernel: audit: type=1327 audit(1707769636.910:703): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:27:16.910000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:27:16.923424 kernel: audit: type=1400 audit(1707769636.910:704): avc: denied { watch } for pid=1881 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:27:16.910000 audit[1881]: AVC avc: denied { watch } for pid=1881 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:27:16.927110 kernel: audit: type=1300 audit(1707769636.910:704): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c7d3a0 a2=fc6 a3=0 items=0 ppid=1746 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 key=(null) Feb 12 20:27:16.910000 audit[1881]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c7d3a0 a2=fc6 a3=0 items=0 ppid=1746 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 key=(null) Feb 12 20:27:16.930145 kernel: audit: type=1327 audit(1707769636.910:704): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:27:16.910000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:27:16.932916 kernel: audit: type=1400 audit(1707769636.911:705): avc: denied { watch } for pid=1881 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:27:16.911000 audit[1881]: AVC avc: denied { watch } for pid=1881 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:27:16.911000 audit[1881]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00012ab00 a2=fc6 a3=0 items=0 ppid=1746 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 key=(null) Feb 12 20:27:16.939434 kernel: audit: type=1300 audit(1707769636.911:705): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00012ab00 a2=fc6 a3=0 items=0 ppid=1746 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 key=(null) Feb 12 20:27:16.939483 kernel: audit: type=1327 audit(1707769636.911:705): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:27:16.911000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:27:16.942159 kernel: audit: type=1400 audit(1707769636.916:706): avc: denied { watch } for pid=1881 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:27:16.916000 audit[1881]: AVC avc: denied { watch } for pid=1881 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:27:16.916000 audit[1881]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ca1d20 a2=fc6 a3=0 items=0 ppid=1746 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 key=(null) Feb 12 20:27:16.916000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:27:16.954574 /usr/lib/systemd/system-generators/torcx-generator[1975]: time="2024-02-12T20:27:16Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:27:16.954607 /usr/lib/systemd/system-generators/torcx-generator[1975]: time="2024-02-12T20:27:16Z" level=info msg="torcx already run" Feb 12 20:27:17.058580 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:27:17.058596 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:27:17.077860 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:27:17.085868 kubelet[1669]: E0212 20:27:17.085834 1669 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:17.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.137000 audit: BPF prog-id=91 op=LOAD Feb 12 20:27:17.137000 audit: BPF prog-id=75 op=UNLOAD Feb 12 20:27:17.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.138000 audit: BPF prog-id=92 op=LOAD Feb 12 20:27:17.138000 audit: BPF prog-id=83 op=UNLOAD Feb 12 20:27:17.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.138000 audit: BPF prog-id=93 op=LOAD Feb 12 20:27:17.138000 audit: BPF prog-id=52 op=UNLOAD Feb 12 20:27:17.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.140000 audit: BPF prog-id=94 op=LOAD Feb 12 20:27:17.140000 audit: BPF prog-id=53 op=UNLOAD Feb 12 20:27:17.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.142000 audit: BPF prog-id=95 op=LOAD Feb 12 20:27:17.142000 audit: BPF prog-id=87 op=UNLOAD Feb 12 20:27:17.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.143000 audit: BPF prog-id=96 op=LOAD Feb 12 20:27:17.143000 audit: BPF prog-id=54 op=UNLOAD Feb 12 20:27:17.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.144000 audit: BPF prog-id=97 op=LOAD Feb 12 20:27:17.144000 audit: BPF prog-id=67 op=UNLOAD Feb 12 20:27:17.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.144000 audit: BPF prog-id=98 op=LOAD Feb 12 20:27:17.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.144000 audit: BPF prog-id=99 op=LOAD Feb 12 20:27:17.144000 audit: BPF prog-id=55 op=UNLOAD Feb 12 20:27:17.144000 audit: BPF prog-id=56 op=UNLOAD Feb 12 20:27:17.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.145000 audit: BPF prog-id=100 op=LOAD Feb 12 20:27:17.145000 audit: BPF prog-id=57 op=UNLOAD Feb 12 20:27:17.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.145000 audit: BPF prog-id=101 op=LOAD Feb 12 20:27:17.145000 audit: BPF prog-id=71 op=UNLOAD Feb 12 20:27:17.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.146000 audit: BPF prog-id=102 op=LOAD Feb 12 20:27:17.146000 audit: BPF prog-id=58 op=UNLOAD Feb 12 20:27:17.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.147000 audit: BPF prog-id=103 op=LOAD Feb 12 20:27:17.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.147000 audit: BPF prog-id=104 op=LOAD Feb 12 20:27:17.147000 audit: BPF prog-id=59 op=UNLOAD Feb 12 20:27:17.147000 audit: BPF prog-id=60 op=UNLOAD Feb 12 20:27:17.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.147000 audit: BPF prog-id=105 op=LOAD Feb 12 20:27:17.147000 audit: BPF prog-id=79 op=UNLOAD Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit: BPF prog-id=106 op=LOAD Feb 12 20:27:17.148000 audit: BPF prog-id=61 op=UNLOAD Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit: BPF prog-id=107 op=LOAD Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit: BPF prog-id=108 op=LOAD Feb 12 20:27:17.148000 audit: BPF prog-id=62 op=UNLOAD Feb 12 20:27:17.148000 audit: BPF prog-id=63 op=UNLOAD Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.149000 audit: BPF prog-id=109 op=LOAD Feb 12 20:27:17.149000 audit: BPF prog-id=64 op=UNLOAD Feb 12 20:27:17.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.149000 audit: BPF prog-id=110 op=LOAD Feb 12 20:27:17.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.149000 audit: BPF prog-id=111 op=LOAD Feb 12 20:27:17.149000 audit: BPF prog-id=65 op=UNLOAD Feb 12 20:27:17.149000 audit: BPF prog-id=66 op=UNLOAD Feb 12 20:27:17.159464 kubelet[1669]: I0212 20:27:17.159398 1669 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 20:27:17.159426 systemd[1]: Stopping kubelet.service... Feb 12 20:27:17.181182 systemd[1]: kubelet.service: Deactivated successfully. Feb 12 20:27:17.181343 systemd[1]: Stopped kubelet.service. Feb 12 20:27:17.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:17.182814 systemd[1]: Started kubelet.service. Feb 12 20:27:17.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:17.222910 kubelet[2014]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 20:27:17.222910 kubelet[2014]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 20:27:17.222910 kubelet[2014]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 20:27:17.223298 kubelet[2014]: I0212 20:27:17.222930 2014 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 20:27:17.226578 kubelet[2014]: I0212 20:27:17.226553 2014 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 12 20:27:17.226654 kubelet[2014]: I0212 20:27:17.226641 2014 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 20:27:17.226928 kubelet[2014]: I0212 20:27:17.226915 2014 server.go:837] "Client rotation is on, will bootstrap in background" Feb 12 20:27:17.228309 kubelet[2014]: I0212 20:27:17.228296 2014 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 12 20:27:17.229296 kubelet[2014]: I0212 20:27:17.229269 2014 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 20:27:17.233307 kubelet[2014]: I0212 20:27:17.233281 2014 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 20:27:17.233461 kubelet[2014]: I0212 20:27:17.233448 2014 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 20:27:17.233514 kubelet[2014]: I0212 20:27:17.233506 2014 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 20:27:17.233588 kubelet[2014]: I0212 20:27:17.233520 2014 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 20:27:17.233588 kubelet[2014]: I0212 20:27:17.233528 2014 container_manager_linux.go:302] "Creating device plugin manager" Feb 12 20:27:17.233588 kubelet[2014]: I0212 20:27:17.233552 2014 state_mem.go:36] "Initialized new in-memory state store" Feb 12 20:27:17.235807 kubelet[2014]: I0212 20:27:17.235795 2014 kubelet.go:405] "Attempting to sync node with API server" Feb 12 20:27:17.235862 kubelet[2014]: I0212 20:27:17.235811 2014 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 20:27:17.235862 kubelet[2014]: I0212 20:27:17.235825 2014 kubelet.go:309] "Adding apiserver pod source" Feb 12 20:27:17.235862 kubelet[2014]: I0212 20:27:17.235832 2014 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 20:27:17.241799 kubelet[2014]: I0212 20:27:17.241777 2014 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 20:27:17.242235 kubelet[2014]: I0212 20:27:17.242208 2014 server.go:1168] "Started kubelet" Feb 12 20:27:17.245032 kubelet[2014]: I0212 20:27:17.245005 2014 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 20:27:17.245000 audit[2014]: AVC avc: denied { mac_admin } for pid=2014 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.245000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:27:17.245000 audit[2014]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b8fc20 a1=c0007dad68 a2=c000b8fbf0 a3=25 items=0 ppid=1 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:17.245000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:27:17.245000 audit[2014]: AVC avc: denied { mac_admin } for pid=2014 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.245000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:27:17.245000 audit[2014]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000947420 a1=c0007dad80 a2=c000b8fcb0 a3=25 items=0 ppid=1 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:17.245000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:27:17.246761 kubelet[2014]: I0212 20:27:17.246137 2014 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 20:27:17.246761 kubelet[2014]: I0212 20:27:17.246167 2014 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 20:27:17.246761 kubelet[2014]: I0212 20:27:17.246183 2014 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 20:27:17.246761 kubelet[2014]: I0212 20:27:17.246689 2014 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 20:27:17.247328 kubelet[2014]: I0212 20:27:17.247313 2014 server.go:461] "Adding debug handlers to kubelet server" Feb 12 20:27:17.248382 kubelet[2014]: I0212 20:27:17.248370 2014 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 12 20:27:17.248514 kubelet[2014]: I0212 20:27:17.248500 2014 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 12 20:27:17.251710 kubelet[2014]: E0212 20:27:17.251683 2014 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 20:27:17.251710 kubelet[2014]: E0212 20:27:17.251713 2014 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 20:27:17.263980 kubelet[2014]: I0212 20:27:17.263928 2014 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 20:27:17.264590 kubelet[2014]: I0212 20:27:17.264568 2014 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 20:27:17.264686 kubelet[2014]: I0212 20:27:17.264621 2014 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 12 20:27:17.264686 kubelet[2014]: I0212 20:27:17.264639 2014 kubelet.go:2257] "Starting kubelet main sync loop" Feb 12 20:27:17.264734 kubelet[2014]: E0212 20:27:17.264691 2014 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 20:27:17.286588 kubelet[2014]: I0212 20:27:17.286562 2014 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 20:27:17.286588 kubelet[2014]: I0212 20:27:17.286581 2014 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 20:27:17.286588 kubelet[2014]: I0212 20:27:17.286595 2014 state_mem.go:36] "Initialized new in-memory state store" Feb 12 20:27:17.286775 kubelet[2014]: I0212 20:27:17.286723 2014 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 12 20:27:17.286775 kubelet[2014]: I0212 20:27:17.286734 2014 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 12 20:27:17.286775 kubelet[2014]: I0212 20:27:17.286739 2014 policy_none.go:49] "None policy: Start" Feb 12 20:27:17.287232 kubelet[2014]: I0212 20:27:17.287218 2014 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 20:27:17.287232 kubelet[2014]: I0212 20:27:17.287234 2014 state_mem.go:35] "Initializing new in-memory state store" Feb 12 20:27:17.287356 kubelet[2014]: I0212 20:27:17.287344 2014 state_mem.go:75] "Updated machine memory state" Feb 12 20:27:17.290286 kubelet[2014]: I0212 20:27:17.290272 2014 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 20:27:17.289000 audit[2014]: AVC avc: denied { mac_admin } for pid=2014 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:17.289000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:27:17.289000 audit[2014]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0011c36e0 a1=c0011535a8 a2=c0011c36b0 a3=25 items=0 ppid=1 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:17.289000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:27:17.290491 kubelet[2014]: I0212 20:27:17.290329 2014 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 20:27:17.290491 kubelet[2014]: I0212 20:27:17.290488 2014 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 20:27:17.351434 kubelet[2014]: I0212 20:27:17.351412 2014 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 12 20:27:17.365636 kubelet[2014]: I0212 20:27:17.365604 2014 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:27:17.365766 kubelet[2014]: I0212 20:27:17.365679 2014 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:27:17.365766 kubelet[2014]: I0212 20:27:17.365703 2014 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:27:17.405501 kubelet[2014]: E0212 20:27:17.405371 2014 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" Feb 12 20:27:17.406084 kubelet[2014]: E0212 20:27:17.406064 2014 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" Feb 12 20:27:17.408822 kubelet[2014]: I0212 20:27:17.408808 2014 kubelet_node_status.go:108] "Node was previously registered" node="localhost" Feb 12 20:27:17.408987 kubelet[2014]: I0212 20:27:17.408974 2014 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Feb 12 20:27:17.550066 kubelet[2014]: I0212 20:27:17.550027 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 20:27:17.550254 kubelet[2014]: I0212 20:27:17.550240 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 20:27:17.550360 kubelet[2014]: I0212 20:27:17.550347 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 20:27:17.550450 kubelet[2014]: I0212 20:27:17.550435 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 20:27:17.550544 kubelet[2014]: I0212 20:27:17.550530 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/1e158560b1e7576cdb3b208f290a2d49-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"1e158560b1e7576cdb3b208f290a2d49\") " pod="kube-system/kube-apiserver-localhost" Feb 12 20:27:17.550632 kubelet[2014]: I0212 20:27:17.550618 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/1e158560b1e7576cdb3b208f290a2d49-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"1e158560b1e7576cdb3b208f290a2d49\") " pod="kube-system/kube-apiserver-localhost" Feb 12 20:27:17.550717 kubelet[2014]: I0212 20:27:17.550704 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/1e158560b1e7576cdb3b208f290a2d49-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"1e158560b1e7576cdb3b208f290a2d49\") " pod="kube-system/kube-apiserver-localhost" Feb 12 20:27:17.550837 kubelet[2014]: I0212 20:27:17.550823 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 12 20:27:17.550923 kubelet[2014]: I0212 20:27:17.550908 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2b0e94b38682f4e439413801d3cc54db-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2b0e94b38682f4e439413801d3cc54db\") " pod="kube-system/kube-scheduler-localhost" Feb 12 20:27:17.704968 kubelet[2014]: E0212 20:27:17.704842 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:17.706367 kubelet[2014]: E0212 20:27:17.706347 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:17.706640 kubelet[2014]: E0212 20:27:17.706611 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:18.236146 kubelet[2014]: I0212 20:27:18.236103 2014 apiserver.go:52] "Watching apiserver" Feb 12 20:27:18.249383 kubelet[2014]: I0212 20:27:18.249352 2014 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 12 20:27:18.254814 kubelet[2014]: I0212 20:27:18.254779 2014 reconciler.go:41] "Reconciler: start to sync state" Feb 12 20:27:18.273306 kubelet[2014]: E0212 20:27:18.273276 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:18.274295 kubelet[2014]: E0212 20:27:18.274280 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:18.280773 kubelet[2014]: E0212 20:27:18.280536 2014 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Feb 12 20:27:18.281055 kubelet[2014]: E0212 20:27:18.281029 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:18.356388 kubelet[2014]: I0212 20:27:18.356348 2014 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=2.356296566 podCreationTimestamp="2024-02-12 20:27:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:27:18.341563725 +0000 UTC m=+1.155484356" watchObservedRunningTime="2024-02-12 20:27:18.356296566 +0000 UTC m=+1.170217197" Feb 12 20:27:18.364437 kubelet[2014]: I0212 20:27:18.364398 2014 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.3642803749999999 podCreationTimestamp="2024-02-12 20:27:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:27:18.356484473 +0000 UTC m=+1.170405104" watchObservedRunningTime="2024-02-12 20:27:18.364280375 +0000 UTC m=+1.178201007" Feb 12 20:27:18.364615 kubelet[2014]: I0212 20:27:18.364531 2014 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=2.364501065 podCreationTimestamp="2024-02-12 20:27:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:27:18.364475116 +0000 UTC m=+1.178395747" watchObservedRunningTime="2024-02-12 20:27:18.364501065 +0000 UTC m=+1.178421686" Feb 12 20:27:19.274521 kubelet[2014]: E0212 20:27:19.274491 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:20.117578 update_engine[1112]: I0212 20:27:20.117528 1112 update_attempter.cc:509] Updating boot flags... Feb 12 20:27:22.006925 sudo[1250]: pam_unix(sudo:session): session closed for user root Feb 12 20:27:22.006000 audit[1250]: USER_END pid=1250 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:27:22.010304 kernel: kauditd_printk_skb: 260 callbacks suppressed Feb 12 20:27:22.010500 kernel: audit: type=1106 audit(1707769642.006:956): pid=1250 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:27:22.010537 kernel: audit: type=1104 audit(1707769642.006:957): pid=1250 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:27:22.006000 audit[1250]: CRED_DISP pid=1250 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:27:22.011198 sshd[1247]: pam_unix(sshd:session): session closed for user core Feb 12 20:27:22.011000 audit[1247]: USER_END pid=1247 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:22.013578 systemd[1]: sshd@6-10.0.0.105:22-10.0.0.1:58756.service: Deactivated successfully. Feb 12 20:27:22.014306 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 20:27:22.014474 systemd[1]: session-7.scope: Consumed 3.636s CPU time. Feb 12 20:27:22.014997 systemd-logind[1111]: Session 7 logged out. Waiting for processes to exit. Feb 12 20:27:22.015675 kernel: audit: type=1106 audit(1707769642.011:958): pid=1247 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:22.015725 kernel: audit: type=1104 audit(1707769642.011:959): pid=1247 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:22.011000 audit[1247]: CRED_DISP pid=1247 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:22.015829 systemd-logind[1111]: Removed session 7. Feb 12 20:27:22.017975 kernel: audit: type=1131 audit(1707769642.012:960): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.105:22-10.0.0.1:58756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:22.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.105:22-10.0.0.1:58756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:23.186703 kubelet[2014]: E0212 20:27:23.186635 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:23.280246 kubelet[2014]: E0212 20:27:23.280207 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:26.228042 kubelet[2014]: E0212 20:27:26.228009 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:26.284001 kubelet[2014]: E0212 20:27:26.283976 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:26.395951 kubelet[2014]: E0212 20:27:26.395916 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:26.984000 audit[1881]: AVC avc: denied { watch } for pid=1881 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521043 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 20:27:26.984000 audit[1881]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0010afb40 a2=fc6 a3=0 items=0 ppid=1746 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 key=(null) Feb 12 20:27:26.992779 kernel: audit: type=1400 audit(1707769646.984:961): avc: denied { watch } for pid=1881 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521043 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 20:27:26.992839 kernel: audit: type=1300 audit(1707769646.984:961): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0010afb40 a2=fc6 a3=0 items=0 ppid=1746 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 key=(null) Feb 12 20:27:26.992882 kernel: audit: type=1327 audit(1707769646.984:961): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:27:26.984000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:27:27.285235 kubelet[2014]: E0212 20:27:27.285144 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:29.951840 kubelet[2014]: I0212 20:27:29.951807 2014 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 12 20:27:29.952220 env[1123]: time="2024-02-12T20:27:29.952190433Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 20:27:29.952414 kubelet[2014]: I0212 20:27:29.952381 2014 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 12 20:27:30.831741 kubelet[2014]: I0212 20:27:30.831688 2014 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:27:30.836698 kubelet[2014]: I0212 20:27:30.836673 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/528df151-c509-49fd-babf-65df7b7ab06b-xtables-lock\") pod \"kube-proxy-d7tm2\" (UID: \"528df151-c509-49fd-babf-65df7b7ab06b\") " pod="kube-system/kube-proxy-d7tm2" Feb 12 20:27:30.836850 kubelet[2014]: I0212 20:27:30.836720 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/528df151-c509-49fd-babf-65df7b7ab06b-lib-modules\") pod \"kube-proxy-d7tm2\" (UID: \"528df151-c509-49fd-babf-65df7b7ab06b\") " pod="kube-system/kube-proxy-d7tm2" Feb 12 20:27:30.836850 kubelet[2014]: I0212 20:27:30.836750 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mbk2k\" (UniqueName: \"kubernetes.io/projected/528df151-c509-49fd-babf-65df7b7ab06b-kube-api-access-mbk2k\") pod \"kube-proxy-d7tm2\" (UID: \"528df151-c509-49fd-babf-65df7b7ab06b\") " pod="kube-system/kube-proxy-d7tm2" Feb 12 20:27:30.836850 kubelet[2014]: I0212 20:27:30.836772 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/528df151-c509-49fd-babf-65df7b7ab06b-kube-proxy\") pod \"kube-proxy-d7tm2\" (UID: \"528df151-c509-49fd-babf-65df7b7ab06b\") " pod="kube-system/kube-proxy-d7tm2" Feb 12 20:27:30.836964 systemd[1]: Created slice kubepods-besteffort-pod528df151_c509_49fd_babf_65df7b7ab06b.slice. Feb 12 20:27:30.941858 kubelet[2014]: I0212 20:27:30.941806 2014 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:27:30.946369 systemd[1]: Created slice kubepods-besteffort-podf6c47ecb_b54a_446b_90c1_ad3ff4546989.slice. Feb 12 20:27:31.138363 kubelet[2014]: I0212 20:27:31.138213 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/f6c47ecb-b54a-446b-90c1-ad3ff4546989-var-lib-calico\") pod \"tigera-operator-7ff8dc855-mjxll\" (UID: \"f6c47ecb-b54a-446b-90c1-ad3ff4546989\") " pod="tigera-operator/tigera-operator-7ff8dc855-mjxll" Feb 12 20:27:31.138363 kubelet[2014]: I0212 20:27:31.138264 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nh95w\" (UniqueName: \"kubernetes.io/projected/f6c47ecb-b54a-446b-90c1-ad3ff4546989-kube-api-access-nh95w\") pod \"tigera-operator-7ff8dc855-mjxll\" (UID: \"f6c47ecb-b54a-446b-90c1-ad3ff4546989\") " pod="tigera-operator/tigera-operator-7ff8dc855-mjxll" Feb 12 20:27:31.143452 kubelet[2014]: E0212 20:27:31.143424 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:31.144106 env[1123]: time="2024-02-12T20:27:31.144066226Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-d7tm2,Uid:528df151-c509-49fd-babf-65df7b7ab06b,Namespace:kube-system,Attempt:0,}" Feb 12 20:27:31.158591 env[1123]: time="2024-02-12T20:27:31.158511319Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:27:31.158591 env[1123]: time="2024-02-12T20:27:31.158561092Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:27:31.158591 env[1123]: time="2024-02-12T20:27:31.158571943Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:27:31.158791 env[1123]: time="2024-02-12T20:27:31.158758966Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/69ea5de15ae0025d3dd9c1e7b7744888c27c56f50abca502c3199d3303581c87 pid=2121 runtime=io.containerd.runc.v2 Feb 12 20:27:31.170521 systemd[1]: Started cri-containerd-69ea5de15ae0025d3dd9c1e7b7744888c27c56f50abca502c3199d3303581c87.scope. Feb 12 20:27:31.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.183002 kernel: audit: type=1400 audit(1707769651.177:962): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.183048 kernel: audit: type=1400 audit(1707769651.177:963): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.183066 kernel: audit: type=1400 audit(1707769651.177:964): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.185001 kernel: audit: type=1400 audit(1707769651.177:965): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.187126 kernel: audit: type=1400 audit(1707769651.177:966): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.191186 kernel: audit: type=1400 audit(1707769651.178:967): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.191229 kernel: audit: type=1400 audit(1707769651.178:968): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.194181 kernel: audit: type=1400 audit(1707769651.178:969): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.198054 kernel: audit: type=1400 audit(1707769651.178:970): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.198100 kernel: audit: type=1400 audit(1707769651.182:971): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.182000 audit: BPF prog-id=112 op=LOAD Feb 12 20:27:31.182000 audit[2131]: AVC avc: denied { bpf } for pid=2131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.182000 audit[2131]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2121 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639656135646531356165303032356433646439633165376237373434 Feb 12 20:27:31.182000 audit[2131]: AVC avc: denied { perfmon } for pid=2131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.182000 audit[2131]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2121 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639656135646531356165303032356433646439633165376237373434 Feb 12 20:27:31.182000 audit[2131]: AVC avc: denied { bpf } for pid=2131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.182000 audit[2131]: AVC avc: denied { bpf } for pid=2131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.182000 audit[2131]: AVC avc: denied { bpf } for pid=2131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.182000 audit[2131]: AVC avc: denied { perfmon } for pid=2131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.182000 audit[2131]: AVC avc: denied { perfmon } for pid=2131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.182000 audit[2131]: AVC avc: denied { perfmon } for pid=2131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.182000 audit[2131]: AVC avc: denied { perfmon } for pid=2131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.182000 audit[2131]: AVC avc: denied { perfmon } for pid=2131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.182000 audit[2131]: AVC avc: denied { bpf } for pid=2131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.182000 audit[2131]: AVC avc: denied { bpf } for pid=2131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.182000 audit: BPF prog-id=113 op=LOAD Feb 12 20:27:31.182000 audit[2131]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000328fb0 items=0 ppid=2121 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639656135646531356165303032356433646439633165376237373434 Feb 12 20:27:31.184000 audit[2131]: AVC avc: denied { bpf } for pid=2131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.184000 audit[2131]: AVC avc: denied { bpf } for pid=2131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.184000 audit[2131]: AVC avc: denied { perfmon } for pid=2131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.184000 audit[2131]: AVC avc: denied { perfmon } for pid=2131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.184000 audit[2131]: AVC avc: denied { perfmon } for pid=2131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.184000 audit[2131]: AVC avc: denied { perfmon } for pid=2131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.184000 audit[2131]: AVC avc: denied { perfmon } for pid=2131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.184000 audit[2131]: AVC avc: denied { bpf } for pid=2131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.184000 audit[2131]: AVC avc: denied { bpf } for pid=2131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.184000 audit: BPF prog-id=114 op=LOAD Feb 12 20:27:31.184000 audit[2131]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000328ff8 items=0 ppid=2121 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639656135646531356165303032356433646439633165376237373434 Feb 12 20:27:31.186000 audit: BPF prog-id=114 op=UNLOAD Feb 12 20:27:31.186000 audit: BPF prog-id=113 op=UNLOAD Feb 12 20:27:31.186000 audit[2131]: AVC avc: denied { bpf } for pid=2131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.186000 audit[2131]: AVC avc: denied { bpf } for pid=2131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.186000 audit[2131]: AVC avc: denied { bpf } for pid=2131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.186000 audit[2131]: AVC avc: denied { perfmon } for pid=2131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.186000 audit[2131]: AVC avc: denied { perfmon } for pid=2131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.186000 audit[2131]: AVC avc: denied { perfmon } for pid=2131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.186000 audit[2131]: AVC avc: denied { perfmon } for pid=2131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.186000 audit[2131]: AVC avc: denied { perfmon } for pid=2131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.186000 audit[2131]: AVC avc: denied { bpf } for pid=2131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.186000 audit[2131]: AVC avc: denied { bpf } for pid=2131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.186000 audit: BPF prog-id=115 op=LOAD Feb 12 20:27:31.186000 audit[2131]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000329408 items=0 ppid=2121 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639656135646531356165303032356433646439633165376237373434 Feb 12 20:27:31.208504 env[1123]: time="2024-02-12T20:27:31.208465249Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-d7tm2,Uid:528df151-c509-49fd-babf-65df7b7ab06b,Namespace:kube-system,Attempt:0,} returns sandbox id \"69ea5de15ae0025d3dd9c1e7b7744888c27c56f50abca502c3199d3303581c87\"" Feb 12 20:27:31.209246 kubelet[2014]: E0212 20:27:31.209203 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:31.210864 env[1123]: time="2024-02-12T20:27:31.210828750Z" level=info msg="CreateContainer within sandbox \"69ea5de15ae0025d3dd9c1e7b7744888c27c56f50abca502c3199d3303581c87\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 20:27:31.224929 env[1123]: time="2024-02-12T20:27:31.224858990Z" level=info msg="CreateContainer within sandbox \"69ea5de15ae0025d3dd9c1e7b7744888c27c56f50abca502c3199d3303581c87\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"1901c52902d3df45ef66e6bea97cd461591953d688486e3e2e4288010140757d\"" Feb 12 20:27:31.225424 env[1123]: time="2024-02-12T20:27:31.225385083Z" level=info msg="StartContainer for \"1901c52902d3df45ef66e6bea97cd461591953d688486e3e2e4288010140757d\"" Feb 12 20:27:31.237934 systemd[1]: Started cri-containerd-1901c52902d3df45ef66e6bea97cd461591953d688486e3e2e4288010140757d.scope. Feb 12 20:27:31.251000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.251000 audit[2162]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f556ec72d88 items=0 ppid=2121 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139303163353239303264336466343565663636653662656139376364 Feb 12 20:27:31.251000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.251000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.251000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.251000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.251000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.251000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.251000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.251000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.251000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.251000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.251000 audit: BPF prog-id=116 op=LOAD Feb 12 20:27:31.251000 audit[2162]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00009b198 items=0 ppid=2121 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139303163353239303264336466343565663636653662656139376364 Feb 12 20:27:31.251000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.251000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.251000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.251000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.251000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.251000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.251000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.251000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.251000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.251000 audit: BPF prog-id=117 op=LOAD Feb 12 20:27:31.251000 audit[2162]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00009b1e8 items=0 ppid=2121 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139303163353239303264336466343565663636653662656139376364 Feb 12 20:27:31.251000 audit: BPF prog-id=117 op=UNLOAD Feb 12 20:27:31.251000 audit: BPF prog-id=116 op=UNLOAD Feb 12 20:27:31.251000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.251000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.251000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.251000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.251000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.251000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.251000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.251000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.251000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.251000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.251000 audit: BPF prog-id=118 op=LOAD Feb 12 20:27:31.251000 audit[2162]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00009b278 items=0 ppid=2121 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139303163353239303264336466343565663636653662656139376364 Feb 12 20:27:31.254242 env[1123]: time="2024-02-12T20:27:31.253585536Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-mjxll,Uid:f6c47ecb-b54a-446b-90c1-ad3ff4546989,Namespace:tigera-operator,Attempt:0,}" Feb 12 20:27:31.265655 env[1123]: time="2024-02-12T20:27:31.265592768Z" level=info msg="StartContainer for \"1901c52902d3df45ef66e6bea97cd461591953d688486e3e2e4288010140757d\" returns successfully" Feb 12 20:27:31.272780 env[1123]: time="2024-02-12T20:27:31.272717415Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:27:31.272780 env[1123]: time="2024-02-12T20:27:31.272756639Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:27:31.272940 env[1123]: time="2024-02-12T20:27:31.272766247Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:27:31.272940 env[1123]: time="2024-02-12T20:27:31.272854915Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d72421314ee9d1ee852af3ad91251868d185bd0aad6b8c261c174460d0df43cf pid=2198 runtime=io.containerd.runc.v2 Feb 12 20:27:31.283309 systemd[1]: Started cri-containerd-d72421314ee9d1ee852af3ad91251868d185bd0aad6b8c261c174460d0df43cf.scope. Feb 12 20:27:31.295208 kubelet[2014]: E0212 20:27:31.295142 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:31.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.299000 audit: BPF prog-id=119 op=LOAD Feb 12 20:27:31.300000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.300000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2198 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437323432313331346565396431656538353261663361643931323531 Feb 12 20:27:31.300000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.300000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2198 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437323432313331346565396431656538353261663361643931323531 Feb 12 20:27:31.300000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.300000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.300000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.300000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.300000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.300000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.300000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.300000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.300000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.300000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.300000 audit: BPF prog-id=120 op=LOAD Feb 12 20:27:31.300000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001cab90 items=0 ppid=2198 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437323432313331346565396431656538353261663361643931323531 Feb 12 20:27:31.300000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.300000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.300000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.300000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.300000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.300000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.300000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.300000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.300000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.300000 audit: BPF prog-id=121 op=LOAD Feb 12 20:27:31.300000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001cabd8 items=0 ppid=2198 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437323432313331346565396431656538353261663361643931323531 Feb 12 20:27:31.300000 audit: BPF prog-id=121 op=UNLOAD Feb 12 20:27:31.300000 audit: BPF prog-id=120 op=UNLOAD Feb 12 20:27:31.300000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.300000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.300000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.300000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.300000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.300000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.300000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.300000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.300000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.300000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:31.300000 audit: BPF prog-id=122 op=LOAD Feb 12 20:27:31.300000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001cafe8 items=0 ppid=2198 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437323432313331346565396431656538353261663361643931323531 Feb 12 20:27:31.307774 kubelet[2014]: I0212 20:27:31.307740 2014 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-d7tm2" podStartSLOduration=1.307702945 podCreationTimestamp="2024-02-12 20:27:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:27:31.307526702 +0000 UTC m=+14.121447333" watchObservedRunningTime="2024-02-12 20:27:31.307702945 +0000 UTC m=+14.121623576" Feb 12 20:27:31.320000 audit[2248]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:31.320000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb4c73160 a2=0 a3=7ffeb4c7314c items=0 ppid=2173 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.320000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 20:27:31.320000 audit[2253]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:31.320000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc1a9b5120 a2=0 a3=7ffc1a9b510c items=0 ppid=2173 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.320000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 20:27:31.321000 audit[2254]: NETFILTER_CFG table=mangle:40 family=10 entries=1 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:31.321000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe7af17380 a2=0 a3=7ffe7af1736c items=0 ppid=2173 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.321000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 20:27:31.322000 audit[2255]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:31.322000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff98673240 a2=0 a3=7fff9867322c items=0 ppid=2173 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.322000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 20:27:31.323000 audit[2256]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:31.323000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc335788d0 a2=0 a3=7ffc335788bc items=0 ppid=2173 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.323000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 20:27:31.325504 env[1123]: time="2024-02-12T20:27:31.325451693Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-mjxll,Uid:f6c47ecb-b54a-446b-90c1-ad3ff4546989,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"d72421314ee9d1ee852af3ad91251868d185bd0aad6b8c261c174460d0df43cf\"" Feb 12 20:27:31.325000 audit[2258]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2258 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:31.325000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc23badbf0 a2=0 a3=7ffc23badbdc items=0 ppid=2173 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.325000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 20:27:31.326898 env[1123]: time="2024-02-12T20:27:31.326867224Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 12 20:27:31.424000 audit[2259]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:31.424000 audit[2259]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe4cbefcb0 a2=0 a3=7ffe4cbefc9c items=0 ppid=2173 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.424000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 20:27:31.426000 audit[2261]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2261 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:31.426000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff5b6275c0 a2=0 a3=7fff5b6275ac items=0 ppid=2173 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.426000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 20:27:31.429000 audit[2264]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2264 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:31.429000 audit[2264]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff85c93be0 a2=0 a3=7fff85c93bcc items=0 ppid=2173 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.429000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 20:27:31.430000 audit[2265]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:31.430000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1ddd9900 a2=0 a3=7ffe1ddd98ec items=0 ppid=2173 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.430000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 20:27:31.432000 audit[2267]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2267 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:31.432000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdbef66890 a2=0 a3=7ffdbef6687c items=0 ppid=2173 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.432000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 20:27:31.432000 audit[2268]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:31.432000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcdcac91f0 a2=0 a3=7ffcdcac91dc items=0 ppid=2173 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.432000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 20:27:31.434000 audit[2270]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2270 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:31.434000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc5c4740d0 a2=0 a3=7ffc5c4740bc items=0 ppid=2173 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.434000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 20:27:31.437000 audit[2273]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2273 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:31.437000 audit[2273]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe8aec7160 a2=0 a3=7ffe8aec714c items=0 ppid=2173 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.437000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 20:27:31.438000 audit[2274]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2274 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:31.438000 audit[2274]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed9cbdcf0 a2=0 a3=7ffed9cbdcdc items=0 ppid=2173 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.438000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 20:27:31.440000 audit[2276]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2276 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:31.440000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffccf27cf0 a2=0 a3=7fffccf27cdc items=0 ppid=2173 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.440000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 20:27:31.440000 audit[2277]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2277 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:31.440000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd63f84260 a2=0 a3=7ffd63f8424c items=0 ppid=2173 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.440000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 20:27:31.442000 audit[2279]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2279 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:31.442000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdfebcf580 a2=0 a3=7ffdfebcf56c items=0 ppid=2173 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.442000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 20:27:31.445000 audit[2282]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2282 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:31.445000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffce6f280f0 a2=0 a3=7ffce6f280dc items=0 ppid=2173 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.445000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 20:27:31.448000 audit[2285]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2285 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:31.448000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf278e430 a2=0 a3=7ffdf278e41c items=0 ppid=2173 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.448000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 20:27:31.449000 audit[2286]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:31.449000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffed115d550 a2=0 a3=7ffed115d53c items=0 ppid=2173 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.449000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 20:27:31.450000 audit[2288]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2288 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:31.450000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc0fc09270 a2=0 a3=7ffc0fc0925c items=0 ppid=2173 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.450000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:27:31.453000 audit[2291]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2291 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:31.453000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe4eae00a0 a2=0 a3=7ffe4eae008c items=0 ppid=2173 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.453000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:27:31.458000 audit[2296]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2296 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:31.458000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe46c4f2b0 a2=0 a3=7ffe46c4f29c items=0 ppid=2173 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.458000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 20:27:31.460000 audit[2298]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2298 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:31.460000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffc4f86acb0 a2=0 a3=7ffc4f86ac9c items=0 ppid=2173 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.460000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 20:27:31.468000 audit[2300]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2300 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:27:31.468000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffe1b55b7a0 a2=0 a3=7ffe1b55b78c items=0 ppid=2173 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.468000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:27:31.477000 audit[2300]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:27:31.477000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffe1b55b7a0 a2=0 a3=7ffe1b55b78c items=0 ppid=2173 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.477000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:27:31.478000 audit[2307]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:31.478000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe233a6c00 a2=0 a3=7ffe233a6bec items=0 ppid=2173 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.478000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 20:27:31.480000 audit[2309]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:31.480000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffede2e57b0 a2=0 a3=7ffede2e579c items=0 ppid=2173 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.480000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 20:27:31.483000 audit[2312]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:31.483000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc87359490 a2=0 a3=7ffc8735947c items=0 ppid=2173 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.483000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 20:27:31.484000 audit[2313]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:31.484000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff76e88aa0 a2=0 a3=7fff76e88a8c items=0 ppid=2173 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.484000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 20:27:31.486000 audit[2315]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2315 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:31.486000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff37e25980 a2=0 a3=7fff37e2596c items=0 ppid=2173 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.486000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 20:27:31.487000 audit[2316]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:31.487000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffccf1c53b0 a2=0 a3=7ffccf1c539c items=0 ppid=2173 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.487000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 20:27:31.489000 audit[2318]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2318 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:31.489000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffca94b07b0 a2=0 a3=7ffca94b079c items=0 ppid=2173 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.489000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 20:27:31.491000 audit[2321]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2321 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:31.491000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd19c55830 a2=0 a3=7ffd19c5581c items=0 ppid=2173 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.491000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 20:27:31.492000 audit[2322]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2322 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:31.492000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeaa2e9c60 a2=0 a3=7ffeaa2e9c4c items=0 ppid=2173 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.492000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 20:27:31.494000 audit[2324]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2324 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:31.494000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeb07a7ab0 a2=0 a3=7ffeb07a7a9c items=0 ppid=2173 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.494000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 20:27:31.495000 audit[2325]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2325 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:31.495000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe6af45a20 a2=0 a3=7ffe6af45a0c items=0 ppid=2173 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.495000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 20:27:31.497000 audit[2327]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:31.497000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffed66d6c0 a2=0 a3=7fffed66d6ac items=0 ppid=2173 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.497000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 20:27:31.500000 audit[2330]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:31.500000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd3ed2c3f0 a2=0 a3=7ffd3ed2c3dc items=0 ppid=2173 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.500000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 20:27:31.504000 audit[2333]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2333 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:31.504000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd838c96b0 a2=0 a3=7ffd838c969c items=0 ppid=2173 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.504000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 20:27:31.504000 audit[2334]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2334 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:31.504000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff8da63570 a2=0 a3=7fff8da6355c items=0 ppid=2173 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.504000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 20:27:31.506000 audit[2336]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2336 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:31.506000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdf7122930 a2=0 a3=7ffdf712291c items=0 ppid=2173 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.506000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:27:31.508000 audit[2339]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:31.508000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc8c290f60 a2=0 a3=7ffc8c290f4c items=0 ppid=2173 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.508000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:27:31.509000 audit[2340]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_chain pid=2340 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:31.509000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd443abd30 a2=0 a3=7ffd443abd1c items=0 ppid=2173 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.509000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 20:27:31.511000 audit[2342]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=2342 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:31.511000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffebfc03040 a2=0 a3=7ffebfc0302c items=0 ppid=2173 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.511000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 20:27:31.514000 audit[2345]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_rule pid=2345 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:31.514000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc6d292f40 a2=0 a3=7ffc6d292f2c items=0 ppid=2173 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.514000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 20:27:31.515000 audit[2346]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2346 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:31.515000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc937f0920 a2=0 a3=7ffc937f090c items=0 ppid=2173 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.515000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 20:27:31.516000 audit[2348]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2348 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:31.516000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc06b23d30 a2=0 a3=7ffc06b23d1c items=0 ppid=2173 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.516000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 20:27:31.519000 audit[2350]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2350 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 20:27:31.519000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffe22d2a2a0 a2=0 a3=7ffe22d2a28c items=0 ppid=2173 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.519000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:27:31.519000 audit[2350]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2350 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 20:27:31.519000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffe22d2a2a0 a2=0 a3=7ffe22d2a28c items=0 ppid=2173 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:31.519000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:27:33.849860 env[1123]: time="2024-02-12T20:27:33.849808320Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:33.851997 env[1123]: time="2024-02-12T20:27:33.851946442Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:33.853567 env[1123]: time="2024-02-12T20:27:33.853543634Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:33.855088 env[1123]: time="2024-02-12T20:27:33.855058340Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:33.855844 env[1123]: time="2024-02-12T20:27:33.855812032Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 12 20:27:33.857307 env[1123]: time="2024-02-12T20:27:33.857279910Z" level=info msg="CreateContainer within sandbox \"d72421314ee9d1ee852af3ad91251868d185bd0aad6b8c261c174460d0df43cf\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 12 20:27:33.866460 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3689280051.mount: Deactivated successfully. Feb 12 20:27:33.867161 env[1123]: time="2024-02-12T20:27:33.867129366Z" level=info msg="CreateContainer within sandbox \"d72421314ee9d1ee852af3ad91251868d185bd0aad6b8c261c174460d0df43cf\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"27c2c662dabc3e1b79a6a025414c9d80cbe9975e4b1d5befe008248696acb64d\"" Feb 12 20:27:33.867582 env[1123]: time="2024-02-12T20:27:33.867554818Z" level=info msg="StartContainer for \"27c2c662dabc3e1b79a6a025414c9d80cbe9975e4b1d5befe008248696acb64d\"" Feb 12 20:27:33.882157 systemd[1]: Started cri-containerd-27c2c662dabc3e1b79a6a025414c9d80cbe9975e4b1d5befe008248696acb64d.scope. Feb 12 20:27:33.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.891000 audit: BPF prog-id=123 op=LOAD Feb 12 20:27:33.891000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.891000 audit[2358]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2198 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:33.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237633263363632646162633365316237396136613032353431346339 Feb 12 20:27:33.891000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.891000 audit[2358]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2198 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:33.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237633263363632646162633365316237396136613032353431346339 Feb 12 20:27:33.892000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.892000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.892000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.892000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.892000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.892000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.892000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.892000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.892000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.892000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.892000 audit: BPF prog-id=124 op=LOAD Feb 12 20:27:33.892000 audit[2358]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0002e4120 items=0 ppid=2198 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:33.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237633263363632646162633365316237396136613032353431346339 Feb 12 20:27:33.892000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.892000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.892000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.892000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.892000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.892000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.892000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.892000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.892000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.892000 audit: BPF prog-id=125 op=LOAD Feb 12 20:27:33.892000 audit[2358]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0002e4168 items=0 ppid=2198 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:33.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237633263363632646162633365316237396136613032353431346339 Feb 12 20:27:33.892000 audit: BPF prog-id=125 op=UNLOAD Feb 12 20:27:33.892000 audit: BPF prog-id=124 op=UNLOAD Feb 12 20:27:33.892000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.892000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.892000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.892000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.892000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.892000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.892000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.892000 audit[2358]: AVC avc: denied { perfmon } for pid=2358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.892000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.892000 audit[2358]: AVC avc: denied { bpf } for pid=2358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:33.892000 audit: BPF prog-id=126 op=LOAD Feb 12 20:27:33.892000 audit[2358]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0002e4578 items=0 ppid=2198 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:33.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237633263363632646162633365316237396136613032353431346339 Feb 12 20:27:33.904843 env[1123]: time="2024-02-12T20:27:33.904789811Z" level=info msg="StartContainer for \"27c2c662dabc3e1b79a6a025414c9d80cbe9975e4b1d5befe008248696acb64d\" returns successfully" Feb 12 20:27:34.308249 kubelet[2014]: I0212 20:27:34.308201 2014 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7ff8dc855-mjxll" podStartSLOduration=1.778376174 podCreationTimestamp="2024-02-12 20:27:30 +0000 UTC" firstStartedPulling="2024-02-12 20:27:31.326321334 +0000 UTC m=+14.140241955" lastFinishedPulling="2024-02-12 20:27:33.856101468 +0000 UTC m=+16.670022089" observedRunningTime="2024-02-12 20:27:34.307861723 +0000 UTC m=+17.121782354" watchObservedRunningTime="2024-02-12 20:27:34.308156308 +0000 UTC m=+17.122076939" Feb 12 20:27:35.651000 audit[2391]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:27:35.651000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7fff13abe7b0 a2=0 a3=7fff13abe79c items=0 ppid=2173 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:35.651000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:27:35.652000 audit[2391]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:27:35.652000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7fff13abe7b0 a2=0 a3=31030 items=0 ppid=2173 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:35.652000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:27:35.661000 audit[2394]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2394 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:27:35.661000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffe89137ec0 a2=0 a3=7ffe89137eac items=0 ppid=2173 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:35.661000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:27:35.662000 audit[2394]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2394 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:27:35.662000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffe89137ec0 a2=0 a3=31030 items=0 ppid=2173 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:35.662000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:27:35.773496 kubelet[2014]: I0212 20:27:35.773457 2014 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:27:35.778243 systemd[1]: Created slice kubepods-besteffort-podc90bbc49_4d99_4bb0_8090_8e6a2da99494.slice. Feb 12 20:27:35.814024 kubelet[2014]: I0212 20:27:35.813987 2014 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:27:35.819116 systemd[1]: Created slice kubepods-besteffort-pod3e8ab170_e9a0_46e7_ab6b_86591bd9e7eb.slice. Feb 12 20:27:35.921786 kubelet[2014]: I0212 20:27:35.921689 2014 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:27:35.922167 kubelet[2014]: E0212 20:27:35.922152 2014 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nsjjr" podUID=00b3219e-c931-4bc8-a2f8-45793aef6eec Feb 12 20:27:35.971799 kubelet[2014]: I0212 20:27:35.971758 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/3e8ab170-e9a0-46e7-ab6b-86591bd9e7eb-var-run-calico\") pod \"calico-node-fldvp\" (UID: \"3e8ab170-e9a0-46e7-ab6b-86591bd9e7eb\") " pod="calico-system/calico-node-fldvp" Feb 12 20:27:35.971985 kubelet[2014]: I0212 20:27:35.971812 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/3e8ab170-e9a0-46e7-ab6b-86591bd9e7eb-flexvol-driver-host\") pod \"calico-node-fldvp\" (UID: \"3e8ab170-e9a0-46e7-ab6b-86591bd9e7eb\") " pod="calico-system/calico-node-fldvp" Feb 12 20:27:35.971985 kubelet[2014]: I0212 20:27:35.971844 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/3e8ab170-e9a0-46e7-ab6b-86591bd9e7eb-node-certs\") pod \"calico-node-fldvp\" (UID: \"3e8ab170-e9a0-46e7-ab6b-86591bd9e7eb\") " pod="calico-system/calico-node-fldvp" Feb 12 20:27:35.971985 kubelet[2014]: I0212 20:27:35.971867 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b8c2s\" (UniqueName: \"kubernetes.io/projected/3e8ab170-e9a0-46e7-ab6b-86591bd9e7eb-kube-api-access-b8c2s\") pod \"calico-node-fldvp\" (UID: \"3e8ab170-e9a0-46e7-ab6b-86591bd9e7eb\") " pod="calico-system/calico-node-fldvp" Feb 12 20:27:35.971985 kubelet[2014]: I0212 20:27:35.971908 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3e8ab170-e9a0-46e7-ab6b-86591bd9e7eb-tigera-ca-bundle\") pod \"calico-node-fldvp\" (UID: \"3e8ab170-e9a0-46e7-ab6b-86591bd9e7eb\") " pod="calico-system/calico-node-fldvp" Feb 12 20:27:35.971985 kubelet[2014]: I0212 20:27:35.971946 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/3e8ab170-e9a0-46e7-ab6b-86591bd9e7eb-cni-bin-dir\") pod \"calico-node-fldvp\" (UID: \"3e8ab170-e9a0-46e7-ab6b-86591bd9e7eb\") " pod="calico-system/calico-node-fldvp" Feb 12 20:27:35.972167 kubelet[2014]: I0212 20:27:35.971986 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/3e8ab170-e9a0-46e7-ab6b-86591bd9e7eb-xtables-lock\") pod \"calico-node-fldvp\" (UID: \"3e8ab170-e9a0-46e7-ab6b-86591bd9e7eb\") " pod="calico-system/calico-node-fldvp" Feb 12 20:27:35.972167 kubelet[2014]: I0212 20:27:35.972017 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/3e8ab170-e9a0-46e7-ab6b-86591bd9e7eb-policysync\") pod \"calico-node-fldvp\" (UID: \"3e8ab170-e9a0-46e7-ab6b-86591bd9e7eb\") " pod="calico-system/calico-node-fldvp" Feb 12 20:27:35.972167 kubelet[2014]: I0212 20:27:35.972043 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/3e8ab170-e9a0-46e7-ab6b-86591bd9e7eb-cni-net-dir\") pod \"calico-node-fldvp\" (UID: \"3e8ab170-e9a0-46e7-ab6b-86591bd9e7eb\") " pod="calico-system/calico-node-fldvp" Feb 12 20:27:35.972167 kubelet[2014]: I0212 20:27:35.972072 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/c90bbc49-4d99-4bb0-8090-8e6a2da99494-typha-certs\") pod \"calico-typha-589f9478fb-dqs2b\" (UID: \"c90bbc49-4d99-4bb0-8090-8e6a2da99494\") " pod="calico-system/calico-typha-589f9478fb-dqs2b" Feb 12 20:27:35.972167 kubelet[2014]: I0212 20:27:35.972097 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/3e8ab170-e9a0-46e7-ab6b-86591bd9e7eb-lib-modules\") pod \"calico-node-fldvp\" (UID: \"3e8ab170-e9a0-46e7-ab6b-86591bd9e7eb\") " pod="calico-system/calico-node-fldvp" Feb 12 20:27:35.972352 kubelet[2014]: I0212 20:27:35.972120 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/3e8ab170-e9a0-46e7-ab6b-86591bd9e7eb-cni-log-dir\") pod \"calico-node-fldvp\" (UID: \"3e8ab170-e9a0-46e7-ab6b-86591bd9e7eb\") " pod="calico-system/calico-node-fldvp" Feb 12 20:27:35.972352 kubelet[2014]: I0212 20:27:35.972149 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c90bbc49-4d99-4bb0-8090-8e6a2da99494-tigera-ca-bundle\") pod \"calico-typha-589f9478fb-dqs2b\" (UID: \"c90bbc49-4d99-4bb0-8090-8e6a2da99494\") " pod="calico-system/calico-typha-589f9478fb-dqs2b" Feb 12 20:27:35.972352 kubelet[2014]: I0212 20:27:35.972167 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pxn8l\" (UniqueName: \"kubernetes.io/projected/c90bbc49-4d99-4bb0-8090-8e6a2da99494-kube-api-access-pxn8l\") pod \"calico-typha-589f9478fb-dqs2b\" (UID: \"c90bbc49-4d99-4bb0-8090-8e6a2da99494\") " pod="calico-system/calico-typha-589f9478fb-dqs2b" Feb 12 20:27:35.972352 kubelet[2014]: I0212 20:27:35.972184 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/3e8ab170-e9a0-46e7-ab6b-86591bd9e7eb-var-lib-calico\") pod \"calico-node-fldvp\" (UID: \"3e8ab170-e9a0-46e7-ab6b-86591bd9e7eb\") " pod="calico-system/calico-node-fldvp" Feb 12 20:27:36.073093 kubelet[2014]: I0212 20:27:36.073056 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/00b3219e-c931-4bc8-a2f8-45793aef6eec-socket-dir\") pod \"csi-node-driver-nsjjr\" (UID: \"00b3219e-c931-4bc8-a2f8-45793aef6eec\") " pod="calico-system/csi-node-driver-nsjjr" Feb 12 20:27:36.073093 kubelet[2014]: I0212 20:27:36.073099 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-n6x68\" (UniqueName: \"kubernetes.io/projected/00b3219e-c931-4bc8-a2f8-45793aef6eec-kube-api-access-n6x68\") pod \"csi-node-driver-nsjjr\" (UID: \"00b3219e-c931-4bc8-a2f8-45793aef6eec\") " pod="calico-system/csi-node-driver-nsjjr" Feb 12 20:27:36.073320 kubelet[2014]: I0212 20:27:36.073210 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/00b3219e-c931-4bc8-a2f8-45793aef6eec-varrun\") pod \"csi-node-driver-nsjjr\" (UID: \"00b3219e-c931-4bc8-a2f8-45793aef6eec\") " pod="calico-system/csi-node-driver-nsjjr" Feb 12 20:27:36.073320 kubelet[2014]: I0212 20:27:36.073227 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/00b3219e-c931-4bc8-a2f8-45793aef6eec-kubelet-dir\") pod \"csi-node-driver-nsjjr\" (UID: \"00b3219e-c931-4bc8-a2f8-45793aef6eec\") " pod="calico-system/csi-node-driver-nsjjr" Feb 12 20:27:36.073320 kubelet[2014]: I0212 20:27:36.073246 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/00b3219e-c931-4bc8-a2f8-45793aef6eec-registration-dir\") pod \"csi-node-driver-nsjjr\" (UID: \"00b3219e-c931-4bc8-a2f8-45793aef6eec\") " pod="calico-system/csi-node-driver-nsjjr" Feb 12 20:27:36.073896 kubelet[2014]: E0212 20:27:36.073883 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.073896 kubelet[2014]: W0212 20:27:36.073894 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.074011 kubelet[2014]: E0212 20:27:36.073911 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.074052 kubelet[2014]: E0212 20:27:36.074024 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.074052 kubelet[2014]: W0212 20:27:36.074029 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.074052 kubelet[2014]: E0212 20:27:36.074037 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.074154 kubelet[2014]: E0212 20:27:36.074139 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.074154 kubelet[2014]: W0212 20:27:36.074150 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.074226 kubelet[2014]: E0212 20:27:36.074161 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.074545 kubelet[2014]: E0212 20:27:36.074534 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.074634 kubelet[2014]: W0212 20:27:36.074617 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.074693 kubelet[2014]: E0212 20:27:36.074641 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.074791 kubelet[2014]: E0212 20:27:36.074776 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.074791 kubelet[2014]: W0212 20:27:36.074787 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.074859 kubelet[2014]: E0212 20:27:36.074810 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.074987 kubelet[2014]: E0212 20:27:36.074977 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.074987 kubelet[2014]: W0212 20:27:36.074985 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.075061 kubelet[2014]: E0212 20:27:36.074998 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.075171 kubelet[2014]: E0212 20:27:36.075161 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.075171 kubelet[2014]: W0212 20:27:36.075169 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.075238 kubelet[2014]: E0212 20:27:36.075229 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.075348 kubelet[2014]: E0212 20:27:36.075339 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.075348 kubelet[2014]: W0212 20:27:36.075346 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.075452 kubelet[2014]: E0212 20:27:36.075439 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.075572 kubelet[2014]: E0212 20:27:36.075553 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.075572 kubelet[2014]: W0212 20:27:36.075570 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.075643 kubelet[2014]: E0212 20:27:36.075611 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.075723 kubelet[2014]: E0212 20:27:36.075713 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.075723 kubelet[2014]: W0212 20:27:36.075720 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.075789 kubelet[2014]: E0212 20:27:36.075762 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.075903 kubelet[2014]: E0212 20:27:36.075893 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.075903 kubelet[2014]: W0212 20:27:36.075902 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.075983 kubelet[2014]: E0212 20:27:36.075936 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.076061 kubelet[2014]: E0212 20:27:36.076052 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.076061 kubelet[2014]: W0212 20:27:36.076059 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.076128 kubelet[2014]: E0212 20:27:36.076081 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.076173 kubelet[2014]: E0212 20:27:36.076162 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.076173 kubelet[2014]: W0212 20:27:36.076168 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.076238 kubelet[2014]: E0212 20:27:36.076187 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.076296 kubelet[2014]: E0212 20:27:36.076288 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.076296 kubelet[2014]: W0212 20:27:36.076294 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.076365 kubelet[2014]: E0212 20:27:36.076313 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.076421 kubelet[2014]: E0212 20:27:36.076413 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.076421 kubelet[2014]: W0212 20:27:36.076419 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.076486 kubelet[2014]: E0212 20:27:36.076438 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.076530 kubelet[2014]: E0212 20:27:36.076519 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.076530 kubelet[2014]: W0212 20:27:36.076526 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.076610 kubelet[2014]: E0212 20:27:36.076537 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.076715 kubelet[2014]: E0212 20:27:36.076706 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.076715 kubelet[2014]: W0212 20:27:36.076713 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.076781 kubelet[2014]: E0212 20:27:36.076730 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.076910 kubelet[2014]: E0212 20:27:36.076900 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.076910 kubelet[2014]: W0212 20:27:36.076908 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.077004 kubelet[2014]: E0212 20:27:36.076919 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.077069 kubelet[2014]: E0212 20:27:36.077060 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.077069 kubelet[2014]: W0212 20:27:36.077067 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.077130 kubelet[2014]: E0212 20:27:36.077122 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.080066 kubelet[2014]: E0212 20:27:36.080042 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.080066 kubelet[2014]: W0212 20:27:36.080063 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.080265 kubelet[2014]: E0212 20:27:36.080247 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.080265 kubelet[2014]: W0212 20:27:36.080261 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.080452 kubelet[2014]: E0212 20:27:36.080438 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.080570 kubelet[2014]: E0212 20:27:36.080536 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.084097 kubelet[2014]: E0212 20:27:36.084031 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.084097 kubelet[2014]: W0212 20:27:36.084091 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.084240 kubelet[2014]: E0212 20:27:36.084141 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.089045 kubelet[2014]: E0212 20:27:36.089021 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.089045 kubelet[2014]: W0212 20:27:36.089035 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.089188 kubelet[2014]: E0212 20:27:36.089099 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.089383 kubelet[2014]: E0212 20:27:36.089365 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.089383 kubelet[2014]: W0212 20:27:36.089375 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.089475 kubelet[2014]: E0212 20:27:36.089414 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.089597 kubelet[2014]: E0212 20:27:36.089580 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.089597 kubelet[2014]: W0212 20:27:36.089589 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.089683 kubelet[2014]: E0212 20:27:36.089654 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.093860 kubelet[2014]: E0212 20:27:36.092000 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.093860 kubelet[2014]: W0212 20:27:36.092011 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.093860 kubelet[2014]: E0212 20:27:36.092091 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.093860 kubelet[2014]: E0212 20:27:36.093833 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.093860 kubelet[2014]: W0212 20:27:36.093842 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.094112 kubelet[2014]: E0212 20:27:36.093899 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.094491 kubelet[2014]: E0212 20:27:36.094406 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.094491 kubelet[2014]: W0212 20:27:36.094419 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.094606 kubelet[2014]: E0212 20:27:36.094508 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.094759 kubelet[2014]: E0212 20:27:36.094748 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.094848 kubelet[2014]: W0212 20:27:36.094832 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.095081 kubelet[2014]: E0212 20:27:36.095069 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.095296 kubelet[2014]: E0212 20:27:36.095284 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.095399 kubelet[2014]: W0212 20:27:36.095383 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.095555 kubelet[2014]: E0212 20:27:36.095542 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.095713 kubelet[2014]: E0212 20:27:36.095700 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.095825 kubelet[2014]: W0212 20:27:36.095811 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.095984 kubelet[2014]: E0212 20:27:36.095973 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.096104 kubelet[2014]: E0212 20:27:36.096092 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.096208 kubelet[2014]: W0212 20:27:36.096194 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.096296 kubelet[2014]: E0212 20:27:36.096284 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.099394 kubelet[2014]: E0212 20:27:36.099379 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.099496 kubelet[2014]: W0212 20:27:36.099477 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.099597 kubelet[2014]: E0212 20:27:36.099583 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.099842 kubelet[2014]: E0212 20:27:36.099829 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.099842 kubelet[2014]: W0212 20:27:36.099840 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.099928 kubelet[2014]: E0212 20:27:36.099854 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.100091 kubelet[2014]: E0212 20:27:36.100080 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.100159 kubelet[2014]: W0212 20:27:36.100143 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.100234 kubelet[2014]: E0212 20:27:36.100222 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.100408 kubelet[2014]: E0212 20:27:36.100397 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.100491 kubelet[2014]: W0212 20:27:36.100476 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.100571 kubelet[2014]: E0212 20:27:36.100549 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.107037 kubelet[2014]: E0212 20:27:36.107020 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.107159 kubelet[2014]: W0212 20:27:36.107142 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.107243 kubelet[2014]: E0212 20:27:36.107230 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.122251 kubelet[2014]: E0212 20:27:36.122219 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:36.123020 env[1123]: time="2024-02-12T20:27:36.122684702Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-fldvp,Uid:3e8ab170-e9a0-46e7-ab6b-86591bd9e7eb,Namespace:calico-system,Attempt:0,}" Feb 12 20:27:36.138395 env[1123]: time="2024-02-12T20:27:36.138315632Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:27:36.138395 env[1123]: time="2024-02-12T20:27:36.138389853Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:27:36.138558 env[1123]: time="2024-02-12T20:27:36.138420149Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:27:36.139132 env[1123]: time="2024-02-12T20:27:36.139064603Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c3b0659c0a7a9db0f0a9749b638550017996bd376b056c26f46fa94dbd50aef2 pid=2445 runtime=io.containerd.runc.v2 Feb 12 20:27:36.150487 systemd[1]: Started cri-containerd-c3b0659c0a7a9db0f0a9749b638550017996bd376b056c26f46fa94dbd50aef2.scope. Feb 12 20:27:36.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.160000 audit: BPF prog-id=127 op=LOAD Feb 12 20:27:36.160000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.160000 audit[2454]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2445 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:36.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333623036353963306137613964623066306139373439623633383535 Feb 12 20:27:36.160000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.160000 audit[2454]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2445 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:36.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333623036353963306137613964623066306139373439623633383535 Feb 12 20:27:36.160000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.160000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.160000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.160000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.160000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.160000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.160000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.160000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.160000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.160000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.160000 audit: BPF prog-id=128 op=LOAD Feb 12 20:27:36.160000 audit[2454]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002190e0 items=0 ppid=2445 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:36.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333623036353963306137613964623066306139373439623633383535 Feb 12 20:27:36.160000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.160000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.160000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.160000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.160000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.160000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.160000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.160000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.160000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.160000 audit: BPF prog-id=129 op=LOAD Feb 12 20:27:36.160000 audit[2454]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000219128 items=0 ppid=2445 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:36.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333623036353963306137613964623066306139373439623633383535 Feb 12 20:27:36.160000 audit: BPF prog-id=129 op=UNLOAD Feb 12 20:27:36.160000 audit: BPF prog-id=128 op=UNLOAD Feb 12 20:27:36.161000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.161000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.161000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.161000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.161000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.161000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.161000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.161000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.161000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.161000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.161000 audit: BPF prog-id=130 op=LOAD Feb 12 20:27:36.161000 audit[2454]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000219538 items=0 ppid=2445 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:36.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333623036353963306137613964623066306139373439623633383535 Feb 12 20:27:36.174411 kubelet[2014]: E0212 20:27:36.174315 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.174411 kubelet[2014]: W0212 20:27:36.174336 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.174411 kubelet[2014]: E0212 20:27:36.174356 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.180165 kubelet[2014]: E0212 20:27:36.180024 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.180165 kubelet[2014]: W0212 20:27:36.180036 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.180165 kubelet[2014]: E0212 20:27:36.180050 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.180521 kubelet[2014]: E0212 20:27:36.180395 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.180521 kubelet[2014]: W0212 20:27:36.180405 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.180521 kubelet[2014]: E0212 20:27:36.180475 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.180760 kubelet[2014]: E0212 20:27:36.180679 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.180760 kubelet[2014]: W0212 20:27:36.180689 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.180831 kubelet[2014]: E0212 20:27:36.180750 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.181007 kubelet[2014]: E0212 20:27:36.180896 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.181007 kubelet[2014]: W0212 20:27:36.180905 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.181007 kubelet[2014]: E0212 20:27:36.180923 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.181231 kubelet[2014]: E0212 20:27:36.181142 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.181231 kubelet[2014]: W0212 20:27:36.181151 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.181231 kubelet[2014]: E0212 20:27:36.181167 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.181498 kubelet[2014]: E0212 20:27:36.181369 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.181498 kubelet[2014]: W0212 20:27:36.181379 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.181498 kubelet[2014]: E0212 20:27:36.181389 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.181739 kubelet[2014]: E0212 20:27:36.181640 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.181739 kubelet[2014]: W0212 20:27:36.181648 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.181739 kubelet[2014]: E0212 20:27:36.181664 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.181982 kubelet[2014]: E0212 20:27:36.181865 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.181982 kubelet[2014]: W0212 20:27:36.181873 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.181982 kubelet[2014]: E0212 20:27:36.181889 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.182323 kubelet[2014]: E0212 20:27:36.182239 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.182323 kubelet[2014]: W0212 20:27:36.182247 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.182323 kubelet[2014]: E0212 20:27:36.182282 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.182503 kubelet[2014]: E0212 20:27:36.182479 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.182503 kubelet[2014]: W0212 20:27:36.182499 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.182587 kubelet[2014]: E0212 20:27:36.182558 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.182755 kubelet[2014]: E0212 20:27:36.182735 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.182755 kubelet[2014]: W0212 20:27:36.182750 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.182825 kubelet[2014]: E0212 20:27:36.182783 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.182973 kubelet[2014]: E0212 20:27:36.182942 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.183023 kubelet[2014]: W0212 20:27:36.182990 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.183023 kubelet[2014]: E0212 20:27:36.183011 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.183274 kubelet[2014]: E0212 20:27:36.183251 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.183274 kubelet[2014]: W0212 20:27:36.183270 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.183351 kubelet[2014]: E0212 20:27:36.183287 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.183587 kubelet[2014]: E0212 20:27:36.183537 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.183587 kubelet[2014]: W0212 20:27:36.183584 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.183656 kubelet[2014]: E0212 20:27:36.183598 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.183754 kubelet[2014]: E0212 20:27:36.183735 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.183754 kubelet[2014]: W0212 20:27:36.183747 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.183754 kubelet[2014]: E0212 20:27:36.183755 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.184019 kubelet[2014]: E0212 20:27:36.183998 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.184019 kubelet[2014]: W0212 20:27:36.184011 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.184103 kubelet[2014]: E0212 20:27:36.184025 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.184255 kubelet[2014]: E0212 20:27:36.184232 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.184255 kubelet[2014]: W0212 20:27:36.184244 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.184255 kubelet[2014]: E0212 20:27:36.184257 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.184582 kubelet[2014]: E0212 20:27:36.184557 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.184582 kubelet[2014]: W0212 20:27:36.184577 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.184653 kubelet[2014]: E0212 20:27:36.184624 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.185337 kubelet[2014]: E0212 20:27:36.185313 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.185337 kubelet[2014]: W0212 20:27:36.185327 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.185419 kubelet[2014]: E0212 20:27:36.185368 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.186399 kubelet[2014]: E0212 20:27:36.186379 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.186399 kubelet[2014]: W0212 20:27:36.186392 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.186471 kubelet[2014]: E0212 20:27:36.186439 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.186730 kubelet[2014]: E0212 20:27:36.186708 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.186780 kubelet[2014]: W0212 20:27:36.186723 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.186856 kubelet[2014]: E0212 20:27:36.186840 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.187048 kubelet[2014]: E0212 20:27:36.187031 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.187103 kubelet[2014]: W0212 20:27:36.187069 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.187103 kubelet[2014]: E0212 20:27:36.187088 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.187350 kubelet[2014]: E0212 20:27:36.187327 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.187350 kubelet[2014]: W0212 20:27:36.187341 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.187350 kubelet[2014]: E0212 20:27:36.187353 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.187645 kubelet[2014]: E0212 20:27:36.187628 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.187645 kubelet[2014]: W0212 20:27:36.187645 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.187710 kubelet[2014]: E0212 20:27:36.187666 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.191838 env[1123]: time="2024-02-12T20:27:36.191792089Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-fldvp,Uid:3e8ab170-e9a0-46e7-ab6b-86591bd9e7eb,Namespace:calico-system,Attempt:0,} returns sandbox id \"c3b0659c0a7a9db0f0a9749b638550017996bd376b056c26f46fa94dbd50aef2\"" Feb 12 20:27:36.192512 kubelet[2014]: E0212 20:27:36.192487 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:36.195867 env[1123]: time="2024-02-12T20:27:36.194259839Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 20:27:36.197545 kubelet[2014]: E0212 20:27:36.197520 2014 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:36.197545 kubelet[2014]: W0212 20:27:36.197539 2014 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:36.197630 kubelet[2014]: E0212 20:27:36.197555 2014 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:36.380131 kubelet[2014]: E0212 20:27:36.380092 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:36.380692 env[1123]: time="2024-02-12T20:27:36.380631247Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-589f9478fb-dqs2b,Uid:c90bbc49-4d99-4bb0-8090-8e6a2da99494,Namespace:calico-system,Attempt:0,}" Feb 12 20:27:36.435208 env[1123]: time="2024-02-12T20:27:36.435081279Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:27:36.435417 env[1123]: time="2024-02-12T20:27:36.435128157Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:27:36.435567 env[1123]: time="2024-02-12T20:27:36.435501831Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:27:36.436845 env[1123]: time="2024-02-12T20:27:36.436809556Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9d2d1ca01894d58253452dba64af7c86850c9b9b0836c4d36fb1b5979144d118 pid=2512 runtime=io.containerd.runc.v2 Feb 12 20:27:36.450028 systemd[1]: Started cri-containerd-9d2d1ca01894d58253452dba64af7c86850c9b9b0836c4d36fb1b5979144d118.scope. Feb 12 20:27:36.472943 kernel: kauditd_printk_skb: 426 callbacks suppressed Feb 12 20:27:36.473090 kernel: audit: type=1400 audit(1707769656.461:1095): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.473141 kernel: audit: type=1400 audit(1707769656.461:1096): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.473167 kernel: audit: type=1400 audit(1707769656.461:1097): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.473188 kernel: audit: type=1400 audit(1707769656.461:1098): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.479564 kernel: audit: type=1400 audit(1707769656.461:1099): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.479612 kernel: audit: type=1400 audit(1707769656.461:1100): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.482983 kernel: audit: type=1400 audit(1707769656.461:1101): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.485986 kernel: audit: type=1400 audit(1707769656.461:1102): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.488663 kernel: audit: type=1400 audit(1707769656.461:1103): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.488715 kernel: audit: type=1400 audit(1707769656.464:1104): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.464000 audit: BPF prog-id=131 op=LOAD Feb 12 20:27:36.464000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.464000 audit[2523]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2512 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:36.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964326431636130313839346435383235333435326462613634616637 Feb 12 20:27:36.464000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.464000 audit[2523]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2512 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:36.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964326431636130313839346435383235333435326462613634616637 Feb 12 20:27:36.464000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.464000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.464000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.464000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.464000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.464000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.464000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.464000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.464000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.464000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.464000 audit: BPF prog-id=132 op=LOAD Feb 12 20:27:36.464000 audit[2523]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00025da20 items=0 ppid=2512 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:36.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964326431636130313839346435383235333435326462613634616637 Feb 12 20:27:36.469000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.469000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.469000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.469000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.469000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.469000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.469000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.469000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.469000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.469000 audit: BPF prog-id=133 op=LOAD Feb 12 20:27:36.469000 audit[2523]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00025da68 items=0 ppid=2512 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:36.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964326431636130313839346435383235333435326462613634616637 Feb 12 20:27:36.472000 audit: BPF prog-id=133 op=UNLOAD Feb 12 20:27:36.472000 audit: BPF prog-id=132 op=UNLOAD Feb 12 20:27:36.472000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.472000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.472000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.472000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.472000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.472000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.472000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.472000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.472000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.472000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:36.472000 audit: BPF prog-id=134 op=LOAD Feb 12 20:27:36.472000 audit[2523]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00025de78 items=0 ppid=2512 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:36.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964326431636130313839346435383235333435326462613634616637 Feb 12 20:27:36.508718 env[1123]: time="2024-02-12T20:27:36.508672796Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-589f9478fb-dqs2b,Uid:c90bbc49-4d99-4bb0-8090-8e6a2da99494,Namespace:calico-system,Attempt:0,} returns sandbox id \"9d2d1ca01894d58253452dba64af7c86850c9b9b0836c4d36fb1b5979144d118\"" Feb 12 20:27:36.509480 kubelet[2014]: E0212 20:27:36.509462 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:36.670000 audit[2546]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2546 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:27:36.670000 audit[2546]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffd166889a0 a2=0 a3=7ffd1668898c items=0 ppid=2173 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:36.670000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:27:36.670000 audit[2546]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2546 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:27:36.670000 audit[2546]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffd166889a0 a2=0 a3=31030 items=0 ppid=2173 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:36.670000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:27:37.266974 kubelet[2014]: E0212 20:27:37.266920 2014 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nsjjr" podUID=00b3219e-c931-4bc8-a2f8-45793aef6eec Feb 12 20:27:39.184667 env[1123]: time="2024-02-12T20:27:39.184617462Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:39.186710 env[1123]: time="2024-02-12T20:27:39.186673473Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:39.188744 env[1123]: time="2024-02-12T20:27:39.188710307Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:39.190527 env[1123]: time="2024-02-12T20:27:39.190485198Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:39.191222 env[1123]: time="2024-02-12T20:27:39.191193642Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 12 20:27:39.191815 env[1123]: time="2024-02-12T20:27:39.191796938Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 12 20:27:39.192828 env[1123]: time="2024-02-12T20:27:39.192797491Z" level=info msg="CreateContainer within sandbox \"c3b0659c0a7a9db0f0a9749b638550017996bd376b056c26f46fa94dbd50aef2\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 20:27:39.205804 env[1123]: time="2024-02-12T20:27:39.205757562Z" level=info msg="CreateContainer within sandbox \"c3b0659c0a7a9db0f0a9749b638550017996bd376b056c26f46fa94dbd50aef2\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"38fb7cf2e07d29afc1e255f5ab966589a7c07ac5b148ecb8bc35cefeb371e7f1\"" Feb 12 20:27:39.206267 env[1123]: time="2024-02-12T20:27:39.206224991Z" level=info msg="StartContainer for \"38fb7cf2e07d29afc1e255f5ab966589a7c07ac5b148ecb8bc35cefeb371e7f1\"" Feb 12 20:27:39.220463 systemd[1]: Started cri-containerd-38fb7cf2e07d29afc1e255f5ab966589a7c07ac5b148ecb8bc35cefeb371e7f1.scope. Feb 12 20:27:39.233000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:39.233000 audit[2555]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fef562d69f8 items=0 ppid=2445 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:39.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338666237636632653037643239616663316532353566356162393636 Feb 12 20:27:39.233000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:39.233000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:39.233000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:39.233000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:39.233000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:39.233000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:39.233000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:39.233000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:39.233000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:39.233000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:39.233000 audit: BPF prog-id=135 op=LOAD Feb 12 20:27:39.233000 audit[2555]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0001fbba8 items=0 ppid=2445 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:39.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338666237636632653037643239616663316532353566356162393636 Feb 12 20:27:39.233000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:39.233000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:39.233000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:39.233000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:39.233000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:39.233000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:39.233000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:39.233000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:39.233000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:39.233000 audit: BPF prog-id=136 op=LOAD Feb 12 20:27:39.233000 audit[2555]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0001fbbf8 items=0 ppid=2445 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:39.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338666237636632653037643239616663316532353566356162393636 Feb 12 20:27:39.233000 audit: BPF prog-id=136 op=UNLOAD Feb 12 20:27:39.233000 audit: BPF prog-id=135 op=UNLOAD Feb 12 20:27:39.233000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:39.233000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:39.233000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:39.233000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:39.233000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:39.233000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:39.233000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:39.233000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:39.233000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:39.233000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:39.233000 audit: BPF prog-id=137 op=LOAD Feb 12 20:27:39.233000 audit[2555]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0001fbc88 items=0 ppid=2445 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:39.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338666237636632653037643239616663316532353566356162393636 Feb 12 20:27:39.255873 systemd[1]: cri-containerd-38fb7cf2e07d29afc1e255f5ab966589a7c07ac5b148ecb8bc35cefeb371e7f1.scope: Deactivated successfully. Feb 12 20:27:39.259000 audit: BPF prog-id=137 op=UNLOAD Feb 12 20:27:39.265668 kubelet[2014]: E0212 20:27:39.265642 2014 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nsjjr" podUID=00b3219e-c931-4bc8-a2f8-45793aef6eec Feb 12 20:27:39.323436 env[1123]: time="2024-02-12T20:27:39.323366678Z" level=info msg="StartContainer for \"38fb7cf2e07d29afc1e255f5ab966589a7c07ac5b148ecb8bc35cefeb371e7f1\" returns successfully" Feb 12 20:27:39.337612 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-38fb7cf2e07d29afc1e255f5ab966589a7c07ac5b148ecb8bc35cefeb371e7f1-rootfs.mount: Deactivated successfully. Feb 12 20:27:39.848866 env[1123]: time="2024-02-12T20:27:39.848781853Z" level=info msg="shim disconnected" id=38fb7cf2e07d29afc1e255f5ab966589a7c07ac5b148ecb8bc35cefeb371e7f1 Feb 12 20:27:39.848866 env[1123]: time="2024-02-12T20:27:39.848835815Z" level=warning msg="cleaning up after shim disconnected" id=38fb7cf2e07d29afc1e255f5ab966589a7c07ac5b148ecb8bc35cefeb371e7f1 namespace=k8s.io Feb 12 20:27:39.848866 env[1123]: time="2024-02-12T20:27:39.848844081Z" level=info msg="cleaning up dead shim" Feb 12 20:27:39.864149 env[1123]: time="2024-02-12T20:27:39.864083721Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:27:39Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2593 runtime=io.containerd.runc.v2\n" Feb 12 20:27:40.010182 systemd[1]: Started sshd@7-10.0.0.105:22-10.0.0.1:39850.service. Feb 12 20:27:40.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.105:22-10.0.0.1:39850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:40.046000 audit[2608]: USER_ACCT pid=2608 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:40.047284 sshd[2608]: Accepted publickey for core from 10.0.0.1 port 39850 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:27:40.046000 audit[2608]: CRED_ACQ pid=2608 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:40.046000 audit[2608]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6ebf4b40 a2=3 a3=0 items=0 ppid=1 pid=2608 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:40.046000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:27:40.048148 sshd[2608]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:27:40.051435 systemd-logind[1111]: New session 8 of user core. Feb 12 20:27:40.052443 systemd[1]: Started session-8.scope. Feb 12 20:27:40.055000 audit[2608]: USER_START pid=2608 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:40.056000 audit[2610]: CRED_ACQ pid=2610 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:40.174381 sshd[2608]: pam_unix(sshd:session): session closed for user core Feb 12 20:27:40.175000 audit[2608]: USER_END pid=2608 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:40.175000 audit[2608]: CRED_DISP pid=2608 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:40.177805 systemd[1]: sshd@7-10.0.0.105:22-10.0.0.1:39850.service: Deactivated successfully. Feb 12 20:27:40.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.105:22-10.0.0.1:39850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:40.178658 systemd[1]: session-8.scope: Deactivated successfully. Feb 12 20:27:40.179321 systemd-logind[1111]: Session 8 logged out. Waiting for processes to exit. Feb 12 20:27:40.180121 systemd-logind[1111]: Removed session 8. Feb 12 20:27:40.328974 kubelet[2014]: E0212 20:27:40.328923 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:40.874031 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1412800567.mount: Deactivated successfully. Feb 12 20:27:41.265902 kubelet[2014]: E0212 20:27:41.265734 2014 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nsjjr" podUID=00b3219e-c931-4bc8-a2f8-45793aef6eec Feb 12 20:27:43.224130 env[1123]: time="2024-02-12T20:27:43.224062270Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:43.226681 env[1123]: time="2024-02-12T20:27:43.226623858Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:43.228539 env[1123]: time="2024-02-12T20:27:43.228496581Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:43.230221 env[1123]: time="2024-02-12T20:27:43.230203051Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:43.230880 env[1123]: time="2024-02-12T20:27:43.230856399Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 12 20:27:43.232311 env[1123]: time="2024-02-12T20:27:43.231408999Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 20:27:43.241212 env[1123]: time="2024-02-12T20:27:43.241173317Z" level=info msg="CreateContainer within sandbox \"9d2d1ca01894d58253452dba64af7c86850c9b9b0836c4d36fb1b5979144d118\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 12 20:27:43.251705 env[1123]: time="2024-02-12T20:27:43.251648982Z" level=info msg="CreateContainer within sandbox \"9d2d1ca01894d58253452dba64af7c86850c9b9b0836c4d36fb1b5979144d118\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"628fe42f338dcd8ebeab599746139005d1617b507f10807dbc90c66ea4b0217f\"" Feb 12 20:27:43.252240 env[1123]: time="2024-02-12T20:27:43.252188247Z" level=info msg="StartContainer for \"628fe42f338dcd8ebeab599746139005d1617b507f10807dbc90c66ea4b0217f\"" Feb 12 20:27:43.265664 kubelet[2014]: E0212 20:27:43.265516 2014 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nsjjr" podUID=00b3219e-c931-4bc8-a2f8-45793aef6eec Feb 12 20:27:43.269060 systemd[1]: Started cri-containerd-628fe42f338dcd8ebeab599746139005d1617b507f10807dbc90c66ea4b0217f.scope. Feb 12 20:27:43.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.280536 kernel: kauditd_printk_skb: 108 callbacks suppressed Feb 12 20:27:43.280611 kernel: audit: type=1400 audit(1707769663.278:1131): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.285135 kernel: audit: type=1400 audit(1707769663.278:1132): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.285193 kernel: audit: type=1400 audit(1707769663.278:1133): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.289782 kernel: audit: type=1400 audit(1707769663.278:1134): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.289837 kernel: audit: type=1400 audit(1707769663.278:1135): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.294768 kernel: audit: type=1400 audit(1707769663.278:1136): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.297447 kernel: audit: type=1400 audit(1707769663.278:1137): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.299978 kernel: audit: type=1400 audit(1707769663.278:1138): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.302026 kernel: audit: type=1400 audit(1707769663.278:1139): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.304257 kernel: audit: type=1400 audit(1707769663.278:1140): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.278000 audit: BPF prog-id=138 op=LOAD Feb 12 20:27:43.282000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.282000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2512 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:43.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632386665343266333338646364386562656162353939373436313339 Feb 12 20:27:43.283000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.283000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2512 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:43.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632386665343266333338646364386562656162353939373436313339 Feb 12 20:27:43.283000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.283000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.283000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.283000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.283000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.283000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.283000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.283000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.283000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.283000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.283000 audit: BPF prog-id=139 op=LOAD Feb 12 20:27:43.283000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003151c0 items=0 ppid=2512 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:43.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632386665343266333338646364386562656162353939373436313339 Feb 12 20:27:43.284000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.284000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.284000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.284000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.284000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.284000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.284000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.284000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.284000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.284000 audit: BPF prog-id=140 op=LOAD Feb 12 20:27:43.284000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000315208 items=0 ppid=2512 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:43.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632386665343266333338646364386562656162353939373436313339 Feb 12 20:27:43.286000 audit: BPF prog-id=140 op=UNLOAD Feb 12 20:27:43.286000 audit: BPF prog-id=139 op=UNLOAD Feb 12 20:27:43.286000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.286000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.286000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.286000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.286000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.286000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.286000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.286000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.286000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.286000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:43.286000 audit: BPF prog-id=141 op=LOAD Feb 12 20:27:43.286000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000315618 items=0 ppid=2512 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:43.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632386665343266333338646364386562656162353939373436313339 Feb 12 20:27:43.324593 env[1123]: time="2024-02-12T20:27:43.324526179Z" level=info msg="StartContainer for \"628fe42f338dcd8ebeab599746139005d1617b507f10807dbc90c66ea4b0217f\" returns successfully" Feb 12 20:27:43.339971 kubelet[2014]: E0212 20:27:43.338491 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:43.350650 kubelet[2014]: I0212 20:27:43.350435 2014 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-589f9478fb-dqs2b" podStartSLOduration=1.629253582 podCreationTimestamp="2024-02-12 20:27:35 +0000 UTC" firstStartedPulling="2024-02-12 20:27:36.510057846 +0000 UTC m=+19.323978477" lastFinishedPulling="2024-02-12 20:27:43.231184457 +0000 UTC m=+26.045105088" observedRunningTime="2024-02-12 20:27:43.350005628 +0000 UTC m=+26.163926259" watchObservedRunningTime="2024-02-12 20:27:43.350380193 +0000 UTC m=+26.164300824" Feb 12 20:27:44.338530 kubelet[2014]: I0212 20:27:44.338495 2014 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 20:27:44.339036 kubelet[2014]: E0212 20:27:44.339023 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:44.648003 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount93162455.mount: Deactivated successfully. Feb 12 20:27:45.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.105:22-10.0.0.1:44882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.179237 systemd[1]: Started sshd@8-10.0.0.105:22-10.0.0.1:44882.service. Feb 12 20:27:45.232000 audit[2671]: USER_ACCT pid=2671 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:45.233925 sshd[2671]: Accepted publickey for core from 10.0.0.1 port 44882 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:27:45.234000 audit[2671]: CRED_ACQ pid=2671 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:45.234000 audit[2671]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb76489a0 a2=3 a3=0 items=0 ppid=1 pid=2671 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:45.234000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:27:45.236058 sshd[2671]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:27:45.244796 systemd[1]: Started session-9.scope. Feb 12 20:27:45.246359 systemd-logind[1111]: New session 9 of user core. Feb 12 20:27:45.251000 audit[2671]: USER_START pid=2671 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:45.252000 audit[2673]: CRED_ACQ pid=2673 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:45.267156 kubelet[2014]: E0212 20:27:45.266754 2014 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nsjjr" podUID=00b3219e-c931-4bc8-a2f8-45793aef6eec Feb 12 20:27:45.411175 sshd[2671]: pam_unix(sshd:session): session closed for user core Feb 12 20:27:45.411000 audit[2671]: USER_END pid=2671 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:45.411000 audit[2671]: CRED_DISP pid=2671 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:45.413617 systemd[1]: sshd@8-10.0.0.105:22-10.0.0.1:44882.service: Deactivated successfully. Feb 12 20:27:45.414319 systemd[1]: session-9.scope: Deactivated successfully. Feb 12 20:27:45.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.105:22-10.0.0.1:44882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.415060 systemd-logind[1111]: Session 9 logged out. Waiting for processes to exit. Feb 12 20:27:45.415700 systemd-logind[1111]: Removed session 9. Feb 12 20:27:47.265248 kubelet[2014]: E0212 20:27:47.265213 2014 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nsjjr" podUID=00b3219e-c931-4bc8-a2f8-45793aef6eec Feb 12 20:27:48.474024 env[1123]: time="2024-02-12T20:27:48.473942311Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:48.475891 env[1123]: time="2024-02-12T20:27:48.475841471Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:48.477753 env[1123]: time="2024-02-12T20:27:48.477728278Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:48.479241 env[1123]: time="2024-02-12T20:27:48.479218759Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:48.479870 env[1123]: time="2024-02-12T20:27:48.479843103Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 12 20:27:48.481377 env[1123]: time="2024-02-12T20:27:48.481355405Z" level=info msg="CreateContainer within sandbox \"c3b0659c0a7a9db0f0a9749b638550017996bd376b056c26f46fa94dbd50aef2\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 20:27:48.494161 env[1123]: time="2024-02-12T20:27:48.494114908Z" level=info msg="CreateContainer within sandbox \"c3b0659c0a7a9db0f0a9749b638550017996bd376b056c26f46fa94dbd50aef2\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"85b13e6d0f80fc8662a9a920f1199a76e19bdbe6d2ad817f351461c864055e47\"" Feb 12 20:27:48.494581 env[1123]: time="2024-02-12T20:27:48.494557229Z" level=info msg="StartContainer for \"85b13e6d0f80fc8662a9a920f1199a76e19bdbe6d2ad817f351461c864055e47\"" Feb 12 20:27:48.513278 systemd[1]: Started cri-containerd-85b13e6d0f80fc8662a9a920f1199a76e19bdbe6d2ad817f351461c864055e47.scope. Feb 12 20:27:48.526000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.528228 kernel: kauditd_printk_skb: 58 callbacks suppressed Feb 12 20:27:48.528299 kernel: audit: type=1400 audit(1707769668.526:1158): avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.526000 audit[2694]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f6736593ef8 items=0 ppid=2445 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:48.534030 kernel: audit: type=1300 audit(1707769668.526:1158): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f6736593ef8 items=0 ppid=2445 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:48.534095 kernel: audit: type=1327 audit(1707769668.526:1158): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835623133653664306638306663383636326139613932306631313939 Feb 12 20:27:48.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835623133653664306638306663383636326139613932306631313939 Feb 12 20:27:48.537886 kernel: audit: type=1400 audit(1707769668.526:1159): avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.526000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.526000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.541983 kernel: audit: type=1400 audit(1707769668.526:1159): avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.542025 kernel: audit: type=1400 audit(1707769668.526:1159): avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.526000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.526000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.548091 kernel: audit: type=1400 audit(1707769668.526:1159): avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.548133 kernel: audit: type=1400 audit(1707769668.526:1159): avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.526000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.526000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.550519 kernel: audit: type=1400 audit(1707769668.526:1159): avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.526000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.526000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.526000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.526000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.526000 audit: BPF prog-id=142 op=LOAD Feb 12 20:27:48.526000 audit[2694]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001fe848 items=0 ppid=2445 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:48.556023 kernel: audit: type=1400 audit(1707769668.526:1159): avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835623133653664306638306663383636326139613932306631313939 Feb 12 20:27:48.533000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.533000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.533000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.533000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.533000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.533000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.533000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.533000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.533000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.533000 audit: BPF prog-id=143 op=LOAD Feb 12 20:27:48.533000 audit[2694]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001fe898 items=0 ppid=2445 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:48.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835623133653664306638306663383636326139613932306631313939 Feb 12 20:27:48.536000 audit: BPF prog-id=143 op=UNLOAD Feb 12 20:27:48.536000 audit: BPF prog-id=142 op=UNLOAD Feb 12 20:27:48.536000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.536000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.536000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.536000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.536000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.536000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.536000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.536000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.536000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.536000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:48.536000 audit: BPF prog-id=144 op=LOAD Feb 12 20:27:48.536000 audit[2694]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001fe928 items=0 ppid=2445 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:48.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835623133653664306638306663383636326139613932306631313939 Feb 12 20:27:48.630457 env[1123]: time="2024-02-12T20:27:48.630403745Z" level=info msg="StartContainer for \"85b13e6d0f80fc8662a9a920f1199a76e19bdbe6d2ad817f351461c864055e47\" returns successfully" Feb 12 20:27:49.265558 kubelet[2014]: E0212 20:27:49.265518 2014 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nsjjr" podUID=00b3219e-c931-4bc8-a2f8-45793aef6eec Feb 12 20:27:49.348412 kubelet[2014]: E0212 20:27:49.348380 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:49.490329 systemd[1]: run-containerd-runc-k8s.io-85b13e6d0f80fc8662a9a920f1199a76e19bdbe6d2ad817f351461c864055e47-runc.iSQr0w.mount: Deactivated successfully. Feb 12 20:27:49.859354 systemd[1]: cri-containerd-85b13e6d0f80fc8662a9a920f1199a76e19bdbe6d2ad817f351461c864055e47.scope: Deactivated successfully. Feb 12 20:27:49.863000 audit: BPF prog-id=144 op=UNLOAD Feb 12 20:27:49.876503 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-85b13e6d0f80fc8662a9a920f1199a76e19bdbe6d2ad817f351461c864055e47-rootfs.mount: Deactivated successfully. Feb 12 20:27:49.938569 kubelet[2014]: I0212 20:27:49.938529 2014 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 20:27:50.239483 kubelet[2014]: I0212 20:27:50.239346 2014 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:27:50.240385 kubelet[2014]: I0212 20:27:50.240357 2014 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:27:50.240479 kubelet[2014]: I0212 20:27:50.240451 2014 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:27:50.245949 systemd[1]: Created slice kubepods-burstable-podfe848169_925a_4abf_a1a7_19c637d4a173.slice. Feb 12 20:27:50.249231 systemd[1]: Created slice kubepods-burstable-pod206d9f1e_afed_41ff_b30c_add0fe51a3ee.slice. Feb 12 20:27:50.253039 systemd[1]: Created slice kubepods-besteffort-podf20680ef_2022_4c0e_a8a5_9242b50af86d.slice. Feb 12 20:27:50.280295 env[1123]: time="2024-02-12T20:27:50.280230291Z" level=info msg="shim disconnected" id=85b13e6d0f80fc8662a9a920f1199a76e19bdbe6d2ad817f351461c864055e47 Feb 12 20:27:50.280295 env[1123]: time="2024-02-12T20:27:50.280289863Z" level=warning msg="cleaning up after shim disconnected" id=85b13e6d0f80fc8662a9a920f1199a76e19bdbe6d2ad817f351461c864055e47 namespace=k8s.io Feb 12 20:27:50.280295 env[1123]: time="2024-02-12T20:27:50.280299581Z" level=info msg="cleaning up dead shim" Feb 12 20:27:50.285604 kubelet[2014]: I0212 20:27:50.285580 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tgfqr\" (UniqueName: \"kubernetes.io/projected/f20680ef-2022-4c0e-a8a5-9242b50af86d-kube-api-access-tgfqr\") pod \"calico-kube-controllers-6485779877-6hgzc\" (UID: \"f20680ef-2022-4c0e-a8a5-9242b50af86d\") " pod="calico-system/calico-kube-controllers-6485779877-6hgzc" Feb 12 20:27:50.285861 kubelet[2014]: I0212 20:27:50.285621 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f20680ef-2022-4c0e-a8a5-9242b50af86d-tigera-ca-bundle\") pod \"calico-kube-controllers-6485779877-6hgzc\" (UID: \"f20680ef-2022-4c0e-a8a5-9242b50af86d\") " pod="calico-system/calico-kube-controllers-6485779877-6hgzc" Feb 12 20:27:50.285861 kubelet[2014]: I0212 20:27:50.285641 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/206d9f1e-afed-41ff-b30c-add0fe51a3ee-config-volume\") pod \"coredns-5d78c9869d-zqxdv\" (UID: \"206d9f1e-afed-41ff-b30c-add0fe51a3ee\") " pod="kube-system/coredns-5d78c9869d-zqxdv" Feb 12 20:27:50.285861 kubelet[2014]: I0212 20:27:50.285715 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8c5qx\" (UniqueName: \"kubernetes.io/projected/206d9f1e-afed-41ff-b30c-add0fe51a3ee-kube-api-access-8c5qx\") pod \"coredns-5d78c9869d-zqxdv\" (UID: \"206d9f1e-afed-41ff-b30c-add0fe51a3ee\") " pod="kube-system/coredns-5d78c9869d-zqxdv" Feb 12 20:27:50.285861 kubelet[2014]: I0212 20:27:50.285759 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/fe848169-925a-4abf-a1a7-19c637d4a173-config-volume\") pod \"coredns-5d78c9869d-db2k2\" (UID: \"fe848169-925a-4abf-a1a7-19c637d4a173\") " pod="kube-system/coredns-5d78c9869d-db2k2" Feb 12 20:27:50.285861 kubelet[2014]: I0212 20:27:50.285778 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rkd8l\" (UniqueName: \"kubernetes.io/projected/fe848169-925a-4abf-a1a7-19c637d4a173-kube-api-access-rkd8l\") pod \"coredns-5d78c9869d-db2k2\" (UID: \"fe848169-925a-4abf-a1a7-19c637d4a173\") " pod="kube-system/coredns-5d78c9869d-db2k2" Feb 12 20:27:50.286732 env[1123]: time="2024-02-12T20:27:50.286703545Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:27:50Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2741 runtime=io.containerd.runc.v2\n" Feb 12 20:27:50.357359 kubelet[2014]: E0212 20:27:50.357325 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:50.358241 env[1123]: time="2024-02-12T20:27:50.358155131Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 20:27:50.414053 systemd[1]: Started sshd@9-10.0.0.105:22-10.0.0.1:44894.service. Feb 12 20:27:50.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.105:22-10.0.0.1:44894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:50.449000 audit[2757]: USER_ACCT pid=2757 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:50.450426 sshd[2757]: Accepted publickey for core from 10.0.0.1 port 44894 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:27:50.450000 audit[2757]: CRED_ACQ pid=2757 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:50.450000 audit[2757]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3d619a40 a2=3 a3=0 items=0 ppid=1 pid=2757 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:50.450000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:27:50.451626 sshd[2757]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:27:50.454637 systemd-logind[1111]: New session 10 of user core. Feb 12 20:27:50.455383 systemd[1]: Started session-10.scope. Feb 12 20:27:50.457000 audit[2757]: USER_START pid=2757 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:50.458000 audit[2759]: CRED_ACQ pid=2759 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:50.548513 kubelet[2014]: E0212 20:27:50.548485 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:50.550648 env[1123]: time="2024-02-12T20:27:50.550616480Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-db2k2,Uid:fe848169-925a-4abf-a1a7-19c637d4a173,Namespace:kube-system,Attempt:0,}" Feb 12 20:27:50.551730 kubelet[2014]: E0212 20:27:50.551708 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:50.551944 env[1123]: time="2024-02-12T20:27:50.551919148Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-zqxdv,Uid:206d9f1e-afed-41ff-b30c-add0fe51a3ee,Namespace:kube-system,Attempt:0,}" Feb 12 20:27:50.555471 env[1123]: time="2024-02-12T20:27:50.555361116Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6485779877-6hgzc,Uid:f20680ef-2022-4c0e-a8a5-9242b50af86d,Namespace:calico-system,Attempt:0,}" Feb 12 20:27:50.573248 sshd[2757]: pam_unix(sshd:session): session closed for user core Feb 12 20:27:50.573000 audit[2757]: USER_END pid=2757 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:50.573000 audit[2757]: CRED_DISP pid=2757 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:50.575743 systemd[1]: sshd@9-10.0.0.105:22-10.0.0.1:44894.service: Deactivated successfully. Feb 12 20:27:50.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.105:22-10.0.0.1:44894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:50.576553 systemd[1]: session-10.scope: Deactivated successfully. Feb 12 20:27:50.577372 systemd-logind[1111]: Session 10 logged out. Waiting for processes to exit. Feb 12 20:27:50.578084 systemd-logind[1111]: Removed session 10. Feb 12 20:27:50.677331 env[1123]: time="2024-02-12T20:27:50.677214473Z" level=error msg="Failed to destroy network for sandbox \"2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:27:50.679571 env[1123]: time="2024-02-12T20:27:50.677689957Z" level=error msg="encountered an error cleaning up failed sandbox \"2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:27:50.679571 env[1123]: time="2024-02-12T20:27:50.677748256Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6485779877-6hgzc,Uid:f20680ef-2022-4c0e-a8a5-9242b50af86d,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:27:50.678919 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd-shm.mount: Deactivated successfully. Feb 12 20:27:50.679818 kubelet[2014]: E0212 20:27:50.678062 2014 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:27:50.679818 kubelet[2014]: E0212 20:27:50.678132 2014 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6485779877-6hgzc" Feb 12 20:27:50.679818 kubelet[2014]: E0212 20:27:50.678158 2014 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6485779877-6hgzc" Feb 12 20:27:50.680001 kubelet[2014]: E0212 20:27:50.678223 2014 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-6485779877-6hgzc_calico-system(f20680ef-2022-4c0e-a8a5-9242b50af86d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-6485779877-6hgzc_calico-system(f20680ef-2022-4c0e-a8a5-9242b50af86d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6485779877-6hgzc" podUID=f20680ef-2022-4c0e-a8a5-9242b50af86d Feb 12 20:27:50.683820 env[1123]: time="2024-02-12T20:27:50.681651662Z" level=error msg="Failed to destroy network for sandbox \"b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:27:50.683820 env[1123]: time="2024-02-12T20:27:50.682120242Z" level=error msg="encountered an error cleaning up failed sandbox \"b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:27:50.683820 env[1123]: time="2024-02-12T20:27:50.682176187Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-zqxdv,Uid:206d9f1e-afed-41ff-b30c-add0fe51a3ee,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:27:50.684038 kubelet[2014]: E0212 20:27:50.682377 2014 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:27:50.684038 kubelet[2014]: E0212 20:27:50.682412 2014 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-zqxdv" Feb 12 20:27:50.684038 kubelet[2014]: E0212 20:27:50.682431 2014 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-zqxdv" Feb 12 20:27:50.684173 kubelet[2014]: E0212 20:27:50.682470 2014 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-zqxdv_kube-system(206d9f1e-afed-41ff-b30c-add0fe51a3ee)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-zqxdv_kube-system(206d9f1e-afed-41ff-b30c-add0fe51a3ee)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-zqxdv" podUID=206d9f1e-afed-41ff-b30c-add0fe51a3ee Feb 12 20:27:50.685203 env[1123]: time="2024-02-12T20:27:50.685150837Z" level=error msg="Failed to destroy network for sandbox \"6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:27:50.685570 env[1123]: time="2024-02-12T20:27:50.685539738Z" level=error msg="encountered an error cleaning up failed sandbox \"6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:27:50.685773 env[1123]: time="2024-02-12T20:27:50.685598077Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-db2k2,Uid:fe848169-925a-4abf-a1a7-19c637d4a173,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:27:50.685819 kubelet[2014]: E0212 20:27:50.685791 2014 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:27:50.685863 kubelet[2014]: E0212 20:27:50.685828 2014 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-db2k2" Feb 12 20:27:50.685863 kubelet[2014]: E0212 20:27:50.685852 2014 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-db2k2" Feb 12 20:27:50.685934 kubelet[2014]: E0212 20:27:50.685908 2014 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-db2k2_kube-system(fe848169-925a-4abf-a1a7-19c637d4a173)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-db2k2_kube-system(fe848169-925a-4abf-a1a7-19c637d4a173)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-db2k2" podUID=fe848169-925a-4abf-a1a7-19c637d4a173 Feb 12 20:27:51.269994 systemd[1]: Created slice kubepods-besteffort-pod00b3219e_c931_4bc8_a2f8_45793aef6eec.slice. Feb 12 20:27:51.271685 env[1123]: time="2024-02-12T20:27:51.271652160Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nsjjr,Uid:00b3219e-c931-4bc8-a2f8-45793aef6eec,Namespace:calico-system,Attempt:0,}" Feb 12 20:27:51.359182 kubelet[2014]: I0212 20:27:51.359151 2014 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" Feb 12 20:27:51.359780 env[1123]: time="2024-02-12T20:27:51.359739839Z" level=info msg="StopPodSandbox for \"2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd\"" Feb 12 20:27:51.360173 kubelet[2014]: I0212 20:27:51.360128 2014 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" Feb 12 20:27:51.360585 env[1123]: time="2024-02-12T20:27:51.360551454Z" level=info msg="StopPodSandbox for \"b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b\"" Feb 12 20:27:51.361674 kubelet[2014]: I0212 20:27:51.361560 2014 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" Feb 12 20:27:51.362206 env[1123]: time="2024-02-12T20:27:51.362088382Z" level=info msg="StopPodSandbox for \"6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e\"" Feb 12 20:27:51.403771 env[1123]: time="2024-02-12T20:27:51.403711619Z" level=error msg="StopPodSandbox for \"6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e\" failed" error="failed to destroy network for sandbox \"6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:27:51.404265 kubelet[2014]: E0212 20:27:51.404233 2014 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" Feb 12 20:27:51.404332 kubelet[2014]: E0212 20:27:51.404292 2014 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e} Feb 12 20:27:51.404332 kubelet[2014]: E0212 20:27:51.404324 2014 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fe848169-925a-4abf-a1a7-19c637d4a173\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 20:27:51.404427 kubelet[2014]: E0212 20:27:51.404347 2014 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fe848169-925a-4abf-a1a7-19c637d4a173\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-db2k2" podUID=fe848169-925a-4abf-a1a7-19c637d4a173 Feb 12 20:27:51.411475 env[1123]: time="2024-02-12T20:27:51.411397018Z" level=error msg="StopPodSandbox for \"b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b\" failed" error="failed to destroy network for sandbox \"b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:27:51.411659 kubelet[2014]: E0212 20:27:51.411608 2014 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" Feb 12 20:27:51.411659 kubelet[2014]: E0212 20:27:51.411628 2014 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b} Feb 12 20:27:51.411659 kubelet[2014]: E0212 20:27:51.411653 2014 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"206d9f1e-afed-41ff-b30c-add0fe51a3ee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 20:27:51.411866 kubelet[2014]: E0212 20:27:51.411673 2014 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"206d9f1e-afed-41ff-b30c-add0fe51a3ee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-zqxdv" podUID=206d9f1e-afed-41ff-b30c-add0fe51a3ee Feb 12 20:27:51.414680 env[1123]: time="2024-02-12T20:27:51.414617028Z" level=error msg="StopPodSandbox for \"2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd\" failed" error="failed to destroy network for sandbox \"2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:27:51.414877 kubelet[2014]: E0212 20:27:51.414862 2014 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" Feb 12 20:27:51.414936 kubelet[2014]: E0212 20:27:51.414882 2014 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd} Feb 12 20:27:51.414936 kubelet[2014]: E0212 20:27:51.414915 2014 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f20680ef-2022-4c0e-a8a5-9242b50af86d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 20:27:51.414936 kubelet[2014]: E0212 20:27:51.414937 2014 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f20680ef-2022-4c0e-a8a5-9242b50af86d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6485779877-6hgzc" podUID=f20680ef-2022-4c0e-a8a5-9242b50af86d Feb 12 20:27:51.605948 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b-shm.mount: Deactivated successfully. Feb 12 20:27:51.606061 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e-shm.mount: Deactivated successfully. Feb 12 20:27:51.885223 env[1123]: time="2024-02-12T20:27:51.885069738Z" level=error msg="Failed to destroy network for sandbox \"0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:27:51.885500 env[1123]: time="2024-02-12T20:27:51.885451827Z" level=error msg="encountered an error cleaning up failed sandbox \"0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:27:51.885500 env[1123]: time="2024-02-12T20:27:51.885503944Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nsjjr,Uid:00b3219e-c931-4bc8-a2f8-45793aef6eec,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:27:51.886222 kubelet[2014]: E0212 20:27:51.886177 2014 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:27:51.886222 kubelet[2014]: E0212 20:27:51.886264 2014 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-nsjjr" Feb 12 20:27:51.886222 kubelet[2014]: E0212 20:27:51.886292 2014 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-nsjjr" Feb 12 20:27:51.886511 kubelet[2014]: E0212 20:27:51.886355 2014 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-nsjjr_calico-system(00b3219e-c931-4bc8-a2f8-45793aef6eec)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-nsjjr_calico-system(00b3219e-c931-4bc8-a2f8-45793aef6eec)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-nsjjr" podUID=00b3219e-c931-4bc8-a2f8-45793aef6eec Feb 12 20:27:51.887188 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e-shm.mount: Deactivated successfully. Feb 12 20:27:52.364346 kubelet[2014]: I0212 20:27:52.364320 2014 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" Feb 12 20:27:52.364884 env[1123]: time="2024-02-12T20:27:52.364842027Z" level=info msg="StopPodSandbox for \"0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e\"" Feb 12 20:27:52.387259 env[1123]: time="2024-02-12T20:27:52.387197035Z" level=error msg="StopPodSandbox for \"0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e\" failed" error="failed to destroy network for sandbox \"0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:27:52.387529 kubelet[2014]: E0212 20:27:52.387493 2014 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" Feb 12 20:27:52.387577 kubelet[2014]: E0212 20:27:52.387552 2014 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e} Feb 12 20:27:52.387623 kubelet[2014]: E0212 20:27:52.387608 2014 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"00b3219e-c931-4bc8-a2f8-45793aef6eec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 20:27:52.387696 kubelet[2014]: E0212 20:27:52.387653 2014 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"00b3219e-c931-4bc8-a2f8-45793aef6eec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-nsjjr" podUID=00b3219e-c931-4bc8-a2f8-45793aef6eec Feb 12 20:27:55.577601 systemd[1]: Started sshd@10-10.0.0.105:22-10.0.0.1:53922.service. Feb 12 20:27:55.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.105:22-10.0.0.1:53922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:55.578319 kernel: kauditd_printk_skb: 45 callbacks suppressed Feb 12 20:27:55.578377 kernel: audit: type=1130 audit(1707769675.576:1174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.105:22-10.0.0.1:53922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:55.726000 audit[3017]: USER_ACCT pid=3017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:55.727887 sshd[3017]: Accepted publickey for core from 10.0.0.1 port 53922 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:27:55.729822 sshd[3017]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:27:55.728000 audit[3017]: CRED_ACQ pid=3017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:55.735977 kernel: audit: type=1101 audit(1707769675.726:1175): pid=3017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:55.736048 kernel: audit: type=1103 audit(1707769675.728:1176): pid=3017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:55.736074 kernel: audit: type=1006 audit(1707769675.728:1177): pid=3017 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 12 20:27:55.736098 kernel: audit: type=1300 audit(1707769675.728:1177): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefb6665f0 a2=3 a3=0 items=0 ppid=1 pid=3017 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:55.728000 audit[3017]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefb6665f0 a2=3 a3=0 items=0 ppid=1 pid=3017 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:55.734638 systemd[1]: Started session-11.scope. Feb 12 20:27:55.734931 systemd-logind[1111]: New session 11 of user core. Feb 12 20:27:55.728000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:27:55.739350 kernel: audit: type=1327 audit(1707769675.728:1177): proctitle=737368643A20636F7265205B707269765D Feb 12 20:27:55.739000 audit[3017]: USER_START pid=3017 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:55.740000 audit[3019]: CRED_ACQ pid=3019 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:55.746503 kernel: audit: type=1105 audit(1707769675.739:1178): pid=3017 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:55.746559 kernel: audit: type=1103 audit(1707769675.740:1179): pid=3019 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:55.843525 sshd[3017]: pam_unix(sshd:session): session closed for user core Feb 12 20:27:55.849651 kernel: audit: type=1106 audit(1707769675.843:1180): pid=3017 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:55.849767 kernel: audit: type=1104 audit(1707769675.843:1181): pid=3017 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:55.843000 audit[3017]: USER_END pid=3017 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:55.843000 audit[3017]: CRED_DISP pid=3017 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:55.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.105:22-10.0.0.1:53934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:55.846855 systemd[1]: Started sshd@11-10.0.0.105:22-10.0.0.1:53934.service. Feb 12 20:27:55.855079 systemd[1]: sshd@10-10.0.0.105:22-10.0.0.1:53922.service: Deactivated successfully. Feb 12 20:27:55.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.105:22-10.0.0.1:53922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:55.855717 systemd[1]: session-11.scope: Deactivated successfully. Feb 12 20:27:55.856606 systemd-logind[1111]: Session 11 logged out. Waiting for processes to exit. Feb 12 20:27:55.857218 systemd-logind[1111]: Removed session 11. Feb 12 20:27:55.882000 audit[3031]: USER_ACCT pid=3031 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:55.883944 sshd[3031]: Accepted publickey for core from 10.0.0.1 port 53934 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:27:55.883000 audit[3031]: CRED_ACQ pid=3031 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:55.883000 audit[3031]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffeeebd240 a2=3 a3=0 items=0 ppid=1 pid=3031 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:55.883000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:27:55.884916 sshd[3031]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:27:55.887997 systemd-logind[1111]: New session 12 of user core. Feb 12 20:27:55.888729 systemd[1]: Started session-12.scope. Feb 12 20:27:55.891000 audit[3031]: USER_START pid=3031 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:55.892000 audit[3034]: CRED_ACQ pid=3034 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:56.648677 sshd[3031]: pam_unix(sshd:session): session closed for user core Feb 12 20:27:56.651371 systemd[1]: Started sshd@12-10.0.0.105:22-10.0.0.1:53938.service. Feb 12 20:27:56.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.105:22-10.0.0.1:53938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:56.654000 audit[3031]: USER_END pid=3031 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:56.654000 audit[3031]: CRED_DISP pid=3031 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:56.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.105:22-10.0.0.1:53934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:56.660197 systemd[1]: sshd@11-10.0.0.105:22-10.0.0.1:53934.service: Deactivated successfully. Feb 12 20:27:56.661048 systemd[1]: session-12.scope: Deactivated successfully. Feb 12 20:27:56.666441 systemd-logind[1111]: Session 12 logged out. Waiting for processes to exit. Feb 12 20:27:56.671064 systemd-logind[1111]: Removed session 12. Feb 12 20:27:56.699000 audit[3042]: USER_ACCT pid=3042 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:56.700782 sshd[3042]: Accepted publickey for core from 10.0.0.1 port 53938 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:27:56.700000 audit[3042]: CRED_ACQ pid=3042 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:56.700000 audit[3042]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0e916430 a2=3 a3=0 items=0 ppid=1 pid=3042 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:56.700000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:27:56.701803 sshd[3042]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:27:56.705563 systemd-logind[1111]: New session 13 of user core. Feb 12 20:27:56.706402 systemd[1]: Started session-13.scope. Feb 12 20:27:56.709000 audit[3042]: USER_START pid=3042 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:56.710000 audit[3045]: CRED_ACQ pid=3045 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:56.828284 sshd[3042]: pam_unix(sshd:session): session closed for user core Feb 12 20:27:56.828000 audit[3042]: USER_END pid=3042 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:56.828000 audit[3042]: CRED_DISP pid=3042 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:56.831579 systemd[1]: sshd@12-10.0.0.105:22-10.0.0.1:53938.service: Deactivated successfully. Feb 12 20:27:56.832571 systemd[1]: session-13.scope: Deactivated successfully. Feb 12 20:27:56.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.105:22-10.0.0.1:53938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:56.833754 systemd-logind[1111]: Session 13 logged out. Waiting for processes to exit. Feb 12 20:27:56.834707 systemd-logind[1111]: Removed session 13. Feb 12 20:27:59.009532 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount578699971.mount: Deactivated successfully. Feb 12 20:27:59.804220 env[1123]: time="2024-02-12T20:27:59.804168290Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:59.807880 env[1123]: time="2024-02-12T20:27:59.807833812Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:59.809212 env[1123]: time="2024-02-12T20:27:59.809191402Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:59.810457 env[1123]: time="2024-02-12T20:27:59.810426521Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:59.810859 env[1123]: time="2024-02-12T20:27:59.810826883Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 12 20:27:59.819089 env[1123]: time="2024-02-12T20:27:59.816367125Z" level=info msg="CreateContainer within sandbox \"c3b0659c0a7a9db0f0a9749b638550017996bd376b056c26f46fa94dbd50aef2\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 20:27:59.833710 env[1123]: time="2024-02-12T20:27:59.833650277Z" level=info msg="CreateContainer within sandbox \"c3b0659c0a7a9db0f0a9749b638550017996bd376b056c26f46fa94dbd50aef2\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"65c77be9c0a760a0e7bf6b6990c046ca2e0524a4541b89e607606e0d2e0ea2c1\"" Feb 12 20:27:59.834224 env[1123]: time="2024-02-12T20:27:59.834198386Z" level=info msg="StartContainer for \"65c77be9c0a760a0e7bf6b6990c046ca2e0524a4541b89e607606e0d2e0ea2c1\"" Feb 12 20:27:59.849546 systemd[1]: Started cri-containerd-65c77be9c0a760a0e7bf6b6990c046ca2e0524a4541b89e607606e0d2e0ea2c1.scope. Feb 12 20:27:59.867000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.867000 audit[3066]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fb5fe03b9f8 items=0 ppid=2445 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:59.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635633737626539633061373630613065376266366236393930633034 Feb 12 20:27:59.867000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.867000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.867000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.867000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.867000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.867000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.867000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.867000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.867000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.867000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.867000 audit: BPF prog-id=145 op=LOAD Feb 12 20:27:59.867000 audit[3066]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003b63e8 items=0 ppid=2445 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:59.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635633737626539633061373630613065376266366236393930633034 Feb 12 20:27:59.867000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.867000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.867000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.867000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.867000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.867000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.867000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.867000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.867000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.867000 audit: BPF prog-id=146 op=LOAD Feb 12 20:27:59.867000 audit[3066]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003b6438 items=0 ppid=2445 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:59.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635633737626539633061373630613065376266366236393930633034 Feb 12 20:27:59.868000 audit: BPF prog-id=146 op=UNLOAD Feb 12 20:27:59.868000 audit: BPF prog-id=145 op=UNLOAD Feb 12 20:27:59.868000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.868000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.868000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.868000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.868000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.868000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.868000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.868000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.868000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.868000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.868000 audit: BPF prog-id=147 op=LOAD Feb 12 20:27:59.868000 audit[3066]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003b64c8 items=0 ppid=2445 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:59.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635633737626539633061373630613065376266366236393930633034 Feb 12 20:28:00.090579 env[1123]: time="2024-02-12T20:28:00.090466210Z" level=info msg="StartContainer for \"65c77be9c0a760a0e7bf6b6990c046ca2e0524a4541b89e607606e0d2e0ea2c1\" returns successfully" Feb 12 20:28:00.121443 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 20:28:00.121559 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 20:28:00.379787 kubelet[2014]: E0212 20:28:00.379675 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:28:00.392502 kubelet[2014]: I0212 20:28:00.392467 2014 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-fldvp" podStartSLOduration=1.775395684 podCreationTimestamp="2024-02-12 20:27:35 +0000 UTC" firstStartedPulling="2024-02-12 20:27:36.19404825 +0000 UTC m=+19.007968881" lastFinishedPulling="2024-02-12 20:27:59.811071713 +0000 UTC m=+42.624992344" observedRunningTime="2024-02-12 20:28:00.392178606 +0000 UTC m=+43.206099237" watchObservedRunningTime="2024-02-12 20:28:00.392419147 +0000 UTC m=+43.206339778" Feb 12 20:28:01.353993 kernel: kauditd_printk_skb: 66 callbacks suppressed Feb 12 20:28:01.354136 kernel: audit: type=1400 audit(1707769681.351:1207): avc: denied { write } for pid=3199 comm="tee" name="fd" dev="proc" ino=25623 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:28:01.351000 audit[3199]: AVC avc: denied { write } for pid=3199 comm="tee" name="fd" dev="proc" ino=25623 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:28:01.351000 audit[3199]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd965c5983 a2=241 a3=1b6 items=1 ppid=3155 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.359926 kernel: audit: type=1300 audit(1707769681.351:1207): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd965c5983 a2=241 a3=1b6 items=1 ppid=3155 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.360052 kernel: audit: type=1307 audit(1707769681.351:1207): cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 20:28:01.351000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 20:28:01.351000 audit: PATH item=0 name="/dev/fd/63" inode=25606 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:28:01.351000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:28:01.368766 kernel: audit: type=1302 audit(1707769681.351:1207): item=0 name="/dev/fd/63" inode=25606 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:28:01.368825 kernel: audit: type=1327 audit(1707769681.351:1207): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:28:01.368852 kernel: audit: type=1400 audit(1707769681.354:1208): avc: denied { write } for pid=3214 comm="tee" name="fd" dev="proc" ino=25084 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:28:01.354000 audit[3214]: AVC avc: denied { write } for pid=3214 comm="tee" name="fd" dev="proc" ino=25084 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:28:01.354000 audit[3214]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff6d669993 a2=241 a3=1b6 items=1 ppid=3167 pid=3214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.375255 kernel: audit: type=1300 audit(1707769681.354:1208): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff6d669993 a2=241 a3=1b6 items=1 ppid=3167 pid=3214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.354000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 20:28:01.376667 kernel: audit: type=1307 audit(1707769681.354:1208): cwd="/etc/service/enabled/felix/log" Feb 12 20:28:01.354000 audit: PATH item=0 name="/dev/fd/63" inode=25616 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:28:01.379472 kernel: audit: type=1302 audit(1707769681.354:1208): item=0 name="/dev/fd/63" inode=25616 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:28:01.354000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:28:01.381288 kubelet[2014]: E0212 20:28:01.381260 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:28:01.382160 kernel: audit: type=1327 audit(1707769681.354:1208): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:28:01.355000 audit[3216]: AVC avc: denied { write } for pid=3216 comm="tee" name="fd" dev="proc" ino=25627 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:28:01.355000 audit[3216]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe47dc6993 a2=241 a3=1b6 items=1 ppid=3156 pid=3216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.355000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 20:28:01.355000 audit: PATH item=0 name="/dev/fd/63" inode=25619 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:28:01.355000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:28:01.362000 audit[3227]: AVC avc: denied { write } for pid=3227 comm="tee" name="fd" dev="proc" ino=24166 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:28:01.362000 audit[3227]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee8dda995 a2=241 a3=1b6 items=1 ppid=3161 pid=3227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.362000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 20:28:01.362000 audit: PATH item=0 name="/dev/fd/63" inode=25080 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:28:01.362000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:28:01.362000 audit[3231]: AVC avc: denied { write } for pid=3231 comm="tee" name="fd" dev="proc" ino=25088 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:28:01.362000 audit[3231]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffda13c8994 a2=241 a3=1b6 items=1 ppid=3171 pid=3231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.362000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 20:28:01.362000 audit: PATH item=0 name="/dev/fd/63" inode=25083 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:28:01.362000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:28:01.366000 audit[3225]: AVC avc: denied { write } for pid=3225 comm="tee" name="fd" dev="proc" ino=25631 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:28:01.366000 audit[3225]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc3744a993 a2=241 a3=1b6 items=1 ppid=3165 pid=3225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.366000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 20:28:01.366000 audit: PATH item=0 name="/dev/fd/63" inode=25077 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:28:01.366000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:28:01.366000 audit[3223]: AVC avc: denied { write } for pid=3223 comm="tee" name="fd" dev="proc" ino=25635 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:28:01.366000 audit[3223]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff6b67c984 a2=241 a3=1b6 items=1 ppid=3162 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.366000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 20:28:01.366000 audit: PATH item=0 name="/dev/fd/63" inode=25620 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:28:01.366000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:28:01.423020 systemd[1]: run-containerd-runc-k8s.io-65c77be9c0a760a0e7bf6b6990c046ca2e0524a4541b89e607606e0d2e0ea2c1-runc.TwpkEL.mount: Deactivated successfully. Feb 12 20:28:01.831966 systemd[1]: Started sshd@13-10.0.0.105:22-10.0.0.1:53940.service. Feb 12 20:28:01.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.105:22-10.0.0.1:53940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:28:01.868000 audit[3276]: USER_ACCT pid=3276 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:01.869938 sshd[3276]: Accepted publickey for core from 10.0.0.1 port 53940 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:28:01.869000 audit[3276]: CRED_ACQ pid=3276 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:01.869000 audit[3276]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7e5e0d50 a2=3 a3=0 items=0 ppid=1 pid=3276 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.869000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:28:01.871057 sshd[3276]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:28:01.874165 systemd-logind[1111]: New session 14 of user core. Feb 12 20:28:01.875183 systemd[1]: Started session-14.scope. Feb 12 20:28:01.878000 audit[3276]: USER_START pid=3276 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:01.879000 audit[3278]: CRED_ACQ pid=3278 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:01.978036 sshd[3276]: pam_unix(sshd:session): session closed for user core Feb 12 20:28:01.978000 audit[3276]: USER_END pid=3276 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:01.978000 audit[3276]: CRED_DISP pid=3276 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:01.980227 systemd[1]: sshd@13-10.0.0.105:22-10.0.0.1:53940.service: Deactivated successfully. Feb 12 20:28:01.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.105:22-10.0.0.1:53940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:28:01.980994 systemd[1]: session-14.scope: Deactivated successfully. Feb 12 20:28:01.981666 systemd-logind[1111]: Session 14 logged out. Waiting for processes to exit. Feb 12 20:28:01.982498 systemd-logind[1111]: Removed session 14. Feb 12 20:28:02.266209 env[1123]: time="2024-02-12T20:28:02.266068001Z" level=info msg="StopPodSandbox for \"b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b\"" Feb 12 20:28:02.426753 env[1123]: 2024-02-12 20:28:02.314 [INFO][3306] k8s.go 578: Cleaning up netns ContainerID="b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" Feb 12 20:28:02.426753 env[1123]: 2024-02-12 20:28:02.314 [INFO][3306] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" iface="eth0" netns="/var/run/netns/cni-21755eab-99b4-6ce7-cfb9-6e2d408c0b17" Feb 12 20:28:02.426753 env[1123]: 2024-02-12 20:28:02.314 [INFO][3306] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" iface="eth0" netns="/var/run/netns/cni-21755eab-99b4-6ce7-cfb9-6e2d408c0b17" Feb 12 20:28:02.426753 env[1123]: 2024-02-12 20:28:02.315 [INFO][3306] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" iface="eth0" netns="/var/run/netns/cni-21755eab-99b4-6ce7-cfb9-6e2d408c0b17" Feb 12 20:28:02.426753 env[1123]: 2024-02-12 20:28:02.315 [INFO][3306] k8s.go 585: Releasing IP address(es) ContainerID="b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" Feb 12 20:28:02.426753 env[1123]: 2024-02-12 20:28:02.315 [INFO][3306] utils.go 188: Calico CNI releasing IP address ContainerID="b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" Feb 12 20:28:02.426753 env[1123]: 2024-02-12 20:28:02.353 [INFO][3313] ipam_plugin.go 415: Releasing address using handleID ContainerID="b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" HandleID="k8s-pod-network.b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" Workload="localhost-k8s-coredns--5d78c9869d--zqxdv-eth0" Feb 12 20:28:02.426753 env[1123]: 2024-02-12 20:28:02.353 [INFO][3313] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:28:02.426753 env[1123]: 2024-02-12 20:28:02.353 [INFO][3313] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:28:02.426753 env[1123]: 2024-02-12 20:28:02.421 [WARNING][3313] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" HandleID="k8s-pod-network.b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" Workload="localhost-k8s-coredns--5d78c9869d--zqxdv-eth0" Feb 12 20:28:02.426753 env[1123]: 2024-02-12 20:28:02.421 [INFO][3313] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" HandleID="k8s-pod-network.b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" Workload="localhost-k8s-coredns--5d78c9869d--zqxdv-eth0" Feb 12 20:28:02.426753 env[1123]: 2024-02-12 20:28:02.423 [INFO][3313] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:28:02.426753 env[1123]: 2024-02-12 20:28:02.424 [INFO][3306] k8s.go 591: Teardown processing complete. ContainerID="b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" Feb 12 20:28:02.427214 env[1123]: time="2024-02-12T20:28:02.426932239Z" level=info msg="TearDown network for sandbox \"b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b\" successfully" Feb 12 20:28:02.427214 env[1123]: time="2024-02-12T20:28:02.426992292Z" level=info msg="StopPodSandbox for \"b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b\" returns successfully" Feb 12 20:28:02.427376 kubelet[2014]: E0212 20:28:02.427352 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:28:02.427888 env[1123]: time="2024-02-12T20:28:02.427865671Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-zqxdv,Uid:206d9f1e-afed-41ff-b30c-add0fe51a3ee,Namespace:kube-system,Attempt:1,}" Feb 12 20:28:02.429263 systemd[1]: run-netns-cni\x2d21755eab\x2d99b4\x2d6ce7\x2dcfb9\x2d6e2d408c0b17.mount: Deactivated successfully. Feb 12 20:28:03.122645 systemd-networkd[1018]: cali8fea960e7ff: Link UP Feb 12 20:28:03.138123 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:28:03.138278 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8fea960e7ff: link becomes ready Feb 12 20:28:03.138542 systemd-networkd[1018]: cali8fea960e7ff: Gained carrier Feb 12 20:28:03.148098 env[1123]: 2024-02-12 20:28:03.044 [INFO][3343] utils.go 100: File /var/lib/calico/mtu does not exist Feb 12 20:28:03.148098 env[1123]: 2024-02-12 20:28:03.057 [INFO][3343] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5d78c9869d--zqxdv-eth0 coredns-5d78c9869d- kube-system 206d9f1e-afed-41ff-b30c-add0fe51a3ee 792 0 2024-02-12 20:27:30 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5d78c9869d-zqxdv eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali8fea960e7ff [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="a74d84b992f1a4b62e7a84ee1c7beb14f81700e1f8e5a5f60290b121edc186d5" Namespace="kube-system" Pod="coredns-5d78c9869d-zqxdv" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--zqxdv-" Feb 12 20:28:03.148098 env[1123]: 2024-02-12 20:28:03.057 [INFO][3343] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="a74d84b992f1a4b62e7a84ee1c7beb14f81700e1f8e5a5f60290b121edc186d5" Namespace="kube-system" Pod="coredns-5d78c9869d-zqxdv" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--zqxdv-eth0" Feb 12 20:28:03.148098 env[1123]: 2024-02-12 20:28:03.081 [INFO][3357] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a74d84b992f1a4b62e7a84ee1c7beb14f81700e1f8e5a5f60290b121edc186d5" HandleID="k8s-pod-network.a74d84b992f1a4b62e7a84ee1c7beb14f81700e1f8e5a5f60290b121edc186d5" Workload="localhost-k8s-coredns--5d78c9869d--zqxdv-eth0" Feb 12 20:28:03.148098 env[1123]: 2024-02-12 20:28:03.092 [INFO][3357] ipam_plugin.go 268: Auto assigning IP ContainerID="a74d84b992f1a4b62e7a84ee1c7beb14f81700e1f8e5a5f60290b121edc186d5" HandleID="k8s-pod-network.a74d84b992f1a4b62e7a84ee1c7beb14f81700e1f8e5a5f60290b121edc186d5" Workload="localhost-k8s-coredns--5d78c9869d--zqxdv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000502b0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5d78c9869d-zqxdv", "timestamp":"2024-02-12 20:28:03.081084613 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:28:03.148098 env[1123]: 2024-02-12 20:28:03.092 [INFO][3357] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:28:03.148098 env[1123]: 2024-02-12 20:28:03.092 [INFO][3357] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:28:03.148098 env[1123]: 2024-02-12 20:28:03.093 [INFO][3357] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 20:28:03.148098 env[1123]: 2024-02-12 20:28:03.095 [INFO][3357] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a74d84b992f1a4b62e7a84ee1c7beb14f81700e1f8e5a5f60290b121edc186d5" host="localhost" Feb 12 20:28:03.148098 env[1123]: 2024-02-12 20:28:03.099 [INFO][3357] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 20:28:03.148098 env[1123]: 2024-02-12 20:28:03.103 [INFO][3357] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 20:28:03.148098 env[1123]: 2024-02-12 20:28:03.104 [INFO][3357] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 20:28:03.148098 env[1123]: 2024-02-12 20:28:03.106 [INFO][3357] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 20:28:03.148098 env[1123]: 2024-02-12 20:28:03.106 [INFO][3357] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.a74d84b992f1a4b62e7a84ee1c7beb14f81700e1f8e5a5f60290b121edc186d5" host="localhost" Feb 12 20:28:03.148098 env[1123]: 2024-02-12 20:28:03.107 [INFO][3357] ipam.go 1682: Creating new handle: k8s-pod-network.a74d84b992f1a4b62e7a84ee1c7beb14f81700e1f8e5a5f60290b121edc186d5 Feb 12 20:28:03.148098 env[1123]: 2024-02-12 20:28:03.110 [INFO][3357] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.a74d84b992f1a4b62e7a84ee1c7beb14f81700e1f8e5a5f60290b121edc186d5" host="localhost" Feb 12 20:28:03.148098 env[1123]: 2024-02-12 20:28:03.114 [INFO][3357] ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.a74d84b992f1a4b62e7a84ee1c7beb14f81700e1f8e5a5f60290b121edc186d5" host="localhost" Feb 12 20:28:03.148098 env[1123]: 2024-02-12 20:28:03.114 [INFO][3357] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.a74d84b992f1a4b62e7a84ee1c7beb14f81700e1f8e5a5f60290b121edc186d5" host="localhost" Feb 12 20:28:03.148098 env[1123]: 2024-02-12 20:28:03.115 [INFO][3357] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:28:03.148098 env[1123]: 2024-02-12 20:28:03.115 [INFO][3357] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="a74d84b992f1a4b62e7a84ee1c7beb14f81700e1f8e5a5f60290b121edc186d5" HandleID="k8s-pod-network.a74d84b992f1a4b62e7a84ee1c7beb14f81700e1f8e5a5f60290b121edc186d5" Workload="localhost-k8s-coredns--5d78c9869d--zqxdv-eth0" Feb 12 20:28:03.148861 env[1123]: 2024-02-12 20:28:03.116 [INFO][3343] k8s.go 385: Populated endpoint ContainerID="a74d84b992f1a4b62e7a84ee1c7beb14f81700e1f8e5a5f60290b121edc186d5" Namespace="kube-system" Pod="coredns-5d78c9869d-zqxdv" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--zqxdv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--zqxdv-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"206d9f1e-afed-41ff-b30c-add0fe51a3ee", ResourceVersion:"792", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 27, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5d78c9869d-zqxdv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8fea960e7ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:28:03.148861 env[1123]: 2024-02-12 20:28:03.117 [INFO][3343] k8s.go 386: Calico CNI using IPs: [192.168.88.129/32] ContainerID="a74d84b992f1a4b62e7a84ee1c7beb14f81700e1f8e5a5f60290b121edc186d5" Namespace="kube-system" Pod="coredns-5d78c9869d-zqxdv" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--zqxdv-eth0" Feb 12 20:28:03.148861 env[1123]: 2024-02-12 20:28:03.117 [INFO][3343] dataplane_linux.go 68: Setting the host side veth name to cali8fea960e7ff ContainerID="a74d84b992f1a4b62e7a84ee1c7beb14f81700e1f8e5a5f60290b121edc186d5" Namespace="kube-system" Pod="coredns-5d78c9869d-zqxdv" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--zqxdv-eth0" Feb 12 20:28:03.148861 env[1123]: 2024-02-12 20:28:03.122 [INFO][3343] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="a74d84b992f1a4b62e7a84ee1c7beb14f81700e1f8e5a5f60290b121edc186d5" Namespace="kube-system" Pod="coredns-5d78c9869d-zqxdv" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--zqxdv-eth0" Feb 12 20:28:03.148861 env[1123]: 2024-02-12 20:28:03.139 [INFO][3343] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="a74d84b992f1a4b62e7a84ee1c7beb14f81700e1f8e5a5f60290b121edc186d5" Namespace="kube-system" Pod="coredns-5d78c9869d-zqxdv" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--zqxdv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--zqxdv-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"206d9f1e-afed-41ff-b30c-add0fe51a3ee", ResourceVersion:"792", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 27, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a74d84b992f1a4b62e7a84ee1c7beb14f81700e1f8e5a5f60290b121edc186d5", Pod:"coredns-5d78c9869d-zqxdv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8fea960e7ff", MAC:"7e:db:fe:72:a7:8f", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:28:03.148861 env[1123]: 2024-02-12 20:28:03.145 [INFO][3343] k8s.go 491: Wrote updated endpoint to datastore ContainerID="a74d84b992f1a4b62e7a84ee1c7beb14f81700e1f8e5a5f60290b121edc186d5" Namespace="kube-system" Pod="coredns-5d78c9869d-zqxdv" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--zqxdv-eth0" Feb 12 20:28:03.171890 env[1123]: time="2024-02-12T20:28:03.171796415Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:28:03.171890 env[1123]: time="2024-02-12T20:28:03.171840569Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:28:03.171890 env[1123]: time="2024-02-12T20:28:03.171852341Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:28:03.172173 env[1123]: time="2024-02-12T20:28:03.172013052Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a74d84b992f1a4b62e7a84ee1c7beb14f81700e1f8e5a5f60290b121edc186d5 pid=3386 runtime=io.containerd.runc.v2 Feb 12 20:28:03.187701 systemd[1]: Started cri-containerd-a74d84b992f1a4b62e7a84ee1c7beb14f81700e1f8e5a5f60290b121edc186d5.scope. Feb 12 20:28:03.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit: BPF prog-id=148 op=LOAD Feb 12 20:28:03.200000 audit[3395]: AVC avc: denied { bpf } for pid=3395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[3395]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3386 pid=3395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:03.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137346438346239393266316134623632653761383465653163376265 Feb 12 20:28:03.200000 audit[3395]: AVC avc: denied { perfmon } for pid=3395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[3395]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3386 pid=3395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:03.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137346438346239393266316134623632653761383465653163376265 Feb 12 20:28:03.200000 audit[3395]: AVC avc: denied { bpf } for pid=3395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[3395]: AVC avc: denied { bpf } for pid=3395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[3395]: AVC avc: denied { bpf } for pid=3395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[3395]: AVC avc: denied { perfmon } for pid=3395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[3395]: AVC avc: denied { perfmon } for pid=3395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[3395]: AVC avc: denied { perfmon } for pid=3395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[3395]: AVC avc: denied { perfmon } for pid=3395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[3395]: AVC avc: denied { perfmon } for pid=3395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[3395]: AVC avc: denied { bpf } for pid=3395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[3395]: AVC avc: denied { bpf } for pid=3395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit: BPF prog-id=149 op=LOAD Feb 12 20:28:03.200000 audit[3395]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000210ff0 items=0 ppid=3386 pid=3395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:03.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137346438346239393266316134623632653761383465653163376265 Feb 12 20:28:03.200000 audit[3395]: AVC avc: denied { bpf } for pid=3395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[3395]: AVC avc: denied { bpf } for pid=3395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[3395]: AVC avc: denied { perfmon } for pid=3395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[3395]: AVC avc: denied { perfmon } for pid=3395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[3395]: AVC avc: denied { perfmon } for pid=3395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[3395]: AVC avc: denied { perfmon } for pid=3395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[3395]: AVC avc: denied { perfmon } for pid=3395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[3395]: AVC avc: denied { bpf } for pid=3395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[3395]: AVC avc: denied { bpf } for pid=3395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit: BPF prog-id=150 op=LOAD Feb 12 20:28:03.200000 audit[3395]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000211038 items=0 ppid=3386 pid=3395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:03.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137346438346239393266316134623632653761383465653163376265 Feb 12 20:28:03.200000 audit: BPF prog-id=150 op=UNLOAD Feb 12 20:28:03.200000 audit: BPF prog-id=149 op=UNLOAD Feb 12 20:28:03.200000 audit[3395]: AVC avc: denied { bpf } for pid=3395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[3395]: AVC avc: denied { bpf } for pid=3395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[3395]: AVC avc: denied { bpf } for pid=3395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[3395]: AVC avc: denied { perfmon } for pid=3395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[3395]: AVC avc: denied { perfmon } for pid=3395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[3395]: AVC avc: denied { perfmon } for pid=3395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[3395]: AVC avc: denied { perfmon } for pid=3395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[3395]: AVC avc: denied { perfmon } for pid=3395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[3395]: AVC avc: denied { bpf } for pid=3395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit[3395]: AVC avc: denied { bpf } for pid=3395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.200000 audit: BPF prog-id=151 op=LOAD Feb 12 20:28:03.200000 audit[3395]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000211448 items=0 ppid=3386 pid=3395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:03.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137346438346239393266316134623632653761383465653163376265 Feb 12 20:28:03.203035 systemd-resolved[1066]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 20:28:03.230021 env[1123]: time="2024-02-12T20:28:03.228994517Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-zqxdv,Uid:206d9f1e-afed-41ff-b30c-add0fe51a3ee,Namespace:kube-system,Attempt:1,} returns sandbox id \"a74d84b992f1a4b62e7a84ee1c7beb14f81700e1f8e5a5f60290b121edc186d5\"" Feb 12 20:28:03.233137 kubelet[2014]: E0212 20:28:03.233103 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:28:03.235102 env[1123]: time="2024-02-12T20:28:03.235064281Z" level=info msg="CreateContainer within sandbox \"a74d84b992f1a4b62e7a84ee1c7beb14f81700e1f8e5a5f60290b121edc186d5\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 20:28:03.259049 env[1123]: time="2024-02-12T20:28:03.258985896Z" level=info msg="CreateContainer within sandbox \"a74d84b992f1a4b62e7a84ee1c7beb14f81700e1f8e5a5f60290b121edc186d5\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"19aa7216ea7cd6fb59ecaae94120aad33c3d799bd6db5c57c363fe0510d1bc03\"" Feb 12 20:28:03.259773 env[1123]: time="2024-02-12T20:28:03.259736034Z" level=info msg="StartContainer for \"19aa7216ea7cd6fb59ecaae94120aad33c3d799bd6db5c57c363fe0510d1bc03\"" Feb 12 20:28:03.278936 systemd[1]: Started cri-containerd-19aa7216ea7cd6fb59ecaae94120aad33c3d799bd6db5c57c363fe0510d1bc03.scope. Feb 12 20:28:03.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.290000 audit: BPF prog-id=152 op=LOAD Feb 12 20:28:03.291000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.291000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3386 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:03.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139616137323136656137636436666235396563616165393431323061 Feb 12 20:28:03.291000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.291000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3386 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:03.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139616137323136656137636436666235396563616165393431323061 Feb 12 20:28:03.291000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.291000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.291000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.291000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.291000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.291000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.291000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.291000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.291000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.291000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.291000 audit: BPF prog-id=153 op=LOAD Feb 12 20:28:03.291000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a30a0 items=0 ppid=3386 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:03.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139616137323136656137636436666235396563616165393431323061 Feb 12 20:28:03.291000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.291000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.291000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.291000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.291000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.291000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.291000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.291000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.291000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.291000 audit: BPF prog-id=154 op=LOAD Feb 12 20:28:03.291000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a30e8 items=0 ppid=3386 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:03.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139616137323136656137636436666235396563616165393431323061 Feb 12 20:28:03.291000 audit: BPF prog-id=154 op=UNLOAD Feb 12 20:28:03.291000 audit: BPF prog-id=153 op=UNLOAD Feb 12 20:28:03.291000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.291000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.291000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.291000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.291000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.291000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.291000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.291000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.291000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.291000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:03.291000 audit: BPF prog-id=155 op=LOAD Feb 12 20:28:03.291000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a34f8 items=0 ppid=3386 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:03.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139616137323136656137636436666235396563616165393431323061 Feb 12 20:28:03.340704 env[1123]: time="2024-02-12T20:28:03.340652641Z" level=info msg="StartContainer for \"19aa7216ea7cd6fb59ecaae94120aad33c3d799bd6db5c57c363fe0510d1bc03\" returns successfully" Feb 12 20:28:03.386476 kubelet[2014]: E0212 20:28:03.386377 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:28:03.403038 kubelet[2014]: I0212 20:28:03.402980 2014 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-zqxdv" podStartSLOduration=33.402917944 podCreationTimestamp="2024-02-12 20:27:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:28:03.402419028 +0000 UTC m=+46.216339659" watchObservedRunningTime="2024-02-12 20:28:03.402917944 +0000 UTC m=+46.216838575" Feb 12 20:28:03.414000 audit[3462]: NETFILTER_CFG table=filter:95 family=2 entries=16 op=nft_register_rule pid=3462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:03.414000 audit[3462]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7fff12629d20 a2=0 a3=7fff12629d0c items=0 ppid=2173 pid=3462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:03.414000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:03.414000 audit[3462]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=3462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:03.414000 audit[3462]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7fff12629d20 a2=0 a3=31030 items=0 ppid=2173 pid=3462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:03.414000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:03.430325 systemd[1]: run-containerd-runc-k8s.io-a74d84b992f1a4b62e7a84ee1c7beb14f81700e1f8e5a5f60290b121edc186d5-runc.kLNhan.mount: Deactivated successfully. Feb 12 20:28:04.265676 env[1123]: time="2024-02-12T20:28:04.265634220Z" level=info msg="StopPodSandbox for \"0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e\"" Feb 12 20:28:04.333081 env[1123]: 2024-02-12 20:28:04.305 [INFO][3502] k8s.go 578: Cleaning up netns ContainerID="0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" Feb 12 20:28:04.333081 env[1123]: 2024-02-12 20:28:04.305 [INFO][3502] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" iface="eth0" netns="/var/run/netns/cni-54b326eb-9dd0-eb4c-fba7-201bfeeb45c6" Feb 12 20:28:04.333081 env[1123]: 2024-02-12 20:28:04.305 [INFO][3502] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" iface="eth0" netns="/var/run/netns/cni-54b326eb-9dd0-eb4c-fba7-201bfeeb45c6" Feb 12 20:28:04.333081 env[1123]: 2024-02-12 20:28:04.305 [INFO][3502] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" iface="eth0" netns="/var/run/netns/cni-54b326eb-9dd0-eb4c-fba7-201bfeeb45c6" Feb 12 20:28:04.333081 env[1123]: 2024-02-12 20:28:04.305 [INFO][3502] k8s.go 585: Releasing IP address(es) ContainerID="0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" Feb 12 20:28:04.333081 env[1123]: 2024-02-12 20:28:04.306 [INFO][3502] utils.go 188: Calico CNI releasing IP address ContainerID="0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" Feb 12 20:28:04.333081 env[1123]: 2024-02-12 20:28:04.322 [INFO][3510] ipam_plugin.go 415: Releasing address using handleID ContainerID="0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" HandleID="k8s-pod-network.0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" Workload="localhost-k8s-csi--node--driver--nsjjr-eth0" Feb 12 20:28:04.333081 env[1123]: 2024-02-12 20:28:04.323 [INFO][3510] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:28:04.333081 env[1123]: 2024-02-12 20:28:04.323 [INFO][3510] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:28:04.333081 env[1123]: 2024-02-12 20:28:04.329 [WARNING][3510] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" HandleID="k8s-pod-network.0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" Workload="localhost-k8s-csi--node--driver--nsjjr-eth0" Feb 12 20:28:04.333081 env[1123]: 2024-02-12 20:28:04.329 [INFO][3510] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" HandleID="k8s-pod-network.0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" Workload="localhost-k8s-csi--node--driver--nsjjr-eth0" Feb 12 20:28:04.333081 env[1123]: 2024-02-12 20:28:04.330 [INFO][3510] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:28:04.333081 env[1123]: 2024-02-12 20:28:04.331 [INFO][3502] k8s.go 591: Teardown processing complete. ContainerID="0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" Feb 12 20:28:04.333587 env[1123]: time="2024-02-12T20:28:04.333243750Z" level=info msg="TearDown network for sandbox \"0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e\" successfully" Feb 12 20:28:04.333587 env[1123]: time="2024-02-12T20:28:04.333280439Z" level=info msg="StopPodSandbox for \"0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e\" returns successfully" Feb 12 20:28:04.334894 systemd[1]: run-netns-cni\x2d54b326eb\x2d9dd0\x2deb4c\x2dfba7\x2d201bfeeb45c6.mount: Deactivated successfully. Feb 12 20:28:04.336148 env[1123]: time="2024-02-12T20:28:04.336100553Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nsjjr,Uid:00b3219e-c931-4bc8-a2f8-45793aef6eec,Namespace:calico-system,Attempt:1,}" Feb 12 20:28:04.388063 kubelet[2014]: E0212 20:28:04.388025 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:28:04.408000 audit[3541]: NETFILTER_CFG table=filter:97 family=2 entries=13 op=nft_register_rule pid=3541 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:04.408000 audit[3541]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffeaceb2790 a2=0 a3=7ffeaceb277c items=0 ppid=2173 pid=3541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:04.408000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:04.409000 audit[3541]: NETFILTER_CFG table=nat:98 family=2 entries=33 op=nft_register_chain pid=3541 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:04.409000 audit[3541]: SYSCALL arch=c000003e syscall=46 success=yes exit=13060 a0=3 a1=7ffeaceb2790 a2=0 a3=7ffeaceb277c items=0 ppid=2173 pid=3541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:04.409000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:04.466907 systemd-networkd[1018]: cali53348347bdb: Link UP Feb 12 20:28:04.468282 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:28:04.468521 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali53348347bdb: link becomes ready Feb 12 20:28:04.468327 systemd-networkd[1018]: cali53348347bdb: Gained carrier Feb 12 20:28:04.497715 env[1123]: 2024-02-12 20:28:04.368 [INFO][3519] utils.go 100: File /var/lib/calico/mtu does not exist Feb 12 20:28:04.497715 env[1123]: 2024-02-12 20:28:04.378 [INFO][3519] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--nsjjr-eth0 csi-node-driver- calico-system 00b3219e-c931-4bc8-a2f8-45793aef6eec 826 0 2024-02-12 20:27:35 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:86b88cf7c9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s localhost csi-node-driver-nsjjr eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali53348347bdb [] []}} ContainerID="8225bf0ec94ab5cbab1d5049df760c33a4ae2594fdcfaee532de65fc50a8783e" Namespace="calico-system" Pod="csi-node-driver-nsjjr" WorkloadEndpoint="localhost-k8s-csi--node--driver--nsjjr-" Feb 12 20:28:04.497715 env[1123]: 2024-02-12 20:28:04.378 [INFO][3519] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="8225bf0ec94ab5cbab1d5049df760c33a4ae2594fdcfaee532de65fc50a8783e" Namespace="calico-system" Pod="csi-node-driver-nsjjr" WorkloadEndpoint="localhost-k8s-csi--node--driver--nsjjr-eth0" Feb 12 20:28:04.497715 env[1123]: 2024-02-12 20:28:04.414 [INFO][3534] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8225bf0ec94ab5cbab1d5049df760c33a4ae2594fdcfaee532de65fc50a8783e" HandleID="k8s-pod-network.8225bf0ec94ab5cbab1d5049df760c33a4ae2594fdcfaee532de65fc50a8783e" Workload="localhost-k8s-csi--node--driver--nsjjr-eth0" Feb 12 20:28:04.497715 env[1123]: 2024-02-12 20:28:04.440 [INFO][3534] ipam_plugin.go 268: Auto assigning IP ContainerID="8225bf0ec94ab5cbab1d5049df760c33a4ae2594fdcfaee532de65fc50a8783e" HandleID="k8s-pod-network.8225bf0ec94ab5cbab1d5049df760c33a4ae2594fdcfaee532de65fc50a8783e" Workload="localhost-k8s-csi--node--driver--nsjjr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029f7f0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-nsjjr", "timestamp":"2024-02-12 20:28:04.414684703 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:28:04.497715 env[1123]: 2024-02-12 20:28:04.440 [INFO][3534] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:28:04.497715 env[1123]: 2024-02-12 20:28:04.441 [INFO][3534] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:28:04.497715 env[1123]: 2024-02-12 20:28:04.441 [INFO][3534] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 20:28:04.497715 env[1123]: 2024-02-12 20:28:04.442 [INFO][3534] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8225bf0ec94ab5cbab1d5049df760c33a4ae2594fdcfaee532de65fc50a8783e" host="localhost" Feb 12 20:28:04.497715 env[1123]: 2024-02-12 20:28:04.445 [INFO][3534] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 20:28:04.497715 env[1123]: 2024-02-12 20:28:04.448 [INFO][3534] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 20:28:04.497715 env[1123]: 2024-02-12 20:28:04.450 [INFO][3534] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 20:28:04.497715 env[1123]: 2024-02-12 20:28:04.452 [INFO][3534] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 20:28:04.497715 env[1123]: 2024-02-12 20:28:04.452 [INFO][3534] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.8225bf0ec94ab5cbab1d5049df760c33a4ae2594fdcfaee532de65fc50a8783e" host="localhost" Feb 12 20:28:04.497715 env[1123]: 2024-02-12 20:28:04.453 [INFO][3534] ipam.go 1682: Creating new handle: k8s-pod-network.8225bf0ec94ab5cbab1d5049df760c33a4ae2594fdcfaee532de65fc50a8783e Feb 12 20:28:04.497715 env[1123]: 2024-02-12 20:28:04.456 [INFO][3534] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.8225bf0ec94ab5cbab1d5049df760c33a4ae2594fdcfaee532de65fc50a8783e" host="localhost" Feb 12 20:28:04.497715 env[1123]: 2024-02-12 20:28:04.463 [INFO][3534] ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.8225bf0ec94ab5cbab1d5049df760c33a4ae2594fdcfaee532de65fc50a8783e" host="localhost" Feb 12 20:28:04.497715 env[1123]: 2024-02-12 20:28:04.463 [INFO][3534] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.8225bf0ec94ab5cbab1d5049df760c33a4ae2594fdcfaee532de65fc50a8783e" host="localhost" Feb 12 20:28:04.497715 env[1123]: 2024-02-12 20:28:04.463 [INFO][3534] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:28:04.497715 env[1123]: 2024-02-12 20:28:04.463 [INFO][3534] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="8225bf0ec94ab5cbab1d5049df760c33a4ae2594fdcfaee532de65fc50a8783e" HandleID="k8s-pod-network.8225bf0ec94ab5cbab1d5049df760c33a4ae2594fdcfaee532de65fc50a8783e" Workload="localhost-k8s-csi--node--driver--nsjjr-eth0" Feb 12 20:28:04.498879 env[1123]: 2024-02-12 20:28:04.465 [INFO][3519] k8s.go 385: Populated endpoint ContainerID="8225bf0ec94ab5cbab1d5049df760c33a4ae2594fdcfaee532de65fc50a8783e" Namespace="calico-system" Pod="csi-node-driver-nsjjr" WorkloadEndpoint="localhost-k8s-csi--node--driver--nsjjr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--nsjjr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"00b3219e-c931-4bc8-a2f8-45793aef6eec", ResourceVersion:"826", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 27, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-nsjjr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali53348347bdb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:28:04.498879 env[1123]: 2024-02-12 20:28:04.465 [INFO][3519] k8s.go 386: Calico CNI using IPs: [192.168.88.130/32] ContainerID="8225bf0ec94ab5cbab1d5049df760c33a4ae2594fdcfaee532de65fc50a8783e" Namespace="calico-system" Pod="csi-node-driver-nsjjr" WorkloadEndpoint="localhost-k8s-csi--node--driver--nsjjr-eth0" Feb 12 20:28:04.498879 env[1123]: 2024-02-12 20:28:04.465 [INFO][3519] dataplane_linux.go 68: Setting the host side veth name to cali53348347bdb ContainerID="8225bf0ec94ab5cbab1d5049df760c33a4ae2594fdcfaee532de65fc50a8783e" Namespace="calico-system" Pod="csi-node-driver-nsjjr" WorkloadEndpoint="localhost-k8s-csi--node--driver--nsjjr-eth0" Feb 12 20:28:04.498879 env[1123]: 2024-02-12 20:28:04.468 [INFO][3519] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="8225bf0ec94ab5cbab1d5049df760c33a4ae2594fdcfaee532de65fc50a8783e" Namespace="calico-system" Pod="csi-node-driver-nsjjr" WorkloadEndpoint="localhost-k8s-csi--node--driver--nsjjr-eth0" Feb 12 20:28:04.498879 env[1123]: 2024-02-12 20:28:04.468 [INFO][3519] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="8225bf0ec94ab5cbab1d5049df760c33a4ae2594fdcfaee532de65fc50a8783e" Namespace="calico-system" Pod="csi-node-driver-nsjjr" WorkloadEndpoint="localhost-k8s-csi--node--driver--nsjjr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--nsjjr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"00b3219e-c931-4bc8-a2f8-45793aef6eec", ResourceVersion:"826", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 27, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8225bf0ec94ab5cbab1d5049df760c33a4ae2594fdcfaee532de65fc50a8783e", Pod:"csi-node-driver-nsjjr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali53348347bdb", MAC:"46:46:07:66:99:e2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:28:04.498879 env[1123]: 2024-02-12 20:28:04.496 [INFO][3519] k8s.go 491: Wrote updated endpoint to datastore ContainerID="8225bf0ec94ab5cbab1d5049df760c33a4ae2594fdcfaee532de65fc50a8783e" Namespace="calico-system" Pod="csi-node-driver-nsjjr" WorkloadEndpoint="localhost-k8s-csi--node--driver--nsjjr-eth0" Feb 12 20:28:04.512802 env[1123]: time="2024-02-12T20:28:04.512711048Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:28:04.512802 env[1123]: time="2024-02-12T20:28:04.512765290Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:28:04.512802 env[1123]: time="2024-02-12T20:28:04.512776741Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:28:04.513078 env[1123]: time="2024-02-12T20:28:04.512950217Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8225bf0ec94ab5cbab1d5049df760c33a4ae2594fdcfaee532de65fc50a8783e pid=3561 runtime=io.containerd.runc.v2 Feb 12 20:28:04.526429 systemd[1]: Started cri-containerd-8225bf0ec94ab5cbab1d5049df760c33a4ae2594fdcfaee532de65fc50a8783e.scope. Feb 12 20:28:04.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.534000 audit: BPF prog-id=156 op=LOAD Feb 12 20:28:04.535000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.535000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001cdc48 a2=10 a3=1c items=0 ppid=3561 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:04.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832323562663065633934616235636261623164353034396466373630 Feb 12 20:28:04.535000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.535000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001cd6b0 a2=3c a3=c items=0 ppid=3561 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:04.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832323562663065633934616235636261623164353034396466373630 Feb 12 20:28:04.535000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.535000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.535000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.535000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.535000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.535000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.535000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.535000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.535000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.535000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.535000 audit: BPF prog-id=157 op=LOAD Feb 12 20:28:04.535000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001cd9d8 a2=78 a3=c0003c44d0 items=0 ppid=3561 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:04.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832323562663065633934616235636261623164353034396466373630 Feb 12 20:28:04.535000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.535000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.535000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.535000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.535000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.535000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.535000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.535000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.535000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.535000 audit: BPF prog-id=158 op=LOAD Feb 12 20:28:04.535000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001cd770 a2=78 a3=c0003c4518 items=0 ppid=3561 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:04.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832323562663065633934616235636261623164353034396466373630 Feb 12 20:28:04.535000 audit: BPF prog-id=158 op=UNLOAD Feb 12 20:28:04.535000 audit: BPF prog-id=157 op=UNLOAD Feb 12 20:28:04.535000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.535000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.535000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.535000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.535000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.535000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.535000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.535000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.535000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.535000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.535000 audit: BPF prog-id=159 op=LOAD Feb 12 20:28:04.535000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001cdc30 a2=78 a3=c0003c4928 items=0 ppid=3561 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:04.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832323562663065633934616235636261623164353034396466373630 Feb 12 20:28:04.540055 systemd-resolved[1066]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 20:28:04.549837 env[1123]: time="2024-02-12T20:28:04.549716641Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nsjjr,Uid:00b3219e-c931-4bc8-a2f8-45793aef6eec,Namespace:calico-system,Attempt:1,} returns sandbox id \"8225bf0ec94ab5cbab1d5049df760c33a4ae2594fdcfaee532de65fc50a8783e\"" Feb 12 20:28:04.554646 env[1123]: time="2024-02-12T20:28:04.554582775Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 20:28:04.685160 systemd-networkd[1018]: cali8fea960e7ff: Gained IPv6LL Feb 12 20:28:04.786012 kubelet[2014]: I0212 20:28:04.785729 2014 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 20:28:04.787258 kubelet[2014]: E0212 20:28:04.786307 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:28:04.850000 audit[3619]: NETFILTER_CFG table=filter:99 family=2 entries=9 op=nft_register_rule pid=3619 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:04.850000 audit[3619]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff9abcde90 a2=0 a3=7fff9abcde7c items=0 ppid=2173 pid=3619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:04.850000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:04.852000 audit[3619]: NETFILTER_CFG table=nat:100 family=2 entries=25 op=nft_register_chain pid=3619 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:04.852000 audit[3619]: SYSCALL arch=c000003e syscall=46 success=yes exit=8252 a0=3 a1=7fff9abcde90 a2=0 a3=7fff9abcde7c items=0 ppid=2173 pid=3619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:04.852000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:05.265687 env[1123]: time="2024-02-12T20:28:05.265645636Z" level=info msg="StopPodSandbox for \"2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd\"" Feb 12 20:28:05.337617 env[1123]: 2024-02-12 20:28:05.300 [INFO][3655] k8s.go 578: Cleaning up netns ContainerID="2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" Feb 12 20:28:05.337617 env[1123]: 2024-02-12 20:28:05.301 [INFO][3655] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" iface="eth0" netns="/var/run/netns/cni-f84f1713-34b9-1afb-4418-1585c7b508dc" Feb 12 20:28:05.337617 env[1123]: 2024-02-12 20:28:05.301 [INFO][3655] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" iface="eth0" netns="/var/run/netns/cni-f84f1713-34b9-1afb-4418-1585c7b508dc" Feb 12 20:28:05.337617 env[1123]: 2024-02-12 20:28:05.301 [INFO][3655] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" iface="eth0" netns="/var/run/netns/cni-f84f1713-34b9-1afb-4418-1585c7b508dc" Feb 12 20:28:05.337617 env[1123]: 2024-02-12 20:28:05.301 [INFO][3655] k8s.go 585: Releasing IP address(es) ContainerID="2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" Feb 12 20:28:05.337617 env[1123]: 2024-02-12 20:28:05.301 [INFO][3655] utils.go 188: Calico CNI releasing IP address ContainerID="2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" Feb 12 20:28:05.337617 env[1123]: 2024-02-12 20:28:05.316 [INFO][3663] ipam_plugin.go 415: Releasing address using handleID ContainerID="2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" HandleID="k8s-pod-network.2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" Workload="localhost-k8s-calico--kube--controllers--6485779877--6hgzc-eth0" Feb 12 20:28:05.337617 env[1123]: 2024-02-12 20:28:05.316 [INFO][3663] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:28:05.337617 env[1123]: 2024-02-12 20:28:05.316 [INFO][3663] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:28:05.337617 env[1123]: 2024-02-12 20:28:05.334 [WARNING][3663] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" HandleID="k8s-pod-network.2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" Workload="localhost-k8s-calico--kube--controllers--6485779877--6hgzc-eth0" Feb 12 20:28:05.337617 env[1123]: 2024-02-12 20:28:05.334 [INFO][3663] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" HandleID="k8s-pod-network.2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" Workload="localhost-k8s-calico--kube--controllers--6485779877--6hgzc-eth0" Feb 12 20:28:05.337617 env[1123]: 2024-02-12 20:28:05.335 [INFO][3663] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:28:05.337617 env[1123]: 2024-02-12 20:28:05.336 [INFO][3655] k8s.go 591: Teardown processing complete. ContainerID="2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" Feb 12 20:28:05.338152 env[1123]: time="2024-02-12T20:28:05.337764705Z" level=info msg="TearDown network for sandbox \"2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd\" successfully" Feb 12 20:28:05.338152 env[1123]: time="2024-02-12T20:28:05.337795953Z" level=info msg="StopPodSandbox for \"2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd\" returns successfully" Feb 12 20:28:05.338478 env[1123]: time="2024-02-12T20:28:05.338454039Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6485779877-6hgzc,Uid:f20680ef-2022-4c0e-a8a5-9242b50af86d,Namespace:calico-system,Attempt:1,}" Feb 12 20:28:05.340116 systemd[1]: run-netns-cni\x2df84f1713\x2d34b9\x2d1afb\x2d4418\x2d1585c7b508dc.mount: Deactivated successfully. Feb 12 20:28:05.391416 kubelet[2014]: E0212 20:28:05.391389 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:28:05.391709 kubelet[2014]: E0212 20:28:05.391467 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:28:05.467418 systemd-networkd[1018]: cali79c41207e30: Link UP Feb 12 20:28:05.469062 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:28:05.469113 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali79c41207e30: link becomes ready Feb 12 20:28:05.469246 systemd-networkd[1018]: cali79c41207e30: Gained carrier Feb 12 20:28:05.479446 env[1123]: 2024-02-12 20:28:05.406 [INFO][3674] utils.go 100: File /var/lib/calico/mtu does not exist Feb 12 20:28:05.479446 env[1123]: 2024-02-12 20:28:05.417 [INFO][3674] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--6485779877--6hgzc-eth0 calico-kube-controllers-6485779877- calico-system f20680ef-2022-4c0e-a8a5-9242b50af86d 849 0 2024-02-12 20:27:35 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:6485779877 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-6485779877-6hgzc eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali79c41207e30 [] []}} ContainerID="1a1db3d7d99b74caab091c302daff54de115e3264f52c18a80e409461fafd9bb" Namespace="calico-system" Pod="calico-kube-controllers-6485779877-6hgzc" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6485779877--6hgzc-" Feb 12 20:28:05.479446 env[1123]: 2024-02-12 20:28:05.417 [INFO][3674] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="1a1db3d7d99b74caab091c302daff54de115e3264f52c18a80e409461fafd9bb" Namespace="calico-system" Pod="calico-kube-controllers-6485779877-6hgzc" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6485779877--6hgzc-eth0" Feb 12 20:28:05.479446 env[1123]: 2024-02-12 20:28:05.435 [INFO][3686] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1a1db3d7d99b74caab091c302daff54de115e3264f52c18a80e409461fafd9bb" HandleID="k8s-pod-network.1a1db3d7d99b74caab091c302daff54de115e3264f52c18a80e409461fafd9bb" Workload="localhost-k8s-calico--kube--controllers--6485779877--6hgzc-eth0" Feb 12 20:28:05.479446 env[1123]: 2024-02-12 20:28:05.445 [INFO][3686] ipam_plugin.go 268: Auto assigning IP ContainerID="1a1db3d7d99b74caab091c302daff54de115e3264f52c18a80e409461fafd9bb" HandleID="k8s-pod-network.1a1db3d7d99b74caab091c302daff54de115e3264f52c18a80e409461fafd9bb" Workload="localhost-k8s-calico--kube--controllers--6485779877--6hgzc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004b15c0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-6485779877-6hgzc", "timestamp":"2024-02-12 20:28:05.435880649 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:28:05.479446 env[1123]: 2024-02-12 20:28:05.445 [INFO][3686] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:28:05.479446 env[1123]: 2024-02-12 20:28:05.445 [INFO][3686] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:28:05.479446 env[1123]: 2024-02-12 20:28:05.445 [INFO][3686] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 20:28:05.479446 env[1123]: 2024-02-12 20:28:05.446 [INFO][3686] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1a1db3d7d99b74caab091c302daff54de115e3264f52c18a80e409461fafd9bb" host="localhost" Feb 12 20:28:05.479446 env[1123]: 2024-02-12 20:28:05.450 [INFO][3686] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 20:28:05.479446 env[1123]: 2024-02-12 20:28:05.453 [INFO][3686] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 20:28:05.479446 env[1123]: 2024-02-12 20:28:05.454 [INFO][3686] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 20:28:05.479446 env[1123]: 2024-02-12 20:28:05.456 [INFO][3686] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 20:28:05.479446 env[1123]: 2024-02-12 20:28:05.456 [INFO][3686] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.1a1db3d7d99b74caab091c302daff54de115e3264f52c18a80e409461fafd9bb" host="localhost" Feb 12 20:28:05.479446 env[1123]: 2024-02-12 20:28:05.457 [INFO][3686] ipam.go 1682: Creating new handle: k8s-pod-network.1a1db3d7d99b74caab091c302daff54de115e3264f52c18a80e409461fafd9bb Feb 12 20:28:05.479446 env[1123]: 2024-02-12 20:28:05.459 [INFO][3686] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.1a1db3d7d99b74caab091c302daff54de115e3264f52c18a80e409461fafd9bb" host="localhost" Feb 12 20:28:05.479446 env[1123]: 2024-02-12 20:28:05.464 [INFO][3686] ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.1a1db3d7d99b74caab091c302daff54de115e3264f52c18a80e409461fafd9bb" host="localhost" Feb 12 20:28:05.479446 env[1123]: 2024-02-12 20:28:05.464 [INFO][3686] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.1a1db3d7d99b74caab091c302daff54de115e3264f52c18a80e409461fafd9bb" host="localhost" Feb 12 20:28:05.479446 env[1123]: 2024-02-12 20:28:05.464 [INFO][3686] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:28:05.479446 env[1123]: 2024-02-12 20:28:05.464 [INFO][3686] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="1a1db3d7d99b74caab091c302daff54de115e3264f52c18a80e409461fafd9bb" HandleID="k8s-pod-network.1a1db3d7d99b74caab091c302daff54de115e3264f52c18a80e409461fafd9bb" Workload="localhost-k8s-calico--kube--controllers--6485779877--6hgzc-eth0" Feb 12 20:28:05.480185 env[1123]: 2024-02-12 20:28:05.465 [INFO][3674] k8s.go 385: Populated endpoint ContainerID="1a1db3d7d99b74caab091c302daff54de115e3264f52c18a80e409461fafd9bb" Namespace="calico-system" Pod="calico-kube-controllers-6485779877-6hgzc" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6485779877--6hgzc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6485779877--6hgzc-eth0", GenerateName:"calico-kube-controllers-6485779877-", Namespace:"calico-system", SelfLink:"", UID:"f20680ef-2022-4c0e-a8a5-9242b50af86d", ResourceVersion:"849", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 27, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6485779877", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-6485779877-6hgzc", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali79c41207e30", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:28:05.480185 env[1123]: 2024-02-12 20:28:05.466 [INFO][3674] k8s.go 386: Calico CNI using IPs: [192.168.88.131/32] ContainerID="1a1db3d7d99b74caab091c302daff54de115e3264f52c18a80e409461fafd9bb" Namespace="calico-system" Pod="calico-kube-controllers-6485779877-6hgzc" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6485779877--6hgzc-eth0" Feb 12 20:28:05.480185 env[1123]: 2024-02-12 20:28:05.466 [INFO][3674] dataplane_linux.go 68: Setting the host side veth name to cali79c41207e30 ContainerID="1a1db3d7d99b74caab091c302daff54de115e3264f52c18a80e409461fafd9bb" Namespace="calico-system" Pod="calico-kube-controllers-6485779877-6hgzc" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6485779877--6hgzc-eth0" Feb 12 20:28:05.480185 env[1123]: 2024-02-12 20:28:05.469 [INFO][3674] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="1a1db3d7d99b74caab091c302daff54de115e3264f52c18a80e409461fafd9bb" Namespace="calico-system" Pod="calico-kube-controllers-6485779877-6hgzc" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6485779877--6hgzc-eth0" Feb 12 20:28:05.480185 env[1123]: 2024-02-12 20:28:05.470 [INFO][3674] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="1a1db3d7d99b74caab091c302daff54de115e3264f52c18a80e409461fafd9bb" Namespace="calico-system" Pod="calico-kube-controllers-6485779877-6hgzc" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6485779877--6hgzc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6485779877--6hgzc-eth0", GenerateName:"calico-kube-controllers-6485779877-", Namespace:"calico-system", SelfLink:"", UID:"f20680ef-2022-4c0e-a8a5-9242b50af86d", ResourceVersion:"849", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 27, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6485779877", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1a1db3d7d99b74caab091c302daff54de115e3264f52c18a80e409461fafd9bb", Pod:"calico-kube-controllers-6485779877-6hgzc", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali79c41207e30", MAC:"8e:a5:ea:f3:b6:00", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:28:05.480185 env[1123]: 2024-02-12 20:28:05.477 [INFO][3674] k8s.go 491: Wrote updated endpoint to datastore ContainerID="1a1db3d7d99b74caab091c302daff54de115e3264f52c18a80e409461fafd9bb" Namespace="calico-system" Pod="calico-kube-controllers-6485779877-6hgzc" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6485779877--6hgzc-eth0" Feb 12 20:28:05.489736 env[1123]: time="2024-02-12T20:28:05.489668169Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:28:05.489736 env[1123]: time="2024-02-12T20:28:05.489703265Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:28:05.489736 env[1123]: time="2024-02-12T20:28:05.489712492Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:28:05.489937 env[1123]: time="2024-02-12T20:28:05.489822258Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1a1db3d7d99b74caab091c302daff54de115e3264f52c18a80e409461fafd9bb pid=3714 runtime=io.containerd.runc.v2 Feb 12 20:28:05.500754 systemd[1]: Started cri-containerd-1a1db3d7d99b74caab091c302daff54de115e3264f52c18a80e409461fafd9bb.scope. Feb 12 20:28:05.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.511000 audit: BPF prog-id=160 op=LOAD Feb 12 20:28:05.511000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.511000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3714 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:05.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161316462336437643939623734636161623039316333303264616666 Feb 12 20:28:05.511000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.511000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3714 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:05.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161316462336437643939623734636161623039316333303264616666 Feb 12 20:28:05.511000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.511000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.511000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.511000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.511000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.511000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.511000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.511000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.511000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.511000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.511000 audit: BPF prog-id=161 op=LOAD Feb 12 20:28:05.511000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001dfae0 items=0 ppid=3714 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:05.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161316462336437643939623734636161623039316333303264616666 Feb 12 20:28:05.512000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.512000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.512000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.512000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.512000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.512000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.512000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.512000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.512000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.512000 audit: BPF prog-id=162 op=LOAD Feb 12 20:28:05.512000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001dfb28 items=0 ppid=3714 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:05.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161316462336437643939623734636161623039316333303264616666 Feb 12 20:28:05.512000 audit: BPF prog-id=162 op=UNLOAD Feb 12 20:28:05.512000 audit: BPF prog-id=161 op=UNLOAD Feb 12 20:28:05.512000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.512000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.512000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.512000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.512000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.512000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.512000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.512000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.512000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.512000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.512000 audit: BPF prog-id=163 op=LOAD Feb 12 20:28:05.512000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001dff38 items=0 ppid=3714 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:05.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161316462336437643939623734636161623039316333303264616666 Feb 12 20:28:05.518622 systemd-resolved[1066]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 20:28:05.543252 env[1123]: time="2024-02-12T20:28:05.543191502Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6485779877-6hgzc,Uid:f20680ef-2022-4c0e-a8a5-9242b50af86d,Namespace:calico-system,Attempt:1,} returns sandbox id \"1a1db3d7d99b74caab091c302daff54de115e3264f52c18a80e409461fafd9bb\"" Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit: BPF prog-id=164 op=LOAD Feb 12 20:28:05.755000 audit[3792]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffee57689c0 a2=70 a3=7f2e5087c000 items=0 ppid=3741 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:05.755000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:28:05.755000 audit: BPF prog-id=164 op=UNLOAD Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit: BPF prog-id=165 op=LOAD Feb 12 20:28:05.755000 audit[3792]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffee57689c0 a2=70 a3=6e items=0 ppid=3741 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:05.755000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:28:05.755000 audit: BPF prog-id=165 op=UNLOAD Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffee5768970 a2=70 a3=7ffee57689c0 items=0 ppid=3741 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:05.755000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit: BPF prog-id=166 op=LOAD Feb 12 20:28:05.755000 audit[3792]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffee5768950 a2=70 a3=7ffee57689c0 items=0 ppid=3741 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:05.755000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:28:05.755000 audit: BPF prog-id=166 op=UNLOAD Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee5768a30 a2=70 a3=0 items=0 ppid=3741 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:05.755000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee5768a20 a2=70 a3=0 items=0 ppid=3741 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:05.755000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffee5768a60 a2=70 a3=0 items=0 ppid=3741 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:05.755000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.755000 audit: BPF prog-id=167 op=LOAD Feb 12 20:28:05.755000 audit[3792]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffee5768980 a2=70 a3=ffffffff items=0 ppid=3741 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:05.755000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:28:05.761000 audit[3800]: AVC avc: denied { bpf } for pid=3800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.761000 audit[3800]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff80fbce30 a2=70 a3=208 items=0 ppid=3741 pid=3800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:05.761000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 20:28:05.764000 audit[3800]: AVC avc: denied { bpf } for pid=3800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:05.764000 audit[3800]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff80fbcd00 a2=70 a3=3 items=0 ppid=3741 pid=3800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:05.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 20:28:05.770000 audit: BPF prog-id=167 op=UNLOAD Feb 12 20:28:05.814000 audit[3830]: NETFILTER_CFG table=mangle:101 family=2 entries=19 op=nft_register_chain pid=3830 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:28:05.814000 audit[3830]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffd4fa22bc0 a2=0 a3=7ffd4fa22bac items=0 ppid=3741 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:05.814000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:28:05.817000 audit[3827]: NETFILTER_CFG table=raw:102 family=2 entries=19 op=nft_register_chain pid=3827 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:28:05.817000 audit[3827]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffe5069fa90 a2=0 a3=557a581e0000 items=0 ppid=3741 pid=3827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:05.817000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:28:05.824000 audit[3836]: NETFILTER_CFG table=nat:103 family=2 entries=16 op=nft_register_chain pid=3836 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:28:05.824000 audit[3836]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffc7934ec70 a2=0 a3=7ffc7934ec5c items=0 ppid=3741 pid=3836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:05.824000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:28:05.824000 audit[3829]: NETFILTER_CFG table=filter:104 family=2 entries=129 op=nft_register_chain pid=3829 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:28:05.824000 audit[3829]: SYSCALL arch=c000003e syscall=46 success=yes exit=70188 a0=3 a1=7fffa3b101f0 a2=0 a3=5623959c6000 items=0 ppid=3741 pid=3829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:05.824000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:28:06.229050 systemd-networkd[1018]: cali53348347bdb: Gained IPv6LL Feb 12 20:28:06.265506 env[1123]: time="2024-02-12T20:28:06.265460107Z" level=info msg="StopPodSandbox for \"6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e\"" Feb 12 20:28:06.346731 env[1123]: 2024-02-12 20:28:06.305 [INFO][3864] k8s.go 578: Cleaning up netns ContainerID="6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" Feb 12 20:28:06.346731 env[1123]: 2024-02-12 20:28:06.305 [INFO][3864] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" iface="eth0" netns="/var/run/netns/cni-09666bf0-9ef5-9694-0c0b-f943f55881d7" Feb 12 20:28:06.346731 env[1123]: 2024-02-12 20:28:06.306 [INFO][3864] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" iface="eth0" netns="/var/run/netns/cni-09666bf0-9ef5-9694-0c0b-f943f55881d7" Feb 12 20:28:06.346731 env[1123]: 2024-02-12 20:28:06.306 [INFO][3864] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" iface="eth0" netns="/var/run/netns/cni-09666bf0-9ef5-9694-0c0b-f943f55881d7" Feb 12 20:28:06.346731 env[1123]: 2024-02-12 20:28:06.306 [INFO][3864] k8s.go 585: Releasing IP address(es) ContainerID="6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" Feb 12 20:28:06.346731 env[1123]: 2024-02-12 20:28:06.306 [INFO][3864] utils.go 188: Calico CNI releasing IP address ContainerID="6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" Feb 12 20:28:06.346731 env[1123]: 2024-02-12 20:28:06.326 [INFO][3871] ipam_plugin.go 415: Releasing address using handleID ContainerID="6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" HandleID="k8s-pod-network.6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" Workload="localhost-k8s-coredns--5d78c9869d--db2k2-eth0" Feb 12 20:28:06.346731 env[1123]: 2024-02-12 20:28:06.326 [INFO][3871] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:28:06.346731 env[1123]: 2024-02-12 20:28:06.326 [INFO][3871] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:28:06.346731 env[1123]: 2024-02-12 20:28:06.335 [WARNING][3871] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" HandleID="k8s-pod-network.6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" Workload="localhost-k8s-coredns--5d78c9869d--db2k2-eth0" Feb 12 20:28:06.346731 env[1123]: 2024-02-12 20:28:06.335 [INFO][3871] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" HandleID="k8s-pod-network.6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" Workload="localhost-k8s-coredns--5d78c9869d--db2k2-eth0" Feb 12 20:28:06.346731 env[1123]: 2024-02-12 20:28:06.337 [INFO][3871] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:28:06.346731 env[1123]: 2024-02-12 20:28:06.338 [INFO][3864] k8s.go 591: Teardown processing complete. ContainerID="6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" Feb 12 20:28:06.346731 env[1123]: time="2024-02-12T20:28:06.340895664Z" level=info msg="TearDown network for sandbox \"6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e\" successfully" Feb 12 20:28:06.346731 env[1123]: time="2024-02-12T20:28:06.340936491Z" level=info msg="StopPodSandbox for \"6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e\" returns successfully" Feb 12 20:28:06.346731 env[1123]: time="2024-02-12T20:28:06.342019283Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-db2k2,Uid:fe848169-925a-4abf-a1a7-19c637d4a173,Namespace:kube-system,Attempt:1,}" Feb 12 20:28:06.345208 systemd[1]: run-netns-cni\x2d09666bf0\x2d9ef5\x2d9694\x2d0c0b\x2df943f55881d7.mount: Deactivated successfully. Feb 12 20:28:06.347679 kubelet[2014]: E0212 20:28:06.341296 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:28:06.356818 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1372767045.mount: Deactivated successfully. Feb 12 20:28:06.394995 kubelet[2014]: E0212 20:28:06.394570 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:28:06.516043 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calieefbdd98d68: link becomes ready Feb 12 20:28:06.513796 systemd-networkd[1018]: calieefbdd98d68: Link UP Feb 12 20:28:06.516599 systemd-networkd[1018]: calieefbdd98d68: Gained carrier Feb 12 20:28:06.524988 env[1123]: 2024-02-12 20:28:06.447 [INFO][3882] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5d78c9869d--db2k2-eth0 coredns-5d78c9869d- kube-system fe848169-925a-4abf-a1a7-19c637d4a173 859 0 2024-02-12 20:27:30 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5d78c9869d-db2k2 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calieefbdd98d68 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="4b9c9ebc2db2bc30d20d1d7b4c2a198a8d599d9227250b648285aeabfe8dbc21" Namespace="kube-system" Pod="coredns-5d78c9869d-db2k2" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--db2k2-" Feb 12 20:28:06.524988 env[1123]: 2024-02-12 20:28:06.447 [INFO][3882] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="4b9c9ebc2db2bc30d20d1d7b4c2a198a8d599d9227250b648285aeabfe8dbc21" Namespace="kube-system" Pod="coredns-5d78c9869d-db2k2" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--db2k2-eth0" Feb 12 20:28:06.524988 env[1123]: 2024-02-12 20:28:06.470 [INFO][3897] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4b9c9ebc2db2bc30d20d1d7b4c2a198a8d599d9227250b648285aeabfe8dbc21" HandleID="k8s-pod-network.4b9c9ebc2db2bc30d20d1d7b4c2a198a8d599d9227250b648285aeabfe8dbc21" Workload="localhost-k8s-coredns--5d78c9869d--db2k2-eth0" Feb 12 20:28:06.524988 env[1123]: 2024-02-12 20:28:06.482 [INFO][3897] ipam_plugin.go 268: Auto assigning IP ContainerID="4b9c9ebc2db2bc30d20d1d7b4c2a198a8d599d9227250b648285aeabfe8dbc21" HandleID="k8s-pod-network.4b9c9ebc2db2bc30d20d1d7b4c2a198a8d599d9227250b648285aeabfe8dbc21" Workload="localhost-k8s-coredns--5d78c9869d--db2k2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d5990), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5d78c9869d-db2k2", "timestamp":"2024-02-12 20:28:06.470348888 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:28:06.524988 env[1123]: 2024-02-12 20:28:06.483 [INFO][3897] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:28:06.524988 env[1123]: 2024-02-12 20:28:06.483 [INFO][3897] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:28:06.524988 env[1123]: 2024-02-12 20:28:06.483 [INFO][3897] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 20:28:06.524988 env[1123]: 2024-02-12 20:28:06.484 [INFO][3897] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4b9c9ebc2db2bc30d20d1d7b4c2a198a8d599d9227250b648285aeabfe8dbc21" host="localhost" Feb 12 20:28:06.524988 env[1123]: 2024-02-12 20:28:06.488 [INFO][3897] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 20:28:06.524988 env[1123]: 2024-02-12 20:28:06.495 [INFO][3897] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 20:28:06.524988 env[1123]: 2024-02-12 20:28:06.497 [INFO][3897] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 20:28:06.524988 env[1123]: 2024-02-12 20:28:06.499 [INFO][3897] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 20:28:06.524988 env[1123]: 2024-02-12 20:28:06.499 [INFO][3897] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.4b9c9ebc2db2bc30d20d1d7b4c2a198a8d599d9227250b648285aeabfe8dbc21" host="localhost" Feb 12 20:28:06.524988 env[1123]: 2024-02-12 20:28:06.500 [INFO][3897] ipam.go 1682: Creating new handle: k8s-pod-network.4b9c9ebc2db2bc30d20d1d7b4c2a198a8d599d9227250b648285aeabfe8dbc21 Feb 12 20:28:06.524988 env[1123]: 2024-02-12 20:28:06.504 [INFO][3897] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.4b9c9ebc2db2bc30d20d1d7b4c2a198a8d599d9227250b648285aeabfe8dbc21" host="localhost" Feb 12 20:28:06.524988 env[1123]: 2024-02-12 20:28:06.508 [INFO][3897] ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.4b9c9ebc2db2bc30d20d1d7b4c2a198a8d599d9227250b648285aeabfe8dbc21" host="localhost" Feb 12 20:28:06.524988 env[1123]: 2024-02-12 20:28:06.508 [INFO][3897] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.4b9c9ebc2db2bc30d20d1d7b4c2a198a8d599d9227250b648285aeabfe8dbc21" host="localhost" Feb 12 20:28:06.524988 env[1123]: 2024-02-12 20:28:06.508 [INFO][3897] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:28:06.524988 env[1123]: 2024-02-12 20:28:06.508 [INFO][3897] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="4b9c9ebc2db2bc30d20d1d7b4c2a198a8d599d9227250b648285aeabfe8dbc21" HandleID="k8s-pod-network.4b9c9ebc2db2bc30d20d1d7b4c2a198a8d599d9227250b648285aeabfe8dbc21" Workload="localhost-k8s-coredns--5d78c9869d--db2k2-eth0" Feb 12 20:28:06.525543 env[1123]: 2024-02-12 20:28:06.511 [INFO][3882] k8s.go 385: Populated endpoint ContainerID="4b9c9ebc2db2bc30d20d1d7b4c2a198a8d599d9227250b648285aeabfe8dbc21" Namespace="kube-system" Pod="coredns-5d78c9869d-db2k2" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--db2k2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--db2k2-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"fe848169-925a-4abf-a1a7-19c637d4a173", ResourceVersion:"859", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 27, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5d78c9869d-db2k2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calieefbdd98d68", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:28:06.525543 env[1123]: 2024-02-12 20:28:06.511 [INFO][3882] k8s.go 386: Calico CNI using IPs: [192.168.88.132/32] ContainerID="4b9c9ebc2db2bc30d20d1d7b4c2a198a8d599d9227250b648285aeabfe8dbc21" Namespace="kube-system" Pod="coredns-5d78c9869d-db2k2" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--db2k2-eth0" Feb 12 20:28:06.525543 env[1123]: 2024-02-12 20:28:06.511 [INFO][3882] dataplane_linux.go 68: Setting the host side veth name to calieefbdd98d68 ContainerID="4b9c9ebc2db2bc30d20d1d7b4c2a198a8d599d9227250b648285aeabfe8dbc21" Namespace="kube-system" Pod="coredns-5d78c9869d-db2k2" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--db2k2-eth0" Feb 12 20:28:06.525543 env[1123]: 2024-02-12 20:28:06.514 [INFO][3882] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="4b9c9ebc2db2bc30d20d1d7b4c2a198a8d599d9227250b648285aeabfe8dbc21" Namespace="kube-system" Pod="coredns-5d78c9869d-db2k2" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--db2k2-eth0" Feb 12 20:28:06.525543 env[1123]: 2024-02-12 20:28:06.514 [INFO][3882] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="4b9c9ebc2db2bc30d20d1d7b4c2a198a8d599d9227250b648285aeabfe8dbc21" Namespace="kube-system" Pod="coredns-5d78c9869d-db2k2" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--db2k2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--db2k2-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"fe848169-925a-4abf-a1a7-19c637d4a173", ResourceVersion:"859", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 27, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4b9c9ebc2db2bc30d20d1d7b4c2a198a8d599d9227250b648285aeabfe8dbc21", Pod:"coredns-5d78c9869d-db2k2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calieefbdd98d68", MAC:"96:16:7c:4f:fe:54", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:28:06.525543 env[1123]: 2024-02-12 20:28:06.522 [INFO][3882] k8s.go 491: Wrote updated endpoint to datastore ContainerID="4b9c9ebc2db2bc30d20d1d7b4c2a198a8d599d9227250b648285aeabfe8dbc21" Namespace="kube-system" Pod="coredns-5d78c9869d-db2k2" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--db2k2-eth0" Feb 12 20:28:06.573002 kernel: kauditd_printk_skb: 365 callbacks suppressed Feb 12 20:28:06.573151 kernel: audit: type=1325 audit(1707769686.564:1319): table=filter:105 family=2 entries=38 op=nft_register_chain pid=3925 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:28:06.573186 kernel: audit: type=1300 audit(1707769686.564:1319): arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7ffd43616670 a2=0 a3=7ffd4361665c items=0 ppid=3741 pid=3925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:06.573225 kernel: audit: type=1327 audit(1707769686.564:1319): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:28:06.564000 audit[3925]: NETFILTER_CFG table=filter:105 family=2 entries=38 op=nft_register_chain pid=3925 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:28:06.564000 audit[3925]: SYSCALL arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7ffd43616670 a2=0 a3=7ffd4361665c items=0 ppid=3741 pid=3925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:06.564000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:28:06.577080 env[1123]: time="2024-02-12T20:28:06.577013931Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:28:06.577080 env[1123]: time="2024-02-12T20:28:06.577076479Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:28:06.577472 env[1123]: time="2024-02-12T20:28:06.577097768Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:28:06.577472 env[1123]: time="2024-02-12T20:28:06.577352757Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4b9c9ebc2db2bc30d20d1d7b4c2a198a8d599d9227250b648285aeabfe8dbc21 pid=3927 runtime=io.containerd.runc.v2 Feb 12 20:28:06.605819 systemd[1]: Started cri-containerd-4b9c9ebc2db2bc30d20d1d7b4c2a198a8d599d9227250b648285aeabfe8dbc21.scope. Feb 12 20:28:06.622315 kernel: audit: type=1400 audit(1707769686.616:1320): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.622425 kernel: audit: type=1400 audit(1707769686.616:1321): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.622456 kernel: audit: type=1400 audit(1707769686.616:1322): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.630600 kernel: audit: type=1400 audit(1707769686.616:1323): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.630763 kernel: audit: type=1400 audit(1707769686.616:1324): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.634489 systemd-resolved[1066]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 20:28:06.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.639014 kernel: audit: type=1400 audit(1707769686.616:1325): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.643014 kernel: audit: type=1400 audit(1707769686.616:1326): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.621000 audit: BPF prog-id=168 op=LOAD Feb 12 20:28:06.622000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.622000 audit[3937]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3927 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:06.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462396339656263326462326263333064323064316437623463326131 Feb 12 20:28:06.622000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.622000 audit[3937]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3927 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:06.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462396339656263326462326263333064323064316437623463326131 Feb 12 20:28:06.622000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.622000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.622000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.622000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.622000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.622000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.622000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.622000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.622000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.622000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.622000 audit: BPF prog-id=169 op=LOAD Feb 12 20:28:06.622000 audit[3937]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00022a8c0 items=0 ppid=3927 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:06.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462396339656263326462326263333064323064316437623463326131 Feb 12 20:28:06.624000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.624000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.624000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.624000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.624000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.624000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.624000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.624000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.624000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.624000 audit: BPF prog-id=170 op=LOAD Feb 12 20:28:06.624000 audit[3937]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00022a908 items=0 ppid=3927 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:06.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462396339656263326462326263333064323064316437623463326131 Feb 12 20:28:06.629000 audit: BPF prog-id=170 op=UNLOAD Feb 12 20:28:06.629000 audit: BPF prog-id=169 op=UNLOAD Feb 12 20:28:06.629000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.629000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.629000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.629000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.629000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.629000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.629000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.629000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.629000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.629000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.629000 audit: BPF prog-id=171 op=LOAD Feb 12 20:28:06.629000 audit[3937]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00022ad18 items=0 ppid=3927 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:06.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462396339656263326462326263333064323064316437623463326131 Feb 12 20:28:06.666944 env[1123]: time="2024-02-12T20:28:06.666882488Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-db2k2,Uid:fe848169-925a-4abf-a1a7-19c637d4a173,Namespace:kube-system,Attempt:1,} returns sandbox id \"4b9c9ebc2db2bc30d20d1d7b4c2a198a8d599d9227250b648285aeabfe8dbc21\"" Feb 12 20:28:06.668438 kubelet[2014]: E0212 20:28:06.667899 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:28:06.670405 env[1123]: time="2024-02-12T20:28:06.670359204Z" level=info msg="CreateContainer within sandbox \"4b9c9ebc2db2bc30d20d1d7b4c2a198a8d599d9227250b648285aeabfe8dbc21\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 20:28:06.695247 systemd-networkd[1018]: vxlan.calico: Link UP Feb 12 20:28:06.695257 systemd-networkd[1018]: vxlan.calico: Gained carrier Feb 12 20:28:06.709098 env[1123]: time="2024-02-12T20:28:06.709042029Z" level=info msg="CreateContainer within sandbox \"4b9c9ebc2db2bc30d20d1d7b4c2a198a8d599d9227250b648285aeabfe8dbc21\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"466e3a0a39e782e1efaeaf5e62f0d959f2c0caf8e87534f540be62d8df655488\"" Feb 12 20:28:06.710987 env[1123]: time="2024-02-12T20:28:06.709740841Z" level=info msg="StartContainer for \"466e3a0a39e782e1efaeaf5e62f0d959f2c0caf8e87534f540be62d8df655488\"" Feb 12 20:28:06.731968 systemd[1]: Started cri-containerd-466e3a0a39e782e1efaeaf5e62f0d959f2c0caf8e87534f540be62d8df655488.scope. Feb 12 20:28:06.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit: BPF prog-id=172 op=LOAD Feb 12 20:28:06.747000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit[3969]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3927 pid=3969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:06.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436366533613061333965373832653165666165616635653632663064 Feb 12 20:28:06.747000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit[3969]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=3927 pid=3969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:06.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436366533613061333965373832653165666165616635653632663064 Feb 12 20:28:06.747000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit: BPF prog-id=173 op=LOAD Feb 12 20:28:06.747000 audit[3969]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00029a3a0 items=0 ppid=3927 pid=3969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:06.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436366533613061333965373832653165666165616635653632663064 Feb 12 20:28:06.747000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit: BPF prog-id=174 op=LOAD Feb 12 20:28:06.747000 audit[3969]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00029a3e8 items=0 ppid=3927 pid=3969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:06.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436366533613061333965373832653165666165616635653632663064 Feb 12 20:28:06.747000 audit: BPF prog-id=174 op=UNLOAD Feb 12 20:28:06.747000 audit: BPF prog-id=173 op=UNLOAD Feb 12 20:28:06.747000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:06.747000 audit: BPF prog-id=175 op=LOAD Feb 12 20:28:06.747000 audit[3969]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00029a7f8 items=0 ppid=3927 pid=3969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:06.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436366533613061333965373832653165666165616635653632663064 Feb 12 20:28:06.797083 systemd-networkd[1018]: cali79c41207e30: Gained IPv6LL Feb 12 20:28:06.945949 env[1123]: time="2024-02-12T20:28:06.945890927Z" level=info msg="StartContainer for \"466e3a0a39e782e1efaeaf5e62f0d959f2c0caf8e87534f540be62d8df655488\" returns successfully" Feb 12 20:28:06.984206 systemd[1]: Started sshd@14-10.0.0.105:22-10.0.0.1:46900.service. Feb 12 20:28:06.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.105:22-10.0.0.1:46900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:28:07.024119 env[1123]: time="2024-02-12T20:28:07.024068940Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:07.023000 audit[4002]: USER_ACCT pid=4002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:07.025513 sshd[4002]: Accepted publickey for core from 10.0.0.1 port 46900 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:28:07.024000 audit[4002]: CRED_ACQ pid=4002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:07.024000 audit[4002]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd4d9bc70 a2=3 a3=0 items=0 ppid=1 pid=4002 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:07.024000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:28:07.026186 sshd[4002]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:28:07.027712 env[1123]: time="2024-02-12T20:28:07.027355398Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:07.029542 env[1123]: time="2024-02-12T20:28:07.029510092Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:07.030177 systemd-logind[1111]: New session 15 of user core. Feb 12 20:28:07.030939 systemd[1]: Started session-15.scope. Feb 12 20:28:07.032070 env[1123]: time="2024-02-12T20:28:07.032036003Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:07.032583 env[1123]: time="2024-02-12T20:28:07.032553013Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 12 20:28:07.033410 env[1123]: time="2024-02-12T20:28:07.033324722Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 12 20:28:07.034240 env[1123]: time="2024-02-12T20:28:07.034208551Z" level=info msg="CreateContainer within sandbox \"8225bf0ec94ab5cbab1d5049df760c33a4ae2594fdcfaee532de65fc50a8783e\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 20:28:07.035000 audit[4002]: USER_START pid=4002 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:07.036000 audit[4004]: CRED_ACQ pid=4004 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:07.051038 env[1123]: time="2024-02-12T20:28:07.050927500Z" level=info msg="CreateContainer within sandbox \"8225bf0ec94ab5cbab1d5049df760c33a4ae2594fdcfaee532de65fc50a8783e\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"0c463bf05c8c5dd1502c0c7b0cde2d7dee910fab11a45b376104fb04aadab8d0\"" Feb 12 20:28:07.051998 env[1123]: time="2024-02-12T20:28:07.051949057Z" level=info msg="StartContainer for \"0c463bf05c8c5dd1502c0c7b0cde2d7dee910fab11a45b376104fb04aadab8d0\"" Feb 12 20:28:07.066054 systemd[1]: Started cri-containerd-0c463bf05c8c5dd1502c0c7b0cde2d7dee910fab11a45b376104fb04aadab8d0.scope. Feb 12 20:28:07.085000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:07.085000 audit[4012]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f12f01afb38 items=0 ppid=3561 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:07.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063343633626630356338633564643135303263306337623063646532 Feb 12 20:28:07.085000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:07.085000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:07.085000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:07.085000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:07.085000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:07.085000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:07.085000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:07.085000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:07.085000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:07.085000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:07.085000 audit: BPF prog-id=176 op=LOAD Feb 12 20:28:07.085000 audit[4012]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000d5ba8 items=0 ppid=3561 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:07.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063343633626630356338633564643135303263306337623063646532 Feb 12 20:28:07.085000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:07.085000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:07.085000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:07.085000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:07.085000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:07.085000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:07.085000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:07.085000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:07.085000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:07.085000 audit: BPF prog-id=177 op=LOAD Feb 12 20:28:07.085000 audit[4012]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000d5bf8 items=0 ppid=3561 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:07.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063343633626630356338633564643135303263306337623063646532 Feb 12 20:28:07.085000 audit: BPF prog-id=177 op=UNLOAD Feb 12 20:28:07.085000 audit: BPF prog-id=176 op=UNLOAD Feb 12 20:28:07.085000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:07.085000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:07.085000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:07.085000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:07.085000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:07.085000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:07.085000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:07.085000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:07.085000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:07.085000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:07.085000 audit: BPF prog-id=178 op=LOAD Feb 12 20:28:07.085000 audit[4012]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000d5c88 items=0 ppid=3561 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:07.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063343633626630356338633564643135303263306337623063646532 Feb 12 20:28:07.100705 env[1123]: time="2024-02-12T20:28:07.100664349Z" level=info msg="StartContainer for \"0c463bf05c8c5dd1502c0c7b0cde2d7dee910fab11a45b376104fb04aadab8d0\" returns successfully" Feb 12 20:28:07.143187 sshd[4002]: pam_unix(sshd:session): session closed for user core Feb 12 20:28:07.143000 audit[4002]: USER_END pid=4002 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:07.143000 audit[4002]: CRED_DISP pid=4002 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:07.145569 systemd[1]: sshd@14-10.0.0.105:22-10.0.0.1:46900.service: Deactivated successfully. Feb 12 20:28:07.144000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.105:22-10.0.0.1:46900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:28:07.146268 systemd[1]: session-15.scope: Deactivated successfully. Feb 12 20:28:07.146868 systemd-logind[1111]: Session 15 logged out. Waiting for processes to exit. Feb 12 20:28:07.147571 systemd-logind[1111]: Removed session 15. Feb 12 20:28:07.398151 kubelet[2014]: E0212 20:28:07.397768 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:28:07.405275 kubelet[2014]: I0212 20:28:07.405245 2014 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-db2k2" podStartSLOduration=37.405209525 podCreationTimestamp="2024-02-12 20:27:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:28:07.404728121 +0000 UTC m=+50.218648782" watchObservedRunningTime="2024-02-12 20:28:07.405209525 +0000 UTC m=+50.219130156" Feb 12 20:28:07.418000 audit[4051]: NETFILTER_CFG table=filter:106 family=2 entries=8 op=nft_register_rule pid=4051 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:07.418000 audit[4051]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffce528fab0 a2=0 a3=7ffce528fa9c items=0 ppid=2173 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:07.418000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:07.421000 audit[4051]: NETFILTER_CFG table=nat:107 family=2 entries=44 op=nft_register_rule pid=4051 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:07.421000 audit[4051]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffce528fab0 a2=0 a3=7ffce528fa9c items=0 ppid=2173 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:07.421000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:07.428000 audit[4053]: NETFILTER_CFG table=filter:108 family=2 entries=8 op=nft_register_rule pid=4053 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:07.428000 audit[4053]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd25574780 a2=0 a3=7ffd2557476c items=0 ppid=2173 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:07.428000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:07.432000 audit[4053]: NETFILTER_CFG table=nat:109 family=2 entries=56 op=nft_register_chain pid=4053 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:07.432000 audit[4053]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7ffd25574780 a2=0 a3=7ffd2557476c items=0 ppid=2173 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:07.432000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:07.517024 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3353141892.mount: Deactivated successfully. Feb 12 20:28:08.205104 systemd-networkd[1018]: vxlan.calico: Gained IPv6LL Feb 12 20:28:08.333070 systemd-networkd[1018]: calieefbdd98d68: Gained IPv6LL Feb 12 20:28:08.402299 kubelet[2014]: E0212 20:28:08.402267 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:28:09.405127 kubelet[2014]: E0212 20:28:09.404786 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:28:12.146606 systemd[1]: Started sshd@15-10.0.0.105:22-10.0.0.1:46912.service. Feb 12 20:28:12.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.105:22-10.0.0.1:46912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:28:12.147522 kernel: kauditd_printk_skb: 173 callbacks suppressed Feb 12 20:28:12.147576 kernel: audit: type=1130 audit(1707769692.145:1375): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.105:22-10.0.0.1:46912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:28:12.231000 audit[4064]: USER_ACCT pid=4064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:12.233010 sshd[4064]: Accepted publickey for core from 10.0.0.1 port 46912 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:28:12.235354 sshd[4064]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:28:12.233000 audit[4064]: CRED_ACQ pid=4064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:12.238738 kernel: audit: type=1101 audit(1707769692.231:1376): pid=4064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:12.238812 kernel: audit: type=1103 audit(1707769692.233:1377): pid=4064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:12.238838 kernel: audit: type=1006 audit(1707769692.233:1378): pid=4064 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 12 20:28:12.239838 systemd-logind[1111]: New session 16 of user core. Feb 12 20:28:12.241030 systemd[1]: Started session-16.scope. Feb 12 20:28:12.233000 audit[4064]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8657f320 a2=3 a3=0 items=0 ppid=1 pid=4064 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:12.245152 kernel: audit: type=1300 audit(1707769692.233:1378): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8657f320 a2=3 a3=0 items=0 ppid=1 pid=4064 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:12.245302 kernel: audit: type=1327 audit(1707769692.233:1378): proctitle=737368643A20636F7265205B707269765D Feb 12 20:28:12.233000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:28:12.246000 audit[4064]: USER_START pid=4064 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:12.247000 audit[4066]: CRED_ACQ pid=4066 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:12.254116 kernel: audit: type=1105 audit(1707769692.246:1379): pid=4064 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:12.254176 kernel: audit: type=1103 audit(1707769692.247:1380): pid=4066 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:12.303058 env[1123]: time="2024-02-12T20:28:12.303015435Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:12.304828 env[1123]: time="2024-02-12T20:28:12.304794187Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:12.309093 env[1123]: time="2024-02-12T20:28:12.309074122Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:12.311360 env[1123]: time="2024-02-12T20:28:12.311342112Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:12.312050 env[1123]: time="2024-02-12T20:28:12.312029392Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 12 20:28:12.314174 env[1123]: time="2024-02-12T20:28:12.313848664Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 20:28:12.324044 env[1123]: time="2024-02-12T20:28:12.324001466Z" level=info msg="CreateContainer within sandbox \"1a1db3d7d99b74caab091c302daff54de115e3264f52c18a80e409461fafd9bb\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 12 20:28:12.336602 env[1123]: time="2024-02-12T20:28:12.336565784Z" level=info msg="CreateContainer within sandbox \"1a1db3d7d99b74caab091c302daff54de115e3264f52c18a80e409461fafd9bb\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"33751dfb0c88779b42a1ddb7194c517ba3a22fbf4abaa2c5c23350dec67ab64a\"" Feb 12 20:28:12.337588 env[1123]: time="2024-02-12T20:28:12.337567944Z" level=info msg="StartContainer for \"33751dfb0c88779b42a1ddb7194c517ba3a22fbf4abaa2c5c23350dec67ab64a\"" Feb 12 20:28:12.352151 systemd[1]: Started cri-containerd-33751dfb0c88779b42a1ddb7194c517ba3a22fbf4abaa2c5c23350dec67ab64a.scope. Feb 12 20:28:12.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.371287 kernel: audit: type=1400 audit(1707769692.365:1381): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.371357 kernel: audit: type=1400 audit(1707769692.365:1382): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.365000 audit: BPF prog-id=179 op=LOAD Feb 12 20:28:12.368000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.368000 audit[4085]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3714 pid=4085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:12.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333373531646662306338383737396234326131646462373139346335 Feb 12 20:28:12.368000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.368000 audit[4085]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3714 pid=4085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:12.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333373531646662306338383737396234326131646462373139346335 Feb 12 20:28:12.368000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.368000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.368000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.368000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.368000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.368000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.368000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.368000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.368000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.368000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.368000 audit: BPF prog-id=180 op=LOAD Feb 12 20:28:12.368000 audit[4085]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0002814a0 items=0 ppid=3714 pid=4085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:12.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333373531646662306338383737396234326131646462373139346335 Feb 12 20:28:12.370000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.370000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.370000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.370000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.370000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.370000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.370000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.370000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.370000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.370000 audit: BPF prog-id=181 op=LOAD Feb 12 20:28:12.370000 audit[4085]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0002814e8 items=0 ppid=3714 pid=4085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:12.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333373531646662306338383737396234326131646462373139346335 Feb 12 20:28:12.370000 audit: BPF prog-id=181 op=UNLOAD Feb 12 20:28:12.370000 audit: BPF prog-id=180 op=UNLOAD Feb 12 20:28:12.370000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.370000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.370000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.370000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.370000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.370000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.370000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.370000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.370000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.370000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:12.370000 audit: BPF prog-id=182 op=LOAD Feb 12 20:28:12.370000 audit[4085]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0002818f8 items=0 ppid=3714 pid=4085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:12.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333373531646662306338383737396234326131646462373139346335 Feb 12 20:28:12.417700 sshd[4064]: pam_unix(sshd:session): session closed for user core Feb 12 20:28:12.419000 audit[4064]: USER_END pid=4064 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:12.419000 audit[4064]: CRED_DISP pid=4064 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:12.421932 systemd[1]: sshd@15-10.0.0.105:22-10.0.0.1:46912.service: Deactivated successfully. Feb 12 20:28:12.422583 systemd[1]: session-16.scope: Deactivated successfully. Feb 12 20:28:12.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.105:22-10.0.0.1:46912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:28:12.423165 systemd-logind[1111]: Session 16 logged out. Waiting for processes to exit. Feb 12 20:28:12.423923 systemd-logind[1111]: Removed session 16. Feb 12 20:28:12.527260 env[1123]: time="2024-02-12T20:28:12.527184403Z" level=info msg="StartContainer for \"33751dfb0c88779b42a1ddb7194c517ba3a22fbf4abaa2c5c23350dec67ab64a\" returns successfully" Feb 12 20:28:12.541176 kubelet[2014]: I0212 20:28:12.540704 2014 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-6485779877-6hgzc" podStartSLOduration=30.772604422 podCreationTimestamp="2024-02-12 20:27:35 +0000 UTC" firstStartedPulling="2024-02-12 20:28:05.544366709 +0000 UTC m=+48.358287340" lastFinishedPulling="2024-02-12 20:28:12.312412483 +0000 UTC m=+55.126333124" observedRunningTime="2024-02-12 20:28:12.538669904 +0000 UTC m=+55.352590545" watchObservedRunningTime="2024-02-12 20:28:12.540650206 +0000 UTC m=+55.354570837" Feb 12 20:28:12.971000 audit[1881]: AVC avc: denied { watch } for pid=1881 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:28:12.971000 audit[1881]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00291b2f0 a2=fc6 a3=0 items=0 ppid=1746 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 key=(null) Feb 12 20:28:12.971000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:28:12.971000 audit[1881]: AVC avc: denied { watch } for pid=1881 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:28:12.971000 audit[1881]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002c87a00 a2=fc6 a3=0 items=0 ppid=1746 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 key=(null) Feb 12 20:28:12.971000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:28:13.682000 audit[1903]: AVC avc: denied { watch } for pid=1903 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c36,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:28:13.682000 audit[1903]: AVC avc: denied { watch } for pid=1903 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c36,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:28:13.682000 audit[1903]: AVC avc: denied { watch } for pid=1903 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c36,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:28:13.682000 audit[1903]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00c3fc260 a2=fc6 a3=0 items=0 ppid=1740 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c36,c831 key=(null) Feb 12 20:28:13.682000 audit[1903]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c008c2b320 a2=fc6 a3=0 items=0 ppid=1740 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c36,c831 key=(null) Feb 12 20:28:13.682000 audit[1903]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c008eec7e0 a2=fc6 a3=0 items=0 ppid=1740 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c36,c831 key=(null) Feb 12 20:28:13.682000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 20:28:13.682000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 20:28:13.682000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 20:28:13.690000 audit[1903]: AVC avc: denied { watch } for pid=1903 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c36,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:28:13.690000 audit[1903]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c009132b60 a2=fc6 a3=0 items=0 ppid=1740 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c36,c831 key=(null) Feb 12 20:28:13.690000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 20:28:13.690000 audit[1903]: AVC avc: denied { watch } for pid=1903 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c36,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:28:13.690000 audit[1903]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c008f41860 a2=fc6 a3=0 items=0 ppid=1740 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c36,c831 key=(null) Feb 12 20:28:13.690000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 20:28:13.703000 audit[1903]: AVC avc: denied { watch } for pid=1903 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=521018 scontext=system_u:system_r:svirt_lxc_net_t:s0:c36,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:28:13.703000 audit[1903]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c008f418c0 a2=fc6 a3=0 items=0 ppid=1740 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c36,c831 key=(null) Feb 12 20:28:13.703000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Feb 12 20:28:14.638590 kubelet[2014]: E0212 20:28:14.638566 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:28:14.794085 env[1123]: time="2024-02-12T20:28:14.794027973Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:14.796609 env[1123]: time="2024-02-12T20:28:14.796581368Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:14.798419 env[1123]: time="2024-02-12T20:28:14.798374843Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:14.799752 env[1123]: time="2024-02-12T20:28:14.799730662Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:14.800124 env[1123]: time="2024-02-12T20:28:14.800103093Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 12 20:28:14.801529 env[1123]: time="2024-02-12T20:28:14.801497718Z" level=info msg="CreateContainer within sandbox \"8225bf0ec94ab5cbab1d5049df760c33a4ae2594fdcfaee532de65fc50a8783e\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 20:28:14.816659 env[1123]: time="2024-02-12T20:28:14.816609208Z" level=info msg="CreateContainer within sandbox \"8225bf0ec94ab5cbab1d5049df760c33a4ae2594fdcfaee532de65fc50a8783e\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"b654975000294bd1f7f7d4aa2e7663f3cb480bb07225bc94cbbccd16ca9fbbc5\"" Feb 12 20:28:14.817221 env[1123]: time="2024-02-12T20:28:14.817193958Z" level=info msg="StartContainer for \"b654975000294bd1f7f7d4aa2e7663f3cb480bb07225bc94cbbccd16ca9fbbc5\"" Feb 12 20:28:14.834560 systemd[1]: Started cri-containerd-b654975000294bd1f7f7d4aa2e7663f3cb480bb07225bc94cbbccd16ca9fbbc5.scope. Feb 12 20:28:14.845000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:14.845000 audit[4166]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f34c8510c28 items=0 ppid=3561 pid=4166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:14.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236353439373530303032393462643166376637643461613265373636 Feb 12 20:28:14.845000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:14.845000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:14.845000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:14.845000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:14.845000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:14.845000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:14.845000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:14.845000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:14.845000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:14.845000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:14.845000 audit: BPF prog-id=183 op=LOAD Feb 12 20:28:14.845000 audit[4166]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003c43b8 items=0 ppid=3561 pid=4166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:14.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236353439373530303032393462643166376637643461613265373636 Feb 12 20:28:14.845000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:14.845000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:14.845000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:14.845000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:14.845000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:14.845000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:14.845000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:14.845000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:14.845000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:14.845000 audit: BPF prog-id=184 op=LOAD Feb 12 20:28:14.845000 audit[4166]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003c4408 items=0 ppid=3561 pid=4166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:14.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236353439373530303032393462643166376637643461613265373636 Feb 12 20:28:14.845000 audit: BPF prog-id=184 op=UNLOAD Feb 12 20:28:14.845000 audit: BPF prog-id=183 op=UNLOAD Feb 12 20:28:14.845000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:14.845000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:14.845000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:14.845000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:14.845000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:14.845000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:14.845000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:14.845000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:14.845000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:14.845000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:14.845000 audit: BPF prog-id=185 op=LOAD Feb 12 20:28:14.845000 audit[4166]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003c4498 items=0 ppid=3561 pid=4166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:14.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236353439373530303032393462643166376637643461613265373636 Feb 12 20:28:14.860099 env[1123]: time="2024-02-12T20:28:14.860049819Z" level=info msg="StartContainer for \"b654975000294bd1f7f7d4aa2e7663f3cb480bb07225bc94cbbccd16ca9fbbc5\" returns successfully" Feb 12 20:28:15.330007 kubelet[2014]: I0212 20:28:15.329976 2014 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 20:28:15.330170 kubelet[2014]: I0212 20:28:15.330127 2014 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 20:28:16.911000 audit[1881]: AVC avc: denied { watch } for pid=1881 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:28:16.911000 audit[1881]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bc1ee0 a2=fc6 a3=0 items=0 ppid=1746 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 key=(null) Feb 12 20:28:16.911000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:28:16.911000 audit[1881]: AVC avc: denied { watch } for pid=1881 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:28:16.911000 audit[1881]: AVC avc: denied { watch } for pid=1881 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:28:16.911000 audit[1881]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0029be5c0 a2=fc6 a3=0 items=0 ppid=1746 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 key=(null) Feb 12 20:28:16.911000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:28:16.911000 audit[1881]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000bc1f00 a2=fc6 a3=0 items=0 ppid=1746 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 key=(null) Feb 12 20:28:16.911000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:28:16.925000 audit[1881]: AVC avc: denied { watch } for pid=1881 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:28:16.925000 audit[1881]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c000bc1f20 a2=fc6 a3=0 items=0 ppid=1746 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c71,c956 key=(null) Feb 12 20:28:16.925000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:28:17.247407 env[1123]: time="2024-02-12T20:28:17.247269379Z" level=info msg="StopPodSandbox for \"0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e\"" Feb 12 20:28:17.315442 env[1123]: 2024-02-12 20:28:17.282 [WARNING][4222] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--nsjjr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"00b3219e-c931-4bc8-a2f8-45793aef6eec", ResourceVersion:"943", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 27, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8225bf0ec94ab5cbab1d5049df760c33a4ae2594fdcfaee532de65fc50a8783e", Pod:"csi-node-driver-nsjjr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali53348347bdb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:28:17.315442 env[1123]: 2024-02-12 20:28:17.283 [INFO][4222] k8s.go 578: Cleaning up netns ContainerID="0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" Feb 12 20:28:17.315442 env[1123]: 2024-02-12 20:28:17.283 [INFO][4222] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" iface="eth0" netns="" Feb 12 20:28:17.315442 env[1123]: 2024-02-12 20:28:17.283 [INFO][4222] k8s.go 585: Releasing IP address(es) ContainerID="0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" Feb 12 20:28:17.315442 env[1123]: 2024-02-12 20:28:17.283 [INFO][4222] utils.go 188: Calico CNI releasing IP address ContainerID="0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" Feb 12 20:28:17.315442 env[1123]: 2024-02-12 20:28:17.304 [INFO][4232] ipam_plugin.go 415: Releasing address using handleID ContainerID="0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" HandleID="k8s-pod-network.0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" Workload="localhost-k8s-csi--node--driver--nsjjr-eth0" Feb 12 20:28:17.315442 env[1123]: 2024-02-12 20:28:17.304 [INFO][4232] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:28:17.315442 env[1123]: 2024-02-12 20:28:17.304 [INFO][4232] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:28:17.315442 env[1123]: 2024-02-12 20:28:17.311 [WARNING][4232] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" HandleID="k8s-pod-network.0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" Workload="localhost-k8s-csi--node--driver--nsjjr-eth0" Feb 12 20:28:17.315442 env[1123]: 2024-02-12 20:28:17.311 [INFO][4232] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" HandleID="k8s-pod-network.0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" Workload="localhost-k8s-csi--node--driver--nsjjr-eth0" Feb 12 20:28:17.315442 env[1123]: 2024-02-12 20:28:17.312 [INFO][4232] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:28:17.315442 env[1123]: 2024-02-12 20:28:17.313 [INFO][4222] k8s.go 591: Teardown processing complete. ContainerID="0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" Feb 12 20:28:17.315878 env[1123]: time="2024-02-12T20:28:17.315473953Z" level=info msg="TearDown network for sandbox \"0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e\" successfully" Feb 12 20:28:17.315878 env[1123]: time="2024-02-12T20:28:17.315506286Z" level=info msg="StopPodSandbox for \"0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e\" returns successfully" Feb 12 20:28:17.316232 env[1123]: time="2024-02-12T20:28:17.316200685Z" level=info msg="RemovePodSandbox for \"0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e\"" Feb 12 20:28:17.316283 env[1123]: time="2024-02-12T20:28:17.316249889Z" level=info msg="Forcibly stopping sandbox \"0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e\"" Feb 12 20:28:17.381648 env[1123]: 2024-02-12 20:28:17.349 [WARNING][4255] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--nsjjr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"00b3219e-c931-4bc8-a2f8-45793aef6eec", ResourceVersion:"943", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 27, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8225bf0ec94ab5cbab1d5049df760c33a4ae2594fdcfaee532de65fc50a8783e", Pod:"csi-node-driver-nsjjr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali53348347bdb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:28:17.381648 env[1123]: 2024-02-12 20:28:17.350 [INFO][4255] k8s.go 578: Cleaning up netns ContainerID="0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" Feb 12 20:28:17.381648 env[1123]: 2024-02-12 20:28:17.350 [INFO][4255] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" iface="eth0" netns="" Feb 12 20:28:17.381648 env[1123]: 2024-02-12 20:28:17.350 [INFO][4255] k8s.go 585: Releasing IP address(es) ContainerID="0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" Feb 12 20:28:17.381648 env[1123]: 2024-02-12 20:28:17.350 [INFO][4255] utils.go 188: Calico CNI releasing IP address ContainerID="0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" Feb 12 20:28:17.381648 env[1123]: 2024-02-12 20:28:17.367 [INFO][4263] ipam_plugin.go 415: Releasing address using handleID ContainerID="0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" HandleID="k8s-pod-network.0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" Workload="localhost-k8s-csi--node--driver--nsjjr-eth0" Feb 12 20:28:17.381648 env[1123]: 2024-02-12 20:28:17.367 [INFO][4263] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:28:17.381648 env[1123]: 2024-02-12 20:28:17.368 [INFO][4263] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:28:17.381648 env[1123]: 2024-02-12 20:28:17.375 [WARNING][4263] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" HandleID="k8s-pod-network.0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" Workload="localhost-k8s-csi--node--driver--nsjjr-eth0" Feb 12 20:28:17.381648 env[1123]: 2024-02-12 20:28:17.375 [INFO][4263] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" HandleID="k8s-pod-network.0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" Workload="localhost-k8s-csi--node--driver--nsjjr-eth0" Feb 12 20:28:17.381648 env[1123]: 2024-02-12 20:28:17.377 [INFO][4263] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:28:17.381648 env[1123]: 2024-02-12 20:28:17.378 [INFO][4255] k8s.go 591: Teardown processing complete. ContainerID="0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e" Feb 12 20:28:17.382293 env[1123]: time="2024-02-12T20:28:17.381670106Z" level=info msg="TearDown network for sandbox \"0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e\" successfully" Feb 12 20:28:17.385415 env[1123]: time="2024-02-12T20:28:17.385372634Z" level=info msg="RemovePodSandbox \"0b3cbbcd74ab3b48e5760450c71ff1d0806450706220142a6b1766e41137fb8e\" returns successfully" Feb 12 20:28:17.386005 env[1123]: time="2024-02-12T20:28:17.385939928Z" level=info msg="StopPodSandbox for \"b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b\"" Feb 12 20:28:17.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.105:22-10.0.0.1:58004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:28:17.423884 systemd[1]: Started sshd@16-10.0.0.105:22-10.0.0.1:58004.service. Feb 12 20:28:17.428364 kernel: kauditd_printk_skb: 137 callbacks suppressed Feb 12 20:28:17.428573 kernel: audit: type=1130 audit(1707769697.423:1420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.105:22-10.0.0.1:58004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:28:17.455597 env[1123]: 2024-02-12 20:28:17.421 [WARNING][4287] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--zqxdv-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"206d9f1e-afed-41ff-b30c-add0fe51a3ee", ResourceVersion:"829", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 27, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a74d84b992f1a4b62e7a84ee1c7beb14f81700e1f8e5a5f60290b121edc186d5", Pod:"coredns-5d78c9869d-zqxdv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8fea960e7ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:28:17.455597 env[1123]: 2024-02-12 20:28:17.422 [INFO][4287] k8s.go 578: Cleaning up netns ContainerID="b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" Feb 12 20:28:17.455597 env[1123]: 2024-02-12 20:28:17.422 [INFO][4287] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" iface="eth0" netns="" Feb 12 20:28:17.455597 env[1123]: 2024-02-12 20:28:17.422 [INFO][4287] k8s.go 585: Releasing IP address(es) ContainerID="b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" Feb 12 20:28:17.455597 env[1123]: 2024-02-12 20:28:17.422 [INFO][4287] utils.go 188: Calico CNI releasing IP address ContainerID="b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" Feb 12 20:28:17.455597 env[1123]: 2024-02-12 20:28:17.444 [INFO][4296] ipam_plugin.go 415: Releasing address using handleID ContainerID="b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" HandleID="k8s-pod-network.b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" Workload="localhost-k8s-coredns--5d78c9869d--zqxdv-eth0" Feb 12 20:28:17.455597 env[1123]: 2024-02-12 20:28:17.444 [INFO][4296] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:28:17.455597 env[1123]: 2024-02-12 20:28:17.444 [INFO][4296] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:28:17.455597 env[1123]: 2024-02-12 20:28:17.451 [WARNING][4296] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" HandleID="k8s-pod-network.b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" Workload="localhost-k8s-coredns--5d78c9869d--zqxdv-eth0" Feb 12 20:28:17.455597 env[1123]: 2024-02-12 20:28:17.451 [INFO][4296] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" HandleID="k8s-pod-network.b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" Workload="localhost-k8s-coredns--5d78c9869d--zqxdv-eth0" Feb 12 20:28:17.455597 env[1123]: 2024-02-12 20:28:17.452 [INFO][4296] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:28:17.455597 env[1123]: 2024-02-12 20:28:17.453 [INFO][4287] k8s.go 591: Teardown processing complete. ContainerID="b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" Feb 12 20:28:17.456262 env[1123]: time="2024-02-12T20:28:17.455621720Z" level=info msg="TearDown network for sandbox \"b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b\" successfully" Feb 12 20:28:17.456262 env[1123]: time="2024-02-12T20:28:17.455660394Z" level=info msg="StopPodSandbox for \"b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b\" returns successfully" Feb 12 20:28:17.456262 env[1123]: time="2024-02-12T20:28:17.456179134Z" level=info msg="RemovePodSandbox for \"b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b\"" Feb 12 20:28:17.456262 env[1123]: time="2024-02-12T20:28:17.456204654Z" level=info msg="Forcibly stopping sandbox \"b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b\"" Feb 12 20:28:17.463000 audit[4297]: USER_ACCT pid=4297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:17.467047 sshd[4297]: Accepted publickey for core from 10.0.0.1 port 58004 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:28:17.467979 kernel: audit: type=1101 audit(1707769697.463:1421): pid=4297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:17.467000 audit[4297]: CRED_ACQ pid=4297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:17.471002 kernel: audit: type=1103 audit(1707769697.467:1422): pid=4297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:17.473036 kernel: audit: type=1006 audit(1707769697.470:1423): pid=4297 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 12 20:28:17.473078 kernel: audit: type=1300 audit(1707769697.470:1423): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed05122b0 a2=3 a3=0 items=0 ppid=1 pid=4297 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:17.470000 audit[4297]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed05122b0 a2=3 a3=0 items=0 ppid=1 pid=4297 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:17.470000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:28:17.476681 kernel: audit: type=1327 audit(1707769697.470:1423): proctitle=737368643A20636F7265205B707269765D Feb 12 20:28:17.476819 sshd[4297]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:28:17.482055 systemd[1]: Started session-17.scope. Feb 12 20:28:17.483100 systemd-logind[1111]: New session 17 of user core. Feb 12 20:28:17.488000 audit[4297]: USER_START pid=4297 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:17.491000 audit[4328]: CRED_ACQ pid=4328 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:17.495176 kernel: audit: type=1105 audit(1707769697.488:1424): pid=4297 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:17.495248 kernel: audit: type=1103 audit(1707769697.491:1425): pid=4328 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:17.518110 env[1123]: 2024-02-12 20:28:17.489 [WARNING][4321] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--zqxdv-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"206d9f1e-afed-41ff-b30c-add0fe51a3ee", ResourceVersion:"829", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 27, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a74d84b992f1a4b62e7a84ee1c7beb14f81700e1f8e5a5f60290b121edc186d5", Pod:"coredns-5d78c9869d-zqxdv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8fea960e7ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:28:17.518110 env[1123]: 2024-02-12 20:28:17.490 [INFO][4321] k8s.go 578: Cleaning up netns ContainerID="b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" Feb 12 20:28:17.518110 env[1123]: 2024-02-12 20:28:17.490 [INFO][4321] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" iface="eth0" netns="" Feb 12 20:28:17.518110 env[1123]: 2024-02-12 20:28:17.490 [INFO][4321] k8s.go 585: Releasing IP address(es) ContainerID="b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" Feb 12 20:28:17.518110 env[1123]: 2024-02-12 20:28:17.490 [INFO][4321] utils.go 188: Calico CNI releasing IP address ContainerID="b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" Feb 12 20:28:17.518110 env[1123]: 2024-02-12 20:28:17.506 [INFO][4329] ipam_plugin.go 415: Releasing address using handleID ContainerID="b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" HandleID="k8s-pod-network.b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" Workload="localhost-k8s-coredns--5d78c9869d--zqxdv-eth0" Feb 12 20:28:17.518110 env[1123]: 2024-02-12 20:28:17.507 [INFO][4329] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:28:17.518110 env[1123]: 2024-02-12 20:28:17.507 [INFO][4329] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:28:17.518110 env[1123]: 2024-02-12 20:28:17.513 [WARNING][4329] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" HandleID="k8s-pod-network.b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" Workload="localhost-k8s-coredns--5d78c9869d--zqxdv-eth0" Feb 12 20:28:17.518110 env[1123]: 2024-02-12 20:28:17.513 [INFO][4329] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" HandleID="k8s-pod-network.b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" Workload="localhost-k8s-coredns--5d78c9869d--zqxdv-eth0" Feb 12 20:28:17.518110 env[1123]: 2024-02-12 20:28:17.515 [INFO][4329] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:28:17.518110 env[1123]: 2024-02-12 20:28:17.516 [INFO][4321] k8s.go 591: Teardown processing complete. ContainerID="b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b" Feb 12 20:28:17.518513 env[1123]: time="2024-02-12T20:28:17.518095447Z" level=info msg="TearDown network for sandbox \"b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b\" successfully" Feb 12 20:28:17.521573 env[1123]: time="2024-02-12T20:28:17.521543915Z" level=info msg="RemovePodSandbox \"b5a3acc35d948afb80d55468c49fdb0c035d43f24836da49611bde9058a0221b\" returns successfully" Feb 12 20:28:17.522039 env[1123]: time="2024-02-12T20:28:17.522018540Z" level=info msg="StopPodSandbox for \"2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd\"" Feb 12 20:28:17.586152 env[1123]: 2024-02-12 20:28:17.554 [WARNING][4352] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6485779877--6hgzc-eth0", GenerateName:"calico-kube-controllers-6485779877-", Namespace:"calico-system", SelfLink:"", UID:"f20680ef-2022-4c0e-a8a5-9242b50af86d", ResourceVersion:"915", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 27, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6485779877", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1a1db3d7d99b74caab091c302daff54de115e3264f52c18a80e409461fafd9bb", Pod:"calico-kube-controllers-6485779877-6hgzc", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali79c41207e30", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:28:17.586152 env[1123]: 2024-02-12 20:28:17.554 [INFO][4352] k8s.go 578: Cleaning up netns ContainerID="2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" Feb 12 20:28:17.586152 env[1123]: 2024-02-12 20:28:17.554 [INFO][4352] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" iface="eth0" netns="" Feb 12 20:28:17.586152 env[1123]: 2024-02-12 20:28:17.554 [INFO][4352] k8s.go 585: Releasing IP address(es) ContainerID="2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" Feb 12 20:28:17.586152 env[1123]: 2024-02-12 20:28:17.554 [INFO][4352] utils.go 188: Calico CNI releasing IP address ContainerID="2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" Feb 12 20:28:17.586152 env[1123]: 2024-02-12 20:28:17.573 [INFO][4370] ipam_plugin.go 415: Releasing address using handleID ContainerID="2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" HandleID="k8s-pod-network.2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" Workload="localhost-k8s-calico--kube--controllers--6485779877--6hgzc-eth0" Feb 12 20:28:17.586152 env[1123]: 2024-02-12 20:28:17.573 [INFO][4370] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:28:17.586152 env[1123]: 2024-02-12 20:28:17.574 [INFO][4370] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:28:17.586152 env[1123]: 2024-02-12 20:28:17.581 [WARNING][4370] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" HandleID="k8s-pod-network.2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" Workload="localhost-k8s-calico--kube--controllers--6485779877--6hgzc-eth0" Feb 12 20:28:17.586152 env[1123]: 2024-02-12 20:28:17.581 [INFO][4370] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" HandleID="k8s-pod-network.2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" Workload="localhost-k8s-calico--kube--controllers--6485779877--6hgzc-eth0" Feb 12 20:28:17.586152 env[1123]: 2024-02-12 20:28:17.582 [INFO][4370] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:28:17.586152 env[1123]: 2024-02-12 20:28:17.584 [INFO][4352] k8s.go 591: Teardown processing complete. ContainerID="2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" Feb 12 20:28:17.586716 env[1123]: time="2024-02-12T20:28:17.586171885Z" level=info msg="TearDown network for sandbox \"2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd\" successfully" Feb 12 20:28:17.586716 env[1123]: time="2024-02-12T20:28:17.586202084Z" level=info msg="StopPodSandbox for \"2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd\" returns successfully" Feb 12 20:28:17.587057 env[1123]: time="2024-02-12T20:28:17.587019098Z" level=info msg="RemovePodSandbox for \"2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd\"" Feb 12 20:28:17.587195 env[1123]: time="2024-02-12T20:28:17.587134591Z" level=info msg="Forcibly stopping sandbox \"2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd\"" Feb 12 20:28:17.607566 sshd[4297]: pam_unix(sshd:session): session closed for user core Feb 12 20:28:17.608000 audit[4297]: USER_END pid=4297 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:17.611747 systemd[1]: sshd@16-10.0.0.105:22-10.0.0.1:58004.service: Deactivated successfully. Feb 12 20:28:17.613519 systemd[1]: Started sshd@17-10.0.0.105:22-10.0.0.1:58016.service. Feb 12 20:28:17.608000 audit[4297]: CRED_DISP pid=4297 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:17.616653 kernel: audit: type=1106 audit(1707769697.608:1426): pid=4297 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:17.616788 kernel: audit: type=1104 audit(1707769697.608:1427): pid=4297 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:17.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.105:22-10.0.0.1:58004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:28:17.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.105:22-10.0.0.1:58016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:28:17.616636 systemd[1]: session-17.scope: Deactivated successfully. Feb 12 20:28:17.618625 systemd-logind[1111]: Session 17 logged out. Waiting for processes to exit. Feb 12 20:28:17.619548 systemd-logind[1111]: Removed session 17. Feb 12 20:28:17.653000 audit[4401]: USER_ACCT pid=4401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:17.654588 sshd[4401]: Accepted publickey for core from 10.0.0.1 port 58016 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:28:17.654000 audit[4401]: CRED_ACQ pid=4401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:17.654000 audit[4401]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf3d325e0 a2=3 a3=0 items=0 ppid=1 pid=4401 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:17.654000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:28:17.655616 sshd[4401]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:28:17.659793 systemd[1]: Started session-18.scope. Feb 12 20:28:17.660939 systemd-logind[1111]: New session 18 of user core. Feb 12 20:28:17.662249 env[1123]: 2024-02-12 20:28:17.628 [WARNING][4393] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6485779877--6hgzc-eth0", GenerateName:"calico-kube-controllers-6485779877-", Namespace:"calico-system", SelfLink:"", UID:"f20680ef-2022-4c0e-a8a5-9242b50af86d", ResourceVersion:"915", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 27, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6485779877", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1a1db3d7d99b74caab091c302daff54de115e3264f52c18a80e409461fafd9bb", Pod:"calico-kube-controllers-6485779877-6hgzc", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali79c41207e30", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:28:17.662249 env[1123]: 2024-02-12 20:28:17.629 [INFO][4393] k8s.go 578: Cleaning up netns ContainerID="2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" Feb 12 20:28:17.662249 env[1123]: 2024-02-12 20:28:17.629 [INFO][4393] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" iface="eth0" netns="" Feb 12 20:28:17.662249 env[1123]: 2024-02-12 20:28:17.629 [INFO][4393] k8s.go 585: Releasing IP address(es) ContainerID="2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" Feb 12 20:28:17.662249 env[1123]: 2024-02-12 20:28:17.629 [INFO][4393] utils.go 188: Calico CNI releasing IP address ContainerID="2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" Feb 12 20:28:17.662249 env[1123]: 2024-02-12 20:28:17.647 [INFO][4404] ipam_plugin.go 415: Releasing address using handleID ContainerID="2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" HandleID="k8s-pod-network.2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" Workload="localhost-k8s-calico--kube--controllers--6485779877--6hgzc-eth0" Feb 12 20:28:17.662249 env[1123]: 2024-02-12 20:28:17.648 [INFO][4404] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:28:17.662249 env[1123]: 2024-02-12 20:28:17.648 [INFO][4404] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:28:17.662249 env[1123]: 2024-02-12 20:28:17.657 [WARNING][4404] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" HandleID="k8s-pod-network.2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" Workload="localhost-k8s-calico--kube--controllers--6485779877--6hgzc-eth0" Feb 12 20:28:17.662249 env[1123]: 2024-02-12 20:28:17.657 [INFO][4404] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" HandleID="k8s-pod-network.2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" Workload="localhost-k8s-calico--kube--controllers--6485779877--6hgzc-eth0" Feb 12 20:28:17.662249 env[1123]: 2024-02-12 20:28:17.659 [INFO][4404] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:28:17.662249 env[1123]: 2024-02-12 20:28:17.660 [INFO][4393] k8s.go 591: Teardown processing complete. ContainerID="2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd" Feb 12 20:28:17.662668 env[1123]: time="2024-02-12T20:28:17.662280367Z" level=info msg="TearDown network for sandbox \"2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd\" successfully" Feb 12 20:28:17.664000 audit[4401]: USER_START pid=4401 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:17.665000 audit[4412]: CRED_ACQ pid=4412 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:17.689444 env[1123]: time="2024-02-12T20:28:17.689393425Z" level=info msg="RemovePodSandbox \"2bb6a03bc22f4696f5704f1620483d56fb21a0f2cb6c34aab5d6309dbfbe2fdd\" returns successfully" Feb 12 20:28:17.689872 env[1123]: time="2024-02-12T20:28:17.689849404Z" level=info msg="StopPodSandbox for \"6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e\"" Feb 12 20:28:17.753294 env[1123]: 2024-02-12 20:28:17.721 [WARNING][4429] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--db2k2-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"fe848169-925a-4abf-a1a7-19c637d4a173", ResourceVersion:"879", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 27, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4b9c9ebc2db2bc30d20d1d7b4c2a198a8d599d9227250b648285aeabfe8dbc21", Pod:"coredns-5d78c9869d-db2k2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calieefbdd98d68", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:28:17.753294 env[1123]: 2024-02-12 20:28:17.721 [INFO][4429] k8s.go 578: Cleaning up netns ContainerID="6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" Feb 12 20:28:17.753294 env[1123]: 2024-02-12 20:28:17.721 [INFO][4429] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" iface="eth0" netns="" Feb 12 20:28:17.753294 env[1123]: 2024-02-12 20:28:17.721 [INFO][4429] k8s.go 585: Releasing IP address(es) ContainerID="6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" Feb 12 20:28:17.753294 env[1123]: 2024-02-12 20:28:17.721 [INFO][4429] utils.go 188: Calico CNI releasing IP address ContainerID="6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" Feb 12 20:28:17.753294 env[1123]: 2024-02-12 20:28:17.741 [INFO][4443] ipam_plugin.go 415: Releasing address using handleID ContainerID="6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" HandleID="k8s-pod-network.6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" Workload="localhost-k8s-coredns--5d78c9869d--db2k2-eth0" Feb 12 20:28:17.753294 env[1123]: 2024-02-12 20:28:17.741 [INFO][4443] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:28:17.753294 env[1123]: 2024-02-12 20:28:17.741 [INFO][4443] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:28:17.753294 env[1123]: 2024-02-12 20:28:17.748 [WARNING][4443] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" HandleID="k8s-pod-network.6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" Workload="localhost-k8s-coredns--5d78c9869d--db2k2-eth0" Feb 12 20:28:17.753294 env[1123]: 2024-02-12 20:28:17.748 [INFO][4443] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" HandleID="k8s-pod-network.6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" Workload="localhost-k8s-coredns--5d78c9869d--db2k2-eth0" Feb 12 20:28:17.753294 env[1123]: 2024-02-12 20:28:17.749 [INFO][4443] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:28:17.753294 env[1123]: 2024-02-12 20:28:17.751 [INFO][4429] k8s.go 591: Teardown processing complete. ContainerID="6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" Feb 12 20:28:17.753839 env[1123]: time="2024-02-12T20:28:17.753312038Z" level=info msg="TearDown network for sandbox \"6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e\" successfully" Feb 12 20:28:17.753839 env[1123]: time="2024-02-12T20:28:17.753341014Z" level=info msg="StopPodSandbox for \"6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e\" returns successfully" Feb 12 20:28:17.753839 env[1123]: time="2024-02-12T20:28:17.753807623Z" level=info msg="RemovePodSandbox for \"6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e\"" Feb 12 20:28:17.753909 env[1123]: time="2024-02-12T20:28:17.753849053Z" level=info msg="Forcibly stopping sandbox \"6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e\"" Feb 12 20:28:17.821936 env[1123]: 2024-02-12 20:28:17.787 [WARNING][4466] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--db2k2-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"fe848169-925a-4abf-a1a7-19c637d4a173", ResourceVersion:"879", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 27, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4b9c9ebc2db2bc30d20d1d7b4c2a198a8d599d9227250b648285aeabfe8dbc21", Pod:"coredns-5d78c9869d-db2k2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calieefbdd98d68", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:28:17.821936 env[1123]: 2024-02-12 20:28:17.787 [INFO][4466] k8s.go 578: Cleaning up netns ContainerID="6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" Feb 12 20:28:17.821936 env[1123]: 2024-02-12 20:28:17.787 [INFO][4466] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" iface="eth0" netns="" Feb 12 20:28:17.821936 env[1123]: 2024-02-12 20:28:17.787 [INFO][4466] k8s.go 585: Releasing IP address(es) ContainerID="6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" Feb 12 20:28:17.821936 env[1123]: 2024-02-12 20:28:17.787 [INFO][4466] utils.go 188: Calico CNI releasing IP address ContainerID="6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" Feb 12 20:28:17.821936 env[1123]: 2024-02-12 20:28:17.806 [INFO][4474] ipam_plugin.go 415: Releasing address using handleID ContainerID="6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" HandleID="k8s-pod-network.6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" Workload="localhost-k8s-coredns--5d78c9869d--db2k2-eth0" Feb 12 20:28:17.821936 env[1123]: 2024-02-12 20:28:17.806 [INFO][4474] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:28:17.821936 env[1123]: 2024-02-12 20:28:17.806 [INFO][4474] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:28:17.821936 env[1123]: 2024-02-12 20:28:17.816 [WARNING][4474] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" HandleID="k8s-pod-network.6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" Workload="localhost-k8s-coredns--5d78c9869d--db2k2-eth0" Feb 12 20:28:17.821936 env[1123]: 2024-02-12 20:28:17.816 [INFO][4474] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" HandleID="k8s-pod-network.6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" Workload="localhost-k8s-coredns--5d78c9869d--db2k2-eth0" Feb 12 20:28:17.821936 env[1123]: 2024-02-12 20:28:17.818 [INFO][4474] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:28:17.821936 env[1123]: 2024-02-12 20:28:17.820 [INFO][4466] k8s.go 591: Teardown processing complete. ContainerID="6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e" Feb 12 20:28:17.822477 env[1123]: time="2024-02-12T20:28:17.822053678Z" level=info msg="TearDown network for sandbox \"6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e\" successfully" Feb 12 20:28:17.825867 env[1123]: time="2024-02-12T20:28:17.825827182Z" level=info msg="RemovePodSandbox \"6bcbf22f65c7613e095bfa87c2007a6fe97f062e03989b1c0059b171d60d375e\" returns successfully" Feb 12 20:28:17.838239 sshd[4401]: pam_unix(sshd:session): session closed for user core Feb 12 20:28:17.838000 audit[4401]: USER_END pid=4401 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:17.841000 audit[4401]: CRED_DISP pid=4401 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:17.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.105:22-10.0.0.1:58032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:28:17.842181 systemd[1]: Started sshd@18-10.0.0.105:22-10.0.0.1:58032.service. Feb 12 20:28:17.843717 systemd[1]: sshd@17-10.0.0.105:22-10.0.0.1:58016.service: Deactivated successfully. Feb 12 20:28:17.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.105:22-10.0.0.1:58016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:28:17.844436 systemd[1]: session-18.scope: Deactivated successfully. Feb 12 20:28:17.845035 systemd-logind[1111]: Session 18 logged out. Waiting for processes to exit. Feb 12 20:28:17.845722 systemd-logind[1111]: Removed session 18. Feb 12 20:28:17.882000 audit[4483]: USER_ACCT pid=4483 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:17.883496 sshd[4483]: Accepted publickey for core from 10.0.0.1 port 58032 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:28:17.883000 audit[4483]: CRED_ACQ pid=4483 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:17.883000 audit[4483]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce234c570 a2=3 a3=0 items=0 ppid=1 pid=4483 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:17.883000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:28:17.884697 sshd[4483]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:28:17.888152 systemd-logind[1111]: New session 19 of user core. Feb 12 20:28:17.888892 systemd[1]: Started session-19.scope. Feb 12 20:28:17.892000 audit[4483]: USER_START pid=4483 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:17.893000 audit[4486]: CRED_ACQ pid=4486 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:18.806013 sshd[4483]: pam_unix(sshd:session): session closed for user core Feb 12 20:28:18.806000 audit[4483]: USER_END pid=4483 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:18.806000 audit[4483]: CRED_DISP pid=4483 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:18.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.105:22-10.0.0.1:58032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:28:18.810194 systemd[1]: sshd@18-10.0.0.105:22-10.0.0.1:58032.service: Deactivated successfully. Feb 12 20:28:18.810684 systemd[1]: session-19.scope: Deactivated successfully. Feb 12 20:28:18.813773 systemd-logind[1111]: Session 19 logged out. Waiting for processes to exit. Feb 12 20:28:18.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.105:22-10.0.0.1:58038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:28:18.815076 systemd[1]: Started sshd@19-10.0.0.105:22-10.0.0.1:58038.service. Feb 12 20:28:18.816262 systemd-logind[1111]: Removed session 19. Feb 12 20:28:18.819000 audit[4502]: NETFILTER_CFG table=filter:110 family=2 entries=20 op=nft_register_rule pid=4502 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:18.819000 audit[4502]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffd36f2ae80 a2=0 a3=7ffd36f2ae6c items=0 ppid=2173 pid=4502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:18.819000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:18.821000 audit[4502]: NETFILTER_CFG table=nat:111 family=2 entries=20 op=nft_register_rule pid=4502 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:18.821000 audit[4502]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd36f2ae80 a2=0 a3=31030 items=0 ppid=2173 pid=4502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:18.821000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:18.830000 audit[4505]: NETFILTER_CFG table=filter:112 family=2 entries=32 op=nft_register_rule pid=4505 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:18.830000 audit[4505]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffd98c7d0b0 a2=0 a3=7ffd98c7d09c items=0 ppid=2173 pid=4505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:18.830000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:18.830000 audit[4505]: NETFILTER_CFG table=nat:113 family=2 entries=20 op=nft_register_rule pid=4505 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:18.830000 audit[4505]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd98c7d0b0 a2=0 a3=31030 items=0 ppid=2173 pid=4505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:18.830000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:18.852000 audit[4501]: USER_ACCT pid=4501 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:18.853800 sshd[4501]: Accepted publickey for core from 10.0.0.1 port 58038 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:28:18.853000 audit[4501]: CRED_ACQ pid=4501 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:18.853000 audit[4501]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea5266f80 a2=3 a3=0 items=0 ppid=1 pid=4501 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:18.853000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:28:18.855083 sshd[4501]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:28:18.858889 systemd-logind[1111]: New session 20 of user core. Feb 12 20:28:18.859275 systemd[1]: Started session-20.scope. Feb 12 20:28:18.862000 audit[4501]: USER_START pid=4501 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:18.863000 audit[4506]: CRED_ACQ pid=4506 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:19.452549 sshd[4501]: pam_unix(sshd:session): session closed for user core Feb 12 20:28:19.452000 audit[4501]: USER_END pid=4501 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:19.452000 audit[4501]: CRED_DISP pid=4501 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:19.456093 systemd[1]: sshd@19-10.0.0.105:22-10.0.0.1:58038.service: Deactivated successfully. Feb 12 20:28:19.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.105:22-10.0.0.1:58038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:28:19.456782 systemd[1]: session-20.scope: Deactivated successfully. Feb 12 20:28:19.457403 systemd-logind[1111]: Session 20 logged out. Waiting for processes to exit. Feb 12 20:28:19.458543 systemd[1]: Started sshd@20-10.0.0.105:22-10.0.0.1:58040.service. Feb 12 20:28:19.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.105:22-10.0.0.1:58040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:28:19.459426 systemd-logind[1111]: Removed session 20. Feb 12 20:28:19.493000 audit[4515]: USER_ACCT pid=4515 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:19.494606 sshd[4515]: Accepted publickey for core from 10.0.0.1 port 58040 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:28:19.494000 audit[4515]: CRED_ACQ pid=4515 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:19.494000 audit[4515]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec38ee9e0 a2=3 a3=0 items=0 ppid=1 pid=4515 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:19.494000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:28:19.495533 sshd[4515]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:28:19.498616 systemd-logind[1111]: New session 21 of user core. Feb 12 20:28:19.499490 systemd[1]: Started session-21.scope. Feb 12 20:28:19.501000 audit[4515]: USER_START pid=4515 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:19.502000 audit[4517]: CRED_ACQ pid=4517 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:19.598230 sshd[4515]: pam_unix(sshd:session): session closed for user core Feb 12 20:28:19.598000 audit[4515]: USER_END pid=4515 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:19.598000 audit[4515]: CRED_DISP pid=4515 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:19.600207 systemd[1]: sshd@20-10.0.0.105:22-10.0.0.1:58040.service: Deactivated successfully. Feb 12 20:28:19.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.105:22-10.0.0.1:58040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:28:19.600856 systemd[1]: session-21.scope: Deactivated successfully. Feb 12 20:28:19.601408 systemd-logind[1111]: Session 21 logged out. Waiting for processes to exit. Feb 12 20:28:19.602154 systemd-logind[1111]: Removed session 21. Feb 12 20:28:24.602473 systemd[1]: Started sshd@21-10.0.0.105:22-10.0.0.1:34952.service. Feb 12 20:28:24.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.105:22-10.0.0.1:34952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:28:24.603433 kernel: kauditd_printk_skb: 57 callbacks suppressed Feb 12 20:28:24.603481 kernel: audit: type=1130 audit(1707769704.601:1469): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.105:22-10.0.0.1:34952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:28:24.636000 audit[4548]: USER_ACCT pid=4548 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:24.638001 sshd[4548]: Accepted publickey for core from 10.0.0.1 port 34952 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:28:24.639000 audit[4548]: CRED_ACQ pid=4548 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:24.640908 sshd[4548]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:28:24.643505 kernel: audit: type=1101 audit(1707769704.636:1470): pid=4548 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:24.643564 kernel: audit: type=1103 audit(1707769704.639:1471): pid=4548 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:24.643589 kernel: audit: type=1006 audit(1707769704.639:1472): pid=4548 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Feb 12 20:28:24.644526 systemd-logind[1111]: New session 22 of user core. Feb 12 20:28:24.646089 kernel: audit: type=1300 audit(1707769704.639:1472): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd36fde9f0 a2=3 a3=0 items=0 ppid=1 pid=4548 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:24.639000 audit[4548]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd36fde9f0 a2=3 a3=0 items=0 ppid=1 pid=4548 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:24.645381 systemd[1]: Started session-22.scope. Feb 12 20:28:24.649352 kernel: audit: type=1327 audit(1707769704.639:1472): proctitle=737368643A20636F7265205B707269765D Feb 12 20:28:24.639000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:28:24.649000 audit[4548]: USER_START pid=4548 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:24.653231 kernel: audit: type=1105 audit(1707769704.649:1473): pid=4548 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:24.653312 kernel: audit: type=1103 audit(1707769704.650:1474): pid=4550 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:24.650000 audit[4550]: CRED_ACQ pid=4550 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:24.747776 sshd[4548]: pam_unix(sshd:session): session closed for user core Feb 12 20:28:24.747000 audit[4548]: USER_END pid=4548 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:24.749815 systemd[1]: sshd@21-10.0.0.105:22-10.0.0.1:34952.service: Deactivated successfully. Feb 12 20:28:24.750694 systemd[1]: session-22.scope: Deactivated successfully. Feb 12 20:28:24.751246 systemd-logind[1111]: Session 22 logged out. Waiting for processes to exit. Feb 12 20:28:24.751865 systemd-logind[1111]: Removed session 22. Feb 12 20:28:24.747000 audit[4548]: CRED_DISP pid=4548 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:24.754603 kernel: audit: type=1106 audit(1707769704.747:1475): pid=4548 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:24.754658 kernel: audit: type=1104 audit(1707769704.747:1476): pid=4548 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:24.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.105:22-10.0.0.1:34952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:28:26.350000 audit[4567]: NETFILTER_CFG table=filter:114 family=2 entries=20 op=nft_register_rule pid=4567 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:26.350000 audit[4567]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fffce87d0d0 a2=0 a3=7fffce87d0bc items=0 ppid=2173 pid=4567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:26.350000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:26.354000 audit[4567]: NETFILTER_CFG table=nat:115 family=2 entries=104 op=nft_register_chain pid=4567 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:26.354000 audit[4567]: SYSCALL arch=c000003e syscall=46 success=yes exit=47436 a0=3 a1=7fffce87d0d0 a2=0 a3=7fffce87d0bc items=0 ppid=2173 pid=4567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:26.354000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:29.751915 systemd[1]: Started sshd@22-10.0.0.105:22-10.0.0.1:34966.service. Feb 12 20:28:29.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.105:22-10.0.0.1:34966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:28:29.755774 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 12 20:28:29.755824 kernel: audit: type=1130 audit(1707769709.751:1480): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.105:22-10.0.0.1:34966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:28:29.786000 audit[4575]: USER_ACCT pid=4575 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:29.788077 sshd[4575]: Accepted publickey for core from 10.0.0.1 port 34966 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:28:29.790327 sshd[4575]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:28:29.789000 audit[4575]: CRED_ACQ pid=4575 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:29.794085 kernel: audit: type=1101 audit(1707769709.786:1481): pid=4575 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:29.794132 kernel: audit: type=1103 audit(1707769709.789:1482): pid=4575 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:29.794152 kernel: audit: type=1006 audit(1707769709.789:1483): pid=4575 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 12 20:28:29.793187 systemd-logind[1111]: New session 23 of user core. Feb 12 20:28:29.793976 systemd[1]: Started session-23.scope. Feb 12 20:28:29.789000 audit[4575]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc75527e20 a2=3 a3=0 items=0 ppid=1 pid=4575 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:29.799803 kernel: audit: type=1300 audit(1707769709.789:1483): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc75527e20 a2=3 a3=0 items=0 ppid=1 pid=4575 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:29.799851 kernel: audit: type=1327 audit(1707769709.789:1483): proctitle=737368643A20636F7265205B707269765D Feb 12 20:28:29.789000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:28:29.797000 audit[4575]: USER_START pid=4575 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:29.803674 kernel: audit: type=1105 audit(1707769709.797:1484): pid=4575 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:29.803728 kernel: audit: type=1103 audit(1707769709.798:1485): pid=4577 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:29.798000 audit[4577]: CRED_ACQ pid=4577 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:29.893770 sshd[4575]: pam_unix(sshd:session): session closed for user core Feb 12 20:28:29.893000 audit[4575]: USER_END pid=4575 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:29.895724 systemd[1]: sshd@22-10.0.0.105:22-10.0.0.1:34966.service: Deactivated successfully. Feb 12 20:28:29.896522 systemd[1]: session-23.scope: Deactivated successfully. Feb 12 20:28:29.897240 systemd-logind[1111]: Session 23 logged out. Waiting for processes to exit. Feb 12 20:28:29.898216 systemd-logind[1111]: Removed session 23. Feb 12 20:28:29.893000 audit[4575]: CRED_DISP pid=4575 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:29.900706 kernel: audit: type=1106 audit(1707769709.893:1486): pid=4575 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:29.900769 kernel: audit: type=1104 audit(1707769709.893:1487): pid=4575 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:29.894000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.105:22-10.0.0.1:34966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:28:34.897923 systemd[1]: Started sshd@23-10.0.0.105:22-10.0.0.1:60276.service. Feb 12 20:28:34.901350 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:28:34.901544 kernel: audit: type=1130 audit(1707769714.897:1489): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.105:22-10.0.0.1:60276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:28:34.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.105:22-10.0.0.1:60276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:28:34.932000 audit[4590]: USER_ACCT pid=4590 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:34.933664 sshd[4590]: Accepted publickey for core from 10.0.0.1 port 60276 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:28:34.935569 sshd[4590]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:28:34.934000 audit[4590]: CRED_ACQ pid=4590 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:34.938575 kernel: audit: type=1101 audit(1707769714.932:1490): pid=4590 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:34.938650 kernel: audit: type=1103 audit(1707769714.934:1491): pid=4590 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:34.938682 kernel: audit: type=1006 audit(1707769714.934:1492): pid=4590 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 12 20:28:34.939114 systemd-logind[1111]: New session 24 of user core. Feb 12 20:28:34.940099 kernel: audit: type=1300 audit(1707769714.934:1492): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe28116220 a2=3 a3=0 items=0 ppid=1 pid=4590 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:34.934000 audit[4590]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe28116220 a2=3 a3=0 items=0 ppid=1 pid=4590 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:34.940294 systemd[1]: Started session-24.scope. Feb 12 20:28:34.942828 kernel: audit: type=1327 audit(1707769714.934:1492): proctitle=737368643A20636F7265205B707269765D Feb 12 20:28:34.934000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:28:34.943000 audit[4590]: USER_START pid=4590 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:34.944000 audit[4592]: CRED_ACQ pid=4592 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:34.950100 kernel: audit: type=1105 audit(1707769714.943:1493): pid=4590 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:34.950163 kernel: audit: type=1103 audit(1707769714.944:1494): pid=4592 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:35.043580 sshd[4590]: pam_unix(sshd:session): session closed for user core Feb 12 20:28:35.043000 audit[4590]: USER_END pid=4590 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:35.046422 systemd[1]: sshd@23-10.0.0.105:22-10.0.0.1:60276.service: Deactivated successfully. Feb 12 20:28:35.047298 systemd[1]: session-24.scope: Deactivated successfully. Feb 12 20:28:35.043000 audit[4590]: CRED_DISP pid=4590 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:35.048678 systemd-logind[1111]: Session 24 logged out. Waiting for processes to exit. Feb 12 20:28:35.049398 systemd-logind[1111]: Removed session 24. Feb 12 20:28:35.051511 kernel: audit: type=1106 audit(1707769715.043:1495): pid=4590 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:35.051803 kernel: audit: type=1104 audit(1707769715.043:1496): pid=4590 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:35.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.105:22-10.0.0.1:60276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:28:35.265922 kubelet[2014]: E0212 20:28:35.265798 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:28:35.811902 kubelet[2014]: I0212 20:28:35.811858 2014 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-nsjjr" podStartSLOduration=50.562877349 podCreationTimestamp="2024-02-12 20:27:35 +0000 UTC" firstStartedPulling="2024-02-12 20:28:04.551391074 +0000 UTC m=+47.365311705" lastFinishedPulling="2024-02-12 20:28:14.800313309 +0000 UTC m=+57.614233940" observedRunningTime="2024-02-12 20:28:15.690401215 +0000 UTC m=+58.504321846" watchObservedRunningTime="2024-02-12 20:28:35.811799584 +0000 UTC m=+78.625720215" Feb 12 20:28:35.812301 kubelet[2014]: I0212 20:28:35.812273 2014 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:28:35.818602 systemd[1]: Created slice kubepods-besteffort-pod4e717b49_b941_48c5_ad41_f85487c89be9.slice. Feb 12 20:28:35.818000 audit[4603]: NETFILTER_CFG table=filter:116 family=2 entries=9 op=nft_register_rule pid=4603 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:35.818000 audit[4603]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe20212480 a2=0 a3=7ffe2021246c items=0 ppid=2173 pid=4603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:35.818000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:35.821000 audit[4603]: NETFILTER_CFG table=nat:117 family=2 entries=44 op=nft_register_rule pid=4603 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:35.821000 audit[4603]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffe20212480 a2=0 a3=7ffe2021246c items=0 ppid=2173 pid=4603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:35.821000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:35.840675 kubelet[2014]: I0212 20:28:35.840628 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/4e717b49-b941-48c5-ad41-f85487c89be9-calico-apiserver-certs\") pod \"calico-apiserver-5777b886f8-wz29r\" (UID: \"4e717b49-b941-48c5-ad41-f85487c89be9\") " pod="calico-apiserver/calico-apiserver-5777b886f8-wz29r" Feb 12 20:28:35.840823 kubelet[2014]: I0212 20:28:35.840775 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ckrj7\" (UniqueName: \"kubernetes.io/projected/4e717b49-b941-48c5-ad41-f85487c89be9-kube-api-access-ckrj7\") pod \"calico-apiserver-5777b886f8-wz29r\" (UID: \"4e717b49-b941-48c5-ad41-f85487c89be9\") " pod="calico-apiserver/calico-apiserver-5777b886f8-wz29r" Feb 12 20:28:35.840000 audit[4605]: NETFILTER_CFG table=filter:118 family=2 entries=10 op=nft_register_rule pid=4605 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:35.840000 audit[4605]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffdff890350 a2=0 a3=7ffdff89033c items=0 ppid=2173 pid=4605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:35.840000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:35.843000 audit[4605]: NETFILTER_CFG table=nat:119 family=2 entries=44 op=nft_register_rule pid=4605 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:35.843000 audit[4605]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffdff890350 a2=0 a3=7ffdff89033c items=0 ppid=2173 pid=4605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:35.843000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:36.124440 env[1123]: time="2024-02-12T20:28:36.124283919Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5777b886f8-wz29r,Uid:4e717b49-b941-48c5-ad41-f85487c89be9,Namespace:calico-apiserver,Attempt:0,}" Feb 12 20:28:36.248786 systemd-networkd[1018]: califf9407742e7: Link UP Feb 12 20:28:36.251080 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:28:36.251141 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califf9407742e7: link becomes ready Feb 12 20:28:36.251319 systemd-networkd[1018]: califf9407742e7: Gained carrier Feb 12 20:28:36.261254 env[1123]: 2024-02-12 20:28:36.176 [INFO][4608] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--5777b886f8--wz29r-eth0 calico-apiserver-5777b886f8- calico-apiserver 4e717b49-b941-48c5-ad41-f85487c89be9 1091 0 2024-02-12 20:28:35 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5777b886f8 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-5777b886f8-wz29r eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] califf9407742e7 [] []}} ContainerID="3c21822c16278b7ea5e6643c1ddf5a7172e6592984647fa1d894b4ec7d0cb090" Namespace="calico-apiserver" Pod="calico-apiserver-5777b886f8-wz29r" WorkloadEndpoint="localhost-k8s-calico--apiserver--5777b886f8--wz29r-" Feb 12 20:28:36.261254 env[1123]: 2024-02-12 20:28:36.176 [INFO][4608] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="3c21822c16278b7ea5e6643c1ddf5a7172e6592984647fa1d894b4ec7d0cb090" Namespace="calico-apiserver" Pod="calico-apiserver-5777b886f8-wz29r" WorkloadEndpoint="localhost-k8s-calico--apiserver--5777b886f8--wz29r-eth0" Feb 12 20:28:36.261254 env[1123]: 2024-02-12 20:28:36.203 [INFO][4621] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3c21822c16278b7ea5e6643c1ddf5a7172e6592984647fa1d894b4ec7d0cb090" HandleID="k8s-pod-network.3c21822c16278b7ea5e6643c1ddf5a7172e6592984647fa1d894b4ec7d0cb090" Workload="localhost-k8s-calico--apiserver--5777b886f8--wz29r-eth0" Feb 12 20:28:36.261254 env[1123]: 2024-02-12 20:28:36.213 [INFO][4621] ipam_plugin.go 268: Auto assigning IP ContainerID="3c21822c16278b7ea5e6643c1ddf5a7172e6592984647fa1d894b4ec7d0cb090" HandleID="k8s-pod-network.3c21822c16278b7ea5e6643c1ddf5a7172e6592984647fa1d894b4ec7d0cb090" Workload="localhost-k8s-calico--apiserver--5777b886f8--wz29r-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002499e0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-5777b886f8-wz29r", "timestamp":"2024-02-12 20:28:36.203543161 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:28:36.261254 env[1123]: 2024-02-12 20:28:36.214 [INFO][4621] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:28:36.261254 env[1123]: 2024-02-12 20:28:36.214 [INFO][4621] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:28:36.261254 env[1123]: 2024-02-12 20:28:36.214 [INFO][4621] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 12 20:28:36.261254 env[1123]: 2024-02-12 20:28:36.216 [INFO][4621] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3c21822c16278b7ea5e6643c1ddf5a7172e6592984647fa1d894b4ec7d0cb090" host="localhost" Feb 12 20:28:36.261254 env[1123]: 2024-02-12 20:28:36.220 [INFO][4621] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 12 20:28:36.261254 env[1123]: 2024-02-12 20:28:36.227 [INFO][4621] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 12 20:28:36.261254 env[1123]: 2024-02-12 20:28:36.230 [INFO][4621] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 12 20:28:36.261254 env[1123]: 2024-02-12 20:28:36.232 [INFO][4621] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 12 20:28:36.261254 env[1123]: 2024-02-12 20:28:36.232 [INFO][4621] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.3c21822c16278b7ea5e6643c1ddf5a7172e6592984647fa1d894b4ec7d0cb090" host="localhost" Feb 12 20:28:36.261254 env[1123]: 2024-02-12 20:28:36.234 [INFO][4621] ipam.go 1682: Creating new handle: k8s-pod-network.3c21822c16278b7ea5e6643c1ddf5a7172e6592984647fa1d894b4ec7d0cb090 Feb 12 20:28:36.261254 env[1123]: 2024-02-12 20:28:36.238 [INFO][4621] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.3c21822c16278b7ea5e6643c1ddf5a7172e6592984647fa1d894b4ec7d0cb090" host="localhost" Feb 12 20:28:36.261254 env[1123]: 2024-02-12 20:28:36.243 [INFO][4621] ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.3c21822c16278b7ea5e6643c1ddf5a7172e6592984647fa1d894b4ec7d0cb090" host="localhost" Feb 12 20:28:36.261254 env[1123]: 2024-02-12 20:28:36.243 [INFO][4621] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.3c21822c16278b7ea5e6643c1ddf5a7172e6592984647fa1d894b4ec7d0cb090" host="localhost" Feb 12 20:28:36.261254 env[1123]: 2024-02-12 20:28:36.243 [INFO][4621] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:28:36.261254 env[1123]: 2024-02-12 20:28:36.244 [INFO][4621] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="3c21822c16278b7ea5e6643c1ddf5a7172e6592984647fa1d894b4ec7d0cb090" HandleID="k8s-pod-network.3c21822c16278b7ea5e6643c1ddf5a7172e6592984647fa1d894b4ec7d0cb090" Workload="localhost-k8s-calico--apiserver--5777b886f8--wz29r-eth0" Feb 12 20:28:36.261833 env[1123]: 2024-02-12 20:28:36.246 [INFO][4608] k8s.go 385: Populated endpoint ContainerID="3c21822c16278b7ea5e6643c1ddf5a7172e6592984647fa1d894b4ec7d0cb090" Namespace="calico-apiserver" Pod="calico-apiserver-5777b886f8-wz29r" WorkloadEndpoint="localhost-k8s-calico--apiserver--5777b886f8--wz29r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5777b886f8--wz29r-eth0", GenerateName:"calico-apiserver-5777b886f8-", Namespace:"calico-apiserver", SelfLink:"", UID:"4e717b49-b941-48c5-ad41-f85487c89be9", ResourceVersion:"1091", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 28, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5777b886f8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-5777b886f8-wz29r", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"califf9407742e7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:28:36.261833 env[1123]: 2024-02-12 20:28:36.246 [INFO][4608] k8s.go 386: Calico CNI using IPs: [192.168.88.133/32] ContainerID="3c21822c16278b7ea5e6643c1ddf5a7172e6592984647fa1d894b4ec7d0cb090" Namespace="calico-apiserver" Pod="calico-apiserver-5777b886f8-wz29r" WorkloadEndpoint="localhost-k8s-calico--apiserver--5777b886f8--wz29r-eth0" Feb 12 20:28:36.261833 env[1123]: 2024-02-12 20:28:36.247 [INFO][4608] dataplane_linux.go 68: Setting the host side veth name to califf9407742e7 ContainerID="3c21822c16278b7ea5e6643c1ddf5a7172e6592984647fa1d894b4ec7d0cb090" Namespace="calico-apiserver" Pod="calico-apiserver-5777b886f8-wz29r" WorkloadEndpoint="localhost-k8s-calico--apiserver--5777b886f8--wz29r-eth0" Feb 12 20:28:36.261833 env[1123]: 2024-02-12 20:28:36.249 [INFO][4608] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="3c21822c16278b7ea5e6643c1ddf5a7172e6592984647fa1d894b4ec7d0cb090" Namespace="calico-apiserver" Pod="calico-apiserver-5777b886f8-wz29r" WorkloadEndpoint="localhost-k8s-calico--apiserver--5777b886f8--wz29r-eth0" Feb 12 20:28:36.261833 env[1123]: 2024-02-12 20:28:36.251 [INFO][4608] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="3c21822c16278b7ea5e6643c1ddf5a7172e6592984647fa1d894b4ec7d0cb090" Namespace="calico-apiserver" Pod="calico-apiserver-5777b886f8-wz29r" WorkloadEndpoint="localhost-k8s-calico--apiserver--5777b886f8--wz29r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5777b886f8--wz29r-eth0", GenerateName:"calico-apiserver-5777b886f8-", Namespace:"calico-apiserver", SelfLink:"", UID:"4e717b49-b941-48c5-ad41-f85487c89be9", ResourceVersion:"1091", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 28, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5777b886f8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3c21822c16278b7ea5e6643c1ddf5a7172e6592984647fa1d894b4ec7d0cb090", Pod:"calico-apiserver-5777b886f8-wz29r", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"califf9407742e7", MAC:"ea:e7:47:87:4a:20", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:28:36.261833 env[1123]: 2024-02-12 20:28:36.258 [INFO][4608] k8s.go 491: Wrote updated endpoint to datastore ContainerID="3c21822c16278b7ea5e6643c1ddf5a7172e6592984647fa1d894b4ec7d0cb090" Namespace="calico-apiserver" Pod="calico-apiserver-5777b886f8-wz29r" WorkloadEndpoint="localhost-k8s-calico--apiserver--5777b886f8--wz29r-eth0" Feb 12 20:28:36.275021 env[1123]: time="2024-02-12T20:28:36.274921711Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:28:36.275021 env[1123]: time="2024-02-12T20:28:36.274977979Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:28:36.275389 env[1123]: time="2024-02-12T20:28:36.274991364Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:28:36.275389 env[1123]: time="2024-02-12T20:28:36.275319891Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3c21822c16278b7ea5e6643c1ddf5a7172e6592984647fa1d894b4ec7d0cb090 pid=4655 runtime=io.containerd.runc.v2 Feb 12 20:28:36.287000 audit[4666]: NETFILTER_CFG table=filter:120 family=2 entries=59 op=nft_register_chain pid=4666 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:28:36.287000 audit[4666]: SYSCALL arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7ffc16935cc0 a2=0 a3=7ffc16935cac items=0 ppid=3741 pid=4666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:36.287000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:28:36.291841 systemd[1]: Started cri-containerd-3c21822c16278b7ea5e6643c1ddf5a7172e6592984647fa1d894b4ec7d0cb090.scope. Feb 12 20:28:36.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit: BPF prog-id=186 op=LOAD Feb 12 20:28:36.301000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[4665]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4655 pid=4665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:36.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363323138323263313632373862376561356536363433633164646635 Feb 12 20:28:36.301000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[4665]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4655 pid=4665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:36.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363323138323263313632373862376561356536363433633164646635 Feb 12 20:28:36.301000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit: BPF prog-id=187 op=LOAD Feb 12 20:28:36.301000 audit[4665]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00023e9c0 items=0 ppid=4655 pid=4665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:36.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363323138323263313632373862376561356536363433633164646635 Feb 12 20:28:36.301000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit: BPF prog-id=188 op=LOAD Feb 12 20:28:36.301000 audit[4665]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00023ea08 items=0 ppid=4655 pid=4665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:36.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363323138323263313632373862376561356536363433633164646635 Feb 12 20:28:36.301000 audit: BPF prog-id=188 op=UNLOAD Feb 12 20:28:36.301000 audit: BPF prog-id=187 op=UNLOAD Feb 12 20:28:36.301000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.301000 audit: BPF prog-id=189 op=LOAD Feb 12 20:28:36.301000 audit[4665]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00023ee18 items=0 ppid=4655 pid=4665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:36.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363323138323263313632373862376561356536363433633164646635 Feb 12 20:28:36.303645 systemd-resolved[1066]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 20:28:36.325397 env[1123]: time="2024-02-12T20:28:36.325348801Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5777b886f8-wz29r,Uid:4e717b49-b941-48c5-ad41-f85487c89be9,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"3c21822c16278b7ea5e6643c1ddf5a7172e6592984647fa1d894b4ec7d0cb090\"" Feb 12 20:28:36.326860 env[1123]: time="2024-02-12T20:28:36.326840326Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 20:28:37.903696 systemd-networkd[1018]: califf9407742e7: Gained IPv6LL Feb 12 20:28:39.406847 env[1123]: time="2024-02-12T20:28:39.406794197Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:39.455036 env[1123]: time="2024-02-12T20:28:39.454990764Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:39.457037 env[1123]: time="2024-02-12T20:28:39.456996565Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:39.459046 env[1123]: time="2024-02-12T20:28:39.459007596Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:39.459572 env[1123]: time="2024-02-12T20:28:39.459549909Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 12 20:28:39.461261 env[1123]: time="2024-02-12T20:28:39.461227164Z" level=info msg="CreateContainer within sandbox \"3c21822c16278b7ea5e6643c1ddf5a7172e6592984647fa1d894b4ec7d0cb090\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 20:28:39.473390 env[1123]: time="2024-02-12T20:28:39.473344239Z" level=info msg="CreateContainer within sandbox \"3c21822c16278b7ea5e6643c1ddf5a7172e6592984647fa1d894b4ec7d0cb090\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"4617dff96aa6108087fc5d958d7abb4cb9841099f15f6dac662c1aecdddcdb30\"" Feb 12 20:28:39.473898 env[1123]: time="2024-02-12T20:28:39.473868167Z" level=info msg="StartContainer for \"4617dff96aa6108087fc5d958d7abb4cb9841099f15f6dac662c1aecdddcdb30\"" Feb 12 20:28:39.491695 systemd[1]: Started cri-containerd-4617dff96aa6108087fc5d958d7abb4cb9841099f15f6dac662c1aecdddcdb30.scope. Feb 12 20:28:39.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit: BPF prog-id=190 op=LOAD Feb 12 20:28:39.502000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit[4696]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4655 pid=4696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:39.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436313764666639366161363130383038376663356439353864376162 Feb 12 20:28:39.502000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit[4696]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4655 pid=4696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:39.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436313764666639366161363130383038376663356439353864376162 Feb 12 20:28:39.502000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit: BPF prog-id=191 op=LOAD Feb 12 20:28:39.502000 audit[4696]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000323920 items=0 ppid=4655 pid=4696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:39.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436313764666639366161363130383038376663356439353864376162 Feb 12 20:28:39.502000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit: BPF prog-id=192 op=LOAD Feb 12 20:28:39.502000 audit[4696]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000323968 items=0 ppid=4655 pid=4696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:39.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436313764666639366161363130383038376663356439353864376162 Feb 12 20:28:39.502000 audit: BPF prog-id=192 op=UNLOAD Feb 12 20:28:39.502000 audit: BPF prog-id=191 op=UNLOAD Feb 12 20:28:39.502000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:39.502000 audit: BPF prog-id=193 op=LOAD Feb 12 20:28:39.502000 audit[4696]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000323d78 items=0 ppid=4655 pid=4696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:39.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436313764666639366161363130383038376663356439353864376162 Feb 12 20:28:39.529219 env[1123]: time="2024-02-12T20:28:39.529162716Z" level=info msg="StartContainer for \"4617dff96aa6108087fc5d958d7abb4cb9841099f15f6dac662c1aecdddcdb30\" returns successfully" Feb 12 20:28:39.608472 kubelet[2014]: I0212 20:28:39.608331 2014 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5777b886f8-wz29r" podStartSLOduration=1.474895579 podCreationTimestamp="2024-02-12 20:28:35 +0000 UTC" firstStartedPulling="2024-02-12 20:28:36.326378936 +0000 UTC m=+79.140299567" lastFinishedPulling="2024-02-12 20:28:39.459767684 +0000 UTC m=+82.273688315" observedRunningTime="2024-02-12 20:28:39.607519019 +0000 UTC m=+82.421439650" watchObservedRunningTime="2024-02-12 20:28:39.608284327 +0000 UTC m=+82.422204959" Feb 12 20:28:39.624000 audit[4729]: NETFILTER_CFG table=filter:121 family=2 entries=10 op=nft_register_rule pid=4729 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:39.624000 audit[4729]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffcbbe06c60 a2=0 a3=7ffcbbe06c4c items=0 ppid=2173 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:39.624000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:39.626000 audit[4729]: NETFILTER_CFG table=nat:122 family=2 entries=44 op=nft_register_rule pid=4729 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:39.626000 audit[4729]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffcbbe06c60 a2=0 a3=7ffcbbe06c4c items=0 ppid=2173 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:39.626000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:40.000000 audit[4707]: AVC avc: denied { watch } for pid=4707 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_20_28_35.2869100405/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c324,c996 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c324,c996 tclass=file permissive=0 Feb 12 20:28:40.003466 kernel: kauditd_printk_skb: 136 callbacks suppressed Feb 12 20:28:40.003518 kernel: audit: type=1400 audit(1707769720.000:1541): avc: denied { watch } for pid=4707 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_20_28_35.2869100405/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c324,c996 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c324,c996 tclass=file permissive=0 Feb 12 20:28:40.009777 kernel: audit: type=1300 audit(1707769720.000:1541): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b58580 a2=fc6 a3=0 items=0 ppid=4655 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c324,c996 key=(null) Feb 12 20:28:40.000000 audit[4707]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b58580 a2=fc6 a3=0 items=0 ppid=4655 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c324,c996 key=(null) Feb 12 20:28:40.000000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 20:28:40.014008 kernel: audit: type=1327 audit(1707769720.000:1541): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 20:28:40.048441 systemd[1]: Started sshd@24-10.0.0.105:22-10.0.0.1:60282.service. Feb 12 20:28:40.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.105:22-10.0.0.1:60282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:28:40.051973 kernel: audit: type=1130 audit(1707769720.046:1542): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.105:22-10.0.0.1:60282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:28:40.083000 audit[4731]: USER_ACCT pid=4731 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:40.086036 sshd[4731]: Accepted publickey for core from 10.0.0.1 port 60282 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:28:40.087630 sshd[4731]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:28:40.083000 audit[4731]: CRED_ACQ pid=4731 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:40.091807 kernel: audit: type=1101 audit(1707769720.083:1543): pid=4731 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:40.091853 kernel: audit: type=1103 audit(1707769720.083:1544): pid=4731 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:40.091871 kernel: audit: type=1006 audit(1707769720.083:1545): pid=4731 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 12 20:28:40.083000 audit[4731]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd42315150 a2=3 a3=0 items=0 ppid=1 pid=4731 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:40.097098 kernel: audit: type=1300 audit(1707769720.083:1545): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd42315150 a2=3 a3=0 items=0 ppid=1 pid=4731 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:40.097262 kernel: audit: type=1327 audit(1707769720.083:1545): proctitle=737368643A20636F7265205B707269765D Feb 12 20:28:40.083000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:28:40.099831 systemd-logind[1111]: New session 25 of user core. Feb 12 20:28:40.100544 systemd[1]: Started session-25.scope. Feb 12 20:28:40.103000 audit[4731]: USER_START pid=4731 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:40.103000 audit[4733]: CRED_ACQ pid=4733 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:40.109984 kernel: audit: type=1105 audit(1707769720.103:1546): pid=4731 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:40.207975 sshd[4731]: pam_unix(sshd:session): session closed for user core Feb 12 20:28:40.206000 audit[4731]: USER_END pid=4731 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:40.206000 audit[4731]: CRED_DISP pid=4731 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:28:40.209861 systemd[1]: sshd@24-10.0.0.105:22-10.0.0.1:60282.service: Deactivated successfully. Feb 12 20:28:40.210604 systemd[1]: session-25.scope: Deactivated successfully. Feb 12 20:28:40.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.105:22-10.0.0.1:60282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:28:40.211219 systemd-logind[1111]: Session 25 logged out. Waiting for processes to exit. Feb 12 20:28:40.211913 systemd-logind[1111]: Removed session 25. Feb 12 20:28:40.380000 audit[4745]: NETFILTER_CFG table=filter:123 family=2 entries=10 op=nft_register_rule pid=4745 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:40.380000 audit[4745]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc3b32c800 a2=0 a3=7ffc3b32c7ec items=0 ppid=2173 pid=4745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:40.380000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:40.382000 audit[4745]: NETFILTER_CFG table=nat:124 family=2 entries=44 op=nft_register_rule pid=4745 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:40.382000 audit[4745]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffc3b32c800 a2=0 a3=7ffc3b32c7ec items=0 ppid=2173 pid=4745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:40.382000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:41.266051 kubelet[2014]: E0212 20:28:41.266000 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"