Feb 9 00:48:26.798745 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Feb 8 21:14:17 -00 2024 Feb 9 00:48:26.798768 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 00:48:26.798781 kernel: BIOS-provided physical RAM map: Feb 9 00:48:26.798789 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Feb 9 00:48:26.798796 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable Feb 9 00:48:26.798803 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Feb 9 00:48:26.798813 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable Feb 9 00:48:26.798821 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Feb 9 00:48:26.798828 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable Feb 9 00:48:26.798838 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Feb 9 00:48:26.798846 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable Feb 9 00:48:26.798853 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Feb 9 00:48:26.798861 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Feb 9 00:48:26.798869 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Feb 9 00:48:26.798879 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Feb 9 00:48:26.798889 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Feb 9 00:48:26.798897 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Feb 9 00:48:26.798905 kernel: NX (Execute Disable) protection: active Feb 9 00:48:26.798913 kernel: e820: update [mem 0x9b3f7018-0x9b400c57] usable ==> usable Feb 9 00:48:26.798922 kernel: e820: update [mem 0x9b3f7018-0x9b400c57] usable ==> usable Feb 9 00:48:26.798930 kernel: e820: update [mem 0x9b1aa018-0x9b1e6e57] usable ==> usable Feb 9 00:48:26.798938 kernel: e820: update [mem 0x9b1aa018-0x9b1e6e57] usable ==> usable Feb 9 00:48:26.798946 kernel: extended physical RAM map: Feb 9 00:48:26.798954 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable Feb 9 00:48:26.798962 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable Feb 9 00:48:26.798972 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Feb 9 00:48:26.798980 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable Feb 9 00:48:26.798988 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Feb 9 00:48:26.798996 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable Feb 9 00:48:26.799005 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Feb 9 00:48:26.799013 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b1aa017] usable Feb 9 00:48:26.799021 kernel: reserve setup_data: [mem 0x000000009b1aa018-0x000000009b1e6e57] usable Feb 9 00:48:26.799029 kernel: reserve setup_data: [mem 0x000000009b1e6e58-0x000000009b3f7017] usable Feb 9 00:48:26.799037 kernel: reserve setup_data: [mem 0x000000009b3f7018-0x000000009b400c57] usable Feb 9 00:48:26.799045 kernel: reserve setup_data: [mem 0x000000009b400c58-0x000000009c8eefff] usable Feb 9 00:48:26.799053 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Feb 9 00:48:26.799063 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Feb 9 00:48:26.799071 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Feb 9 00:48:26.799079 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Feb 9 00:48:26.799088 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Feb 9 00:48:26.799113 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Feb 9 00:48:26.799122 kernel: efi: EFI v2.70 by EDK II Feb 9 00:48:26.799131 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b773018 RNG=0x9cb75018 Feb 9 00:48:26.799141 kernel: random: crng init done Feb 9 00:48:26.799150 kernel: SMBIOS 2.8 present. Feb 9 00:48:26.799159 kernel: DMI: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015 Feb 9 00:48:26.799168 kernel: Hypervisor detected: KVM Feb 9 00:48:26.799176 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 9 00:48:26.799185 kernel: kvm-clock: cpu 0, msr 1afaa001, primary cpu clock Feb 9 00:48:26.799194 kernel: kvm-clock: using sched offset of 4048093099 cycles Feb 9 00:48:26.799204 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 9 00:48:26.799213 kernel: tsc: Detected 2794.750 MHz processor Feb 9 00:48:26.799224 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 00:48:26.799233 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 00:48:26.799242 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 Feb 9 00:48:26.799251 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 00:48:26.799260 kernel: Using GB pages for direct mapping Feb 9 00:48:26.799269 kernel: Secure boot disabled Feb 9 00:48:26.799278 kernel: ACPI: Early table checksum verification disabled Feb 9 00:48:26.799287 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) Feb 9 00:48:26.799296 kernel: ACPI: XSDT 0x000000009CB7D0E8 00004C (v01 BOCHS BXPC 00000001 01000013) Feb 9 00:48:26.799307 kernel: ACPI: FACP 0x000000009CB7A000 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 00:48:26.799316 kernel: ACPI: DSDT 0x000000009CB7B000 001A39 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 00:48:26.799325 kernel: ACPI: FACS 0x000000009CBDD000 000040 Feb 9 00:48:26.799334 kernel: ACPI: APIC 0x000000009CB79000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 00:48:26.799343 kernel: ACPI: HPET 0x000000009CB78000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 00:48:26.799352 kernel: ACPI: WAET 0x000000009CB77000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 00:48:26.799361 kernel: ACPI: BGRT 0x000000009CB76000 000038 (v01 INTEL EDK2 00000002 01000013) Feb 9 00:48:26.799370 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb7a000-0x9cb7a073] Feb 9 00:48:26.799379 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7b000-0x9cb7ca38] Feb 9 00:48:26.799390 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] Feb 9 00:48:26.799399 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb79000-0x9cb7908f] Feb 9 00:48:26.799408 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb78000-0x9cb78037] Feb 9 00:48:26.799417 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb77000-0x9cb77027] Feb 9 00:48:26.799426 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb76000-0x9cb76037] Feb 9 00:48:26.799435 kernel: No NUMA configuration found Feb 9 00:48:26.799444 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] Feb 9 00:48:26.799453 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] Feb 9 00:48:26.799462 kernel: Zone ranges: Feb 9 00:48:26.799474 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 00:48:26.799482 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] Feb 9 00:48:26.799491 kernel: Normal empty Feb 9 00:48:26.799500 kernel: Movable zone start for each node Feb 9 00:48:26.799509 kernel: Early memory node ranges Feb 9 00:48:26.799518 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Feb 9 00:48:26.799527 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] Feb 9 00:48:26.799536 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] Feb 9 00:48:26.799545 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] Feb 9 00:48:26.799556 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] Feb 9 00:48:26.799565 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] Feb 9 00:48:26.799574 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] Feb 9 00:48:26.799583 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 00:48:26.799591 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Feb 9 00:48:26.799601 kernel: On node 0, zone DMA: 8 pages in unavailable ranges Feb 9 00:48:26.799610 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 00:48:26.799619 kernel: On node 0, zone DMA: 240 pages in unavailable ranges Feb 9 00:48:26.799628 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges Feb 9 00:48:26.799646 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges Feb 9 00:48:26.799656 kernel: ACPI: PM-Timer IO Port: 0xb008 Feb 9 00:48:26.799665 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 9 00:48:26.799674 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 9 00:48:26.799683 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 9 00:48:26.799692 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 9 00:48:26.799701 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 00:48:26.799710 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 9 00:48:26.799720 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 9 00:48:26.799731 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 00:48:26.799740 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 9 00:48:26.799749 kernel: TSC deadline timer available Feb 9 00:48:26.799758 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Feb 9 00:48:26.799766 kernel: kvm-guest: KVM setup pv remote TLB flush Feb 9 00:48:26.799775 kernel: kvm-guest: setup PV sched yield Feb 9 00:48:26.799784 kernel: [mem 0x9d000000-0xffffffff] available for PCI devices Feb 9 00:48:26.799793 kernel: Booting paravirtualized kernel on KVM Feb 9 00:48:26.799802 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 00:48:26.799812 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Feb 9 00:48:26.799822 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u524288 Feb 9 00:48:26.799831 kernel: pcpu-alloc: s185624 r8192 d31464 u524288 alloc=1*2097152 Feb 9 00:48:26.799880 kernel: pcpu-alloc: [0] 0 1 2 3 Feb 9 00:48:26.799892 kernel: kvm-guest: setup async PF for cpu 0 Feb 9 00:48:26.799901 kernel: kvm-guest: stealtime: cpu 0, msr 9ae1c0c0 Feb 9 00:48:26.799910 kernel: kvm-guest: PV spinlocks enabled Feb 9 00:48:26.799919 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 9 00:48:26.799929 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 Feb 9 00:48:26.799938 kernel: Policy zone: DMA32 Feb 9 00:48:26.799949 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 00:48:26.799959 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 00:48:26.799970 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 00:48:26.799979 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 00:48:26.799988 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 00:48:26.800009 kernel: Memory: 2400436K/2567000K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 166304K reserved, 0K cma-reserved) Feb 9 00:48:26.800018 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Feb 9 00:48:26.800029 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 00:48:26.800038 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 00:48:26.800048 kernel: rcu: Hierarchical RCU implementation. Feb 9 00:48:26.800057 kernel: rcu: RCU event tracing is enabled. Feb 9 00:48:26.800066 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Feb 9 00:48:26.800076 kernel: Rude variant of Tasks RCU enabled. Feb 9 00:48:26.800085 kernel: Tracing variant of Tasks RCU enabled. Feb 9 00:48:26.800116 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 00:48:26.800126 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Feb 9 00:48:26.800138 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Feb 9 00:48:26.800147 kernel: Console: colour dummy device 80x25 Feb 9 00:48:26.800157 kernel: printk: console [ttyS0] enabled Feb 9 00:48:26.800166 kernel: ACPI: Core revision 20210730 Feb 9 00:48:26.800176 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Feb 9 00:48:26.800186 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 00:48:26.800195 kernel: x2apic enabled Feb 9 00:48:26.800204 kernel: Switched APIC routing to physical x2apic. Feb 9 00:48:26.800214 kernel: kvm-guest: setup PV IPIs Feb 9 00:48:26.800225 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 9 00:48:26.800235 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Feb 9 00:48:26.800244 kernel: Calibrating delay loop (skipped) preset value.. 5589.50 BogoMIPS (lpj=2794750) Feb 9 00:48:26.800254 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Feb 9 00:48:26.800263 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Feb 9 00:48:26.800273 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Feb 9 00:48:26.800282 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 00:48:26.800292 kernel: Spectre V2 : Mitigation: Retpolines Feb 9 00:48:26.800301 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 00:48:26.800313 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 9 00:48:26.800323 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Feb 9 00:48:26.800332 kernel: RETBleed: Mitigation: untrained return thunk Feb 9 00:48:26.800342 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 9 00:48:26.800351 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 9 00:48:26.800361 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 00:48:26.800370 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 00:48:26.800380 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 00:48:26.800389 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 00:48:26.800401 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Feb 9 00:48:26.800410 kernel: Freeing SMP alternatives memory: 32K Feb 9 00:48:26.800420 kernel: pid_max: default: 32768 minimum: 301 Feb 9 00:48:26.800429 kernel: LSM: Security Framework initializing Feb 9 00:48:26.800439 kernel: SELinux: Initializing. Feb 9 00:48:26.800448 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 00:48:26.800458 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 00:48:26.800468 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Feb 9 00:48:26.800479 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Feb 9 00:48:26.800489 kernel: ... version: 0 Feb 9 00:48:26.800498 kernel: ... bit width: 48 Feb 9 00:48:26.800507 kernel: ... generic registers: 6 Feb 9 00:48:26.800517 kernel: ... value mask: 0000ffffffffffff Feb 9 00:48:26.800526 kernel: ... max period: 00007fffffffffff Feb 9 00:48:26.800536 kernel: ... fixed-purpose events: 0 Feb 9 00:48:26.800545 kernel: ... event mask: 000000000000003f Feb 9 00:48:26.800554 kernel: signal: max sigframe size: 1776 Feb 9 00:48:26.800564 kernel: rcu: Hierarchical SRCU implementation. Feb 9 00:48:26.800575 kernel: smp: Bringing up secondary CPUs ... Feb 9 00:48:26.800584 kernel: x86: Booting SMP configuration: Feb 9 00:48:26.800594 kernel: .... node #0, CPUs: #1 Feb 9 00:48:26.800603 kernel: kvm-clock: cpu 1, msr 1afaa041, secondary cpu clock Feb 9 00:48:26.800612 kernel: kvm-guest: setup async PF for cpu 1 Feb 9 00:48:26.800622 kernel: kvm-guest: stealtime: cpu 1, msr 9ae9c0c0 Feb 9 00:48:26.800639 kernel: #2 Feb 9 00:48:26.800649 kernel: kvm-clock: cpu 2, msr 1afaa081, secondary cpu clock Feb 9 00:48:26.800658 kernel: kvm-guest: setup async PF for cpu 2 Feb 9 00:48:26.800669 kernel: kvm-guest: stealtime: cpu 2, msr 9af1c0c0 Feb 9 00:48:26.800679 kernel: #3 Feb 9 00:48:26.800688 kernel: kvm-clock: cpu 3, msr 1afaa0c1, secondary cpu clock Feb 9 00:48:26.800697 kernel: kvm-guest: setup async PF for cpu 3 Feb 9 00:48:26.800707 kernel: kvm-guest: stealtime: cpu 3, msr 9af9c0c0 Feb 9 00:48:26.800716 kernel: smp: Brought up 1 node, 4 CPUs Feb 9 00:48:26.800725 kernel: smpboot: Max logical packages: 1 Feb 9 00:48:26.800735 kernel: smpboot: Total of 4 processors activated (22358.00 BogoMIPS) Feb 9 00:48:26.800744 kernel: devtmpfs: initialized Feb 9 00:48:26.800756 kernel: x86/mm: Memory block size: 128MB Feb 9 00:48:26.800765 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) Feb 9 00:48:26.800775 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) Feb 9 00:48:26.800784 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) Feb 9 00:48:26.800794 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) Feb 9 00:48:26.800803 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) Feb 9 00:48:26.800813 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 00:48:26.800822 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Feb 9 00:48:26.800831 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 00:48:26.800853 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 00:48:26.800863 kernel: audit: initializing netlink subsys (disabled) Feb 9 00:48:26.800872 kernel: audit: type=2000 audit(1707439705.699:1): state=initialized audit_enabled=0 res=1 Feb 9 00:48:26.800881 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 00:48:26.800891 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 00:48:26.800900 kernel: cpuidle: using governor menu Feb 9 00:48:26.800909 kernel: ACPI: bus type PCI registered Feb 9 00:48:26.800919 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 00:48:26.800928 kernel: dca service started, version 1.12.1 Feb 9 00:48:26.800941 kernel: PCI: Using configuration type 1 for base access Feb 9 00:48:26.800950 kernel: PCI: Using configuration type 1 for extended access Feb 9 00:48:26.800960 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 00:48:26.800969 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 00:48:26.800979 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 00:48:26.800988 kernel: ACPI: Added _OSI(Module Device) Feb 9 00:48:26.800998 kernel: ACPI: Added _OSI(Processor Device) Feb 9 00:48:26.801007 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 00:48:26.801017 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 00:48:26.801028 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 00:48:26.801038 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 00:48:26.801047 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 00:48:26.801057 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 00:48:26.801066 kernel: ACPI: Interpreter enabled Feb 9 00:48:26.801076 kernel: ACPI: PM: (supports S0 S3 S5) Feb 9 00:48:26.801085 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 00:48:26.801106 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 00:48:26.801116 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Feb 9 00:48:26.801128 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 9 00:48:26.801272 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 9 00:48:26.801289 kernel: acpiphp: Slot [3] registered Feb 9 00:48:26.801299 kernel: acpiphp: Slot [4] registered Feb 9 00:48:26.801309 kernel: acpiphp: Slot [5] registered Feb 9 00:48:26.801318 kernel: acpiphp: Slot [6] registered Feb 9 00:48:26.801328 kernel: acpiphp: Slot [7] registered Feb 9 00:48:26.801337 kernel: acpiphp: Slot [8] registered Feb 9 00:48:26.801346 kernel: acpiphp: Slot [9] registered Feb 9 00:48:26.801358 kernel: acpiphp: Slot [10] registered Feb 9 00:48:26.801368 kernel: acpiphp: Slot [11] registered Feb 9 00:48:26.801377 kernel: acpiphp: Slot [12] registered Feb 9 00:48:26.801387 kernel: acpiphp: Slot [13] registered Feb 9 00:48:26.801396 kernel: acpiphp: Slot [14] registered Feb 9 00:48:26.801406 kernel: acpiphp: Slot [15] registered Feb 9 00:48:26.801415 kernel: acpiphp: Slot [16] registered Feb 9 00:48:26.801425 kernel: acpiphp: Slot [17] registered Feb 9 00:48:26.801434 kernel: acpiphp: Slot [18] registered Feb 9 00:48:26.801446 kernel: acpiphp: Slot [19] registered Feb 9 00:48:26.801455 kernel: acpiphp: Slot [20] registered Feb 9 00:48:26.801465 kernel: acpiphp: Slot [21] registered Feb 9 00:48:26.801474 kernel: acpiphp: Slot [22] registered Feb 9 00:48:26.801484 kernel: acpiphp: Slot [23] registered Feb 9 00:48:26.801493 kernel: acpiphp: Slot [24] registered Feb 9 00:48:26.801502 kernel: acpiphp: Slot [25] registered Feb 9 00:48:26.801511 kernel: acpiphp: Slot [26] registered Feb 9 00:48:26.801521 kernel: acpiphp: Slot [27] registered Feb 9 00:48:26.801530 kernel: acpiphp: Slot [28] registered Feb 9 00:48:26.801541 kernel: acpiphp: Slot [29] registered Feb 9 00:48:26.801550 kernel: acpiphp: Slot [30] registered Feb 9 00:48:26.801559 kernel: acpiphp: Slot [31] registered Feb 9 00:48:26.801569 kernel: PCI host bridge to bus 0000:00 Feb 9 00:48:26.801685 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 00:48:26.801780 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 00:48:26.801875 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 00:48:26.801967 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xfebfffff window] Feb 9 00:48:26.802053 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0x87fffffff window] Feb 9 00:48:26.802162 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 9 00:48:26.802279 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 9 00:48:26.802388 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 9 00:48:26.802503 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Feb 9 00:48:26.802603 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc0c0-0xc0cf] Feb 9 00:48:26.802715 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Feb 9 00:48:26.802814 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Feb 9 00:48:26.802913 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Feb 9 00:48:26.803011 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Feb 9 00:48:26.803133 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 9 00:48:26.803233 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Feb 9 00:48:26.803340 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Feb 9 00:48:26.803448 kernel: pci 0000:00:02.0: [1234:1111] type 00 class 0x030000 Feb 9 00:48:26.803547 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] Feb 9 00:48:26.803654 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xc1043000-0xc1043fff] Feb 9 00:48:26.803755 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] Feb 9 00:48:26.803854 kernel: pci 0000:00:02.0: BAR 0: assigned to efifb Feb 9 00:48:26.803952 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 9 00:48:26.804065 kernel: pci 0000:00:03.0: [1af4:1005] type 00 class 0x00ff00 Feb 9 00:48:26.804180 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0a0-0xc0bf] Feb 9 00:48:26.804285 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] Feb 9 00:48:26.804516 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] Feb 9 00:48:26.804611 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Feb 9 00:48:26.804691 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Feb 9 00:48:26.804759 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] Feb 9 00:48:26.804830 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] Feb 9 00:48:26.804903 kernel: pci 0000:00:05.0: [1af4:1000] type 00 class 0x020000 Feb 9 00:48:26.804990 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Feb 9 00:48:26.805063 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc1040000-0xc1040fff] Feb 9 00:48:26.805196 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] Feb 9 00:48:26.805321 kernel: pci 0000:00:05.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] Feb 9 00:48:26.805336 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 9 00:48:26.805349 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 9 00:48:26.805359 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 9 00:48:26.805368 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 9 00:48:26.805378 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 9 00:48:26.805387 kernel: iommu: Default domain type: Translated Feb 9 00:48:26.805397 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 00:48:26.805495 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Feb 9 00:48:26.805593 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 9 00:48:26.805703 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Feb 9 00:48:26.805720 kernel: vgaarb: loaded Feb 9 00:48:26.805730 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 00:48:26.805740 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 00:48:26.805749 kernel: PTP clock support registered Feb 9 00:48:26.805759 kernel: Registered efivars operations Feb 9 00:48:26.805768 kernel: PCI: Using ACPI for IRQ routing Feb 9 00:48:26.805778 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 00:48:26.805787 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] Feb 9 00:48:26.805797 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] Feb 9 00:48:26.805809 kernel: e820: reserve RAM buffer [mem 0x9b1aa018-0x9bffffff] Feb 9 00:48:26.805818 kernel: e820: reserve RAM buffer [mem 0x9b3f7018-0x9bffffff] Feb 9 00:48:26.805827 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] Feb 9 00:48:26.805837 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] Feb 9 00:48:26.805846 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Feb 9 00:48:26.805856 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Feb 9 00:48:26.805865 kernel: clocksource: Switched to clocksource kvm-clock Feb 9 00:48:26.805875 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 00:48:26.805885 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 00:48:26.805896 kernel: pnp: PnP ACPI init Feb 9 00:48:26.806017 kernel: pnp 00:02: [dma 2] Feb 9 00:48:26.806711 kernel: pnp: PnP ACPI: found 6 devices Feb 9 00:48:26.806725 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 00:48:26.806734 kernel: NET: Registered PF_INET protocol family Feb 9 00:48:26.806743 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 00:48:26.806753 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 9 00:48:26.806772 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 00:48:26.806786 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 00:48:26.806795 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 9 00:48:26.806805 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 9 00:48:26.806814 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 00:48:26.806833 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 00:48:26.806843 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 00:48:26.806853 kernel: NET: Registered PF_XDP protocol family Feb 9 00:48:26.806982 kernel: pci 0000:00:05.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window Feb 9 00:48:26.807195 kernel: pci 0000:00:05.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] Feb 9 00:48:26.807299 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 00:48:26.807395 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 00:48:26.807490 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 00:48:26.807585 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xfebfffff window] Feb 9 00:48:26.807694 kernel: pci_bus 0000:00: resource 8 [mem 0x800000000-0x87fffffff window] Feb 9 00:48:26.807804 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Feb 9 00:48:26.807913 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 9 00:48:26.808024 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 9 00:48:26.808038 kernel: PCI: CLS 0 bytes, default 64 Feb 9 00:48:26.808049 kernel: Initialise system trusted keyrings Feb 9 00:48:26.808059 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 9 00:48:26.808069 kernel: Key type asymmetric registered Feb 9 00:48:26.808078 kernel: Asymmetric key parser 'x509' registered Feb 9 00:48:26.808088 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 00:48:26.808160 kernel: io scheduler mq-deadline registered Feb 9 00:48:26.808171 kernel: io scheduler kyber registered Feb 9 00:48:26.808184 kernel: io scheduler bfq registered Feb 9 00:48:26.808194 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 00:48:26.808205 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 9 00:48:26.808215 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Feb 9 00:48:26.808225 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 9 00:48:26.808235 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 00:48:26.808244 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 00:48:26.808255 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 9 00:48:26.808264 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 9 00:48:26.808276 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 9 00:48:26.808389 kernel: rtc_cmos 00:05: RTC can wake from S4 Feb 9 00:48:26.808408 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 9 00:48:26.808504 kernel: rtc_cmos 00:05: registered as rtc0 Feb 9 00:48:26.808606 kernel: rtc_cmos 00:05: setting system clock to 2024-02-09T00:48:26 UTC (1707439706) Feb 9 00:48:26.808714 kernel: rtc_cmos 00:05: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Feb 9 00:48:26.808729 kernel: efifb: probing for efifb Feb 9 00:48:26.808739 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k Feb 9 00:48:26.808749 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 Feb 9 00:48:26.808759 kernel: efifb: scrolling: redraw Feb 9 00:48:26.808769 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 9 00:48:26.808779 kernel: Console: switching to colour frame buffer device 160x50 Feb 9 00:48:26.808789 kernel: fb0: EFI VGA frame buffer device Feb 9 00:48:26.808801 kernel: pstore: Registered efi as persistent store backend Feb 9 00:48:26.808811 kernel: NET: Registered PF_INET6 protocol family Feb 9 00:48:26.808821 kernel: Segment Routing with IPv6 Feb 9 00:48:26.808831 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 00:48:26.808841 kernel: NET: Registered PF_PACKET protocol family Feb 9 00:48:26.808851 kernel: Key type dns_resolver registered Feb 9 00:48:26.808860 kernel: IPI shorthand broadcast: enabled Feb 9 00:48:26.808870 kernel: sched_clock: Marking stable (354133791, 91319945)->(468342943, -22889207) Feb 9 00:48:26.808880 kernel: registered taskstats version 1 Feb 9 00:48:26.808890 kernel: Loading compiled-in X.509 certificates Feb 9 00:48:26.808902 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: e9d857ae0e8100c174221878afd1046acbb054a6' Feb 9 00:48:26.808912 kernel: Key type .fscrypt registered Feb 9 00:48:26.808922 kernel: Key type fscrypt-provisioning registered Feb 9 00:48:26.808932 kernel: pstore: Using crash dump compression: deflate Feb 9 00:48:26.808942 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 00:48:26.808952 kernel: ima: Allocated hash algorithm: sha1 Feb 9 00:48:26.808961 kernel: ima: No architecture policies found Feb 9 00:48:26.808971 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 00:48:26.808984 kernel: Write protecting the kernel read-only data: 28672k Feb 9 00:48:26.808995 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 00:48:26.809005 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 00:48:26.809015 kernel: Run /init as init process Feb 9 00:48:26.809025 kernel: with arguments: Feb 9 00:48:26.809034 kernel: /init Feb 9 00:48:26.809044 kernel: with environment: Feb 9 00:48:26.809053 kernel: HOME=/ Feb 9 00:48:26.809063 kernel: TERM=linux Feb 9 00:48:26.809072 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 00:48:26.809087 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 00:48:26.809113 systemd[1]: Detected virtualization kvm. Feb 9 00:48:26.809124 systemd[1]: Detected architecture x86-64. Feb 9 00:48:26.809134 systemd[1]: Running in initrd. Feb 9 00:48:26.809144 systemd[1]: No hostname configured, using default hostname. Feb 9 00:48:26.809155 systemd[1]: Hostname set to . Feb 9 00:48:26.809166 systemd[1]: Initializing machine ID from VM UUID. Feb 9 00:48:26.809178 systemd[1]: Queued start job for default target initrd.target. Feb 9 00:48:26.809189 systemd[1]: Started systemd-ask-password-console.path. Feb 9 00:48:26.809199 systemd[1]: Reached target cryptsetup.target. Feb 9 00:48:26.809209 systemd[1]: Reached target paths.target. Feb 9 00:48:26.809219 systemd[1]: Reached target slices.target. Feb 9 00:48:26.809229 systemd[1]: Reached target swap.target. Feb 9 00:48:26.809240 systemd[1]: Reached target timers.target. Feb 9 00:48:26.809253 systemd[1]: Listening on iscsid.socket. Feb 9 00:48:26.809264 systemd[1]: Listening on iscsiuio.socket. Feb 9 00:48:26.809274 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 00:48:26.809284 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 00:48:26.809295 systemd[1]: Listening on systemd-journald.socket. Feb 9 00:48:26.809305 systemd[1]: Listening on systemd-networkd.socket. Feb 9 00:48:26.809316 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 00:48:26.809326 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 00:48:26.809337 systemd[1]: Reached target sockets.target. Feb 9 00:48:26.809349 systemd[1]: Starting kmod-static-nodes.service... Feb 9 00:48:26.809360 systemd[1]: Finished network-cleanup.service. Feb 9 00:48:26.809370 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 00:48:26.809381 systemd[1]: Starting systemd-journald.service... Feb 9 00:48:26.809391 systemd[1]: Starting systemd-modules-load.service... Feb 9 00:48:26.809402 systemd[1]: Starting systemd-resolved.service... Feb 9 00:48:26.809412 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 00:48:26.809422 systemd[1]: Finished kmod-static-nodes.service. Feb 9 00:48:26.809433 kernel: audit: type=1130 audit(1707439706.797:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:26.809446 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 00:48:26.809457 kernel: audit: type=1130 audit(1707439706.801:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:26.809467 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 00:48:26.809478 kernel: audit: type=1130 audit(1707439706.806:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:26.809490 systemd-journald[196]: Journal started Feb 9 00:48:26.809541 systemd-journald[196]: Runtime Journal (/run/log/journal/5af944cbb1c94ec4a7fc721eebf27de5) is 6.0M, max 48.4M, 42.4M free. Feb 9 00:48:26.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:26.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:26.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:26.800866 systemd-modules-load[197]: Inserted module 'overlay' Feb 9 00:48:26.811360 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 00:48:26.820176 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 00:48:26.820206 systemd[1]: Started systemd-journald.service. Feb 9 00:48:26.820220 kernel: audit: type=1130 audit(1707439706.817:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:26.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:26.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:26.821146 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 00:48:26.823531 systemd-resolved[198]: Positive Trust Anchors: Feb 9 00:48:26.823539 systemd-resolved[198]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 00:48:26.823565 systemd-resolved[198]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 00:48:26.833368 kernel: audit: type=1130 audit(1707439706.821:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:26.833398 kernel: audit: type=1130 audit(1707439706.826:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:26.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:26.826025 systemd-resolved[198]: Defaulting to hostname 'linux'. Feb 9 00:48:26.826662 systemd[1]: Started systemd-resolved.service. Feb 9 00:48:26.826861 systemd[1]: Reached target nss-lookup.target. Feb 9 00:48:26.836122 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 00:48:26.836983 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 00:48:26.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:26.837864 systemd[1]: Starting dracut-cmdline.service... Feb 9 00:48:26.841272 kernel: audit: type=1130 audit(1707439706.837:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:26.841291 kernel: Bridge firewalling registered Feb 9 00:48:26.841265 systemd-modules-load[197]: Inserted module 'br_netfilter' Feb 9 00:48:26.846458 dracut-cmdline[215]: dracut-dracut-053 Feb 9 00:48:26.848386 dracut-cmdline[215]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 00:48:26.859120 kernel: SCSI subsystem initialized Feb 9 00:48:26.869691 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 00:48:26.869733 kernel: device-mapper: uevent: version 1.0.3 Feb 9 00:48:26.869747 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 00:48:26.872314 systemd-modules-load[197]: Inserted module 'dm_multipath' Feb 9 00:48:26.872845 systemd[1]: Finished systemd-modules-load.service. Feb 9 00:48:26.876329 kernel: audit: type=1130 audit(1707439706.873:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:26.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:26.874105 systemd[1]: Starting systemd-sysctl.service... Feb 9 00:48:26.881779 systemd[1]: Finished systemd-sysctl.service. Feb 9 00:48:26.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:26.885116 kernel: audit: type=1130 audit(1707439706.882:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:26.903109 kernel: Loading iSCSI transport class v2.0-870. Feb 9 00:48:26.913115 kernel: iscsi: registered transport (tcp) Feb 9 00:48:26.931148 kernel: iscsi: registered transport (qla4xxx) Feb 9 00:48:26.931174 kernel: QLogic iSCSI HBA Driver Feb 9 00:48:26.956536 systemd[1]: Finished dracut-cmdline.service. Feb 9 00:48:26.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:26.957876 systemd[1]: Starting dracut-pre-udev.service... Feb 9 00:48:27.002111 kernel: raid6: avx2x4 gen() 30019 MB/s Feb 9 00:48:27.019105 kernel: raid6: avx2x4 xor() 7385 MB/s Feb 9 00:48:27.036111 kernel: raid6: avx2x2 gen() 32266 MB/s Feb 9 00:48:27.053105 kernel: raid6: avx2x2 xor() 18402 MB/s Feb 9 00:48:27.070132 kernel: raid6: avx2x1 gen() 23295 MB/s Feb 9 00:48:27.087120 kernel: raid6: avx2x1 xor() 12956 MB/s Feb 9 00:48:27.104117 kernel: raid6: sse2x4 gen() 13192 MB/s Feb 9 00:48:27.121116 kernel: raid6: sse2x4 xor() 6344 MB/s Feb 9 00:48:27.138109 kernel: raid6: sse2x2 gen() 15536 MB/s Feb 9 00:48:27.155123 kernel: raid6: sse2x2 xor() 9820 MB/s Feb 9 00:48:27.172118 kernel: raid6: sse2x1 gen() 12042 MB/s Feb 9 00:48:27.189555 kernel: raid6: sse2x1 xor() 7789 MB/s Feb 9 00:48:27.189583 kernel: raid6: using algorithm avx2x2 gen() 32266 MB/s Feb 9 00:48:27.189596 kernel: raid6: .... xor() 18402 MB/s, rmw enabled Feb 9 00:48:27.189608 kernel: raid6: using avx2x2 recovery algorithm Feb 9 00:48:27.202114 kernel: xor: automatically using best checksumming function avx Feb 9 00:48:27.294129 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 00:48:27.301291 systemd[1]: Finished dracut-pre-udev.service. Feb 9 00:48:27.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:27.302000 audit: BPF prog-id=7 op=LOAD Feb 9 00:48:27.302000 audit: BPF prog-id=8 op=LOAD Feb 9 00:48:27.302846 systemd[1]: Starting systemd-udevd.service... Feb 9 00:48:27.313938 systemd-udevd[399]: Using default interface naming scheme 'v252'. Feb 9 00:48:27.317406 systemd[1]: Started systemd-udevd.service. Feb 9 00:48:27.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:27.318996 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 00:48:27.330878 dracut-pre-trigger[406]: rd.md=0: removing MD RAID activation Feb 9 00:48:27.354035 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 00:48:27.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:27.355175 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 00:48:27.388109 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 00:48:27.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:27.412125 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Feb 9 00:48:27.416134 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 00:48:27.430377 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 00:48:27.430414 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 00:48:27.430424 kernel: GPT:9289727 != 19775487 Feb 9 00:48:27.431340 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 00:48:27.431360 kernel: GPT:9289727 != 19775487 Feb 9 00:48:27.432226 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 00:48:27.432245 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 00:48:27.433120 kernel: AES CTR mode by8 optimization enabled Feb 9 00:48:27.435122 kernel: libata version 3.00 loaded. Feb 9 00:48:27.439118 kernel: ata_piix 0000:00:01.1: version 2.13 Feb 9 00:48:27.445084 kernel: scsi host0: ata_piix Feb 9 00:48:27.445222 kernel: scsi host1: ata_piix Feb 9 00:48:27.445308 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0c0 irq 14 Feb 9 00:48:27.445318 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0c8 irq 15 Feb 9 00:48:27.453112 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (451) Feb 9 00:48:27.456713 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 00:48:27.456928 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 00:48:27.462370 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 00:48:27.465524 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 00:48:27.470947 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 00:48:27.471909 systemd[1]: Starting disk-uuid.service... Feb 9 00:48:27.477538 disk-uuid[521]: Primary Header is updated. Feb 9 00:48:27.477538 disk-uuid[521]: Secondary Entries is updated. Feb 9 00:48:27.477538 disk-uuid[521]: Secondary Header is updated. Feb 9 00:48:27.480111 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 00:48:27.603111 kernel: ata2.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Feb 9 00:48:27.603161 kernel: scsi 1:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Feb 9 00:48:27.635143 kernel: sr 1:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Feb 9 00:48:27.635348 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 9 00:48:27.653115 kernel: sr 1:0:0:0: Attached scsi CD-ROM sr0 Feb 9 00:48:28.486127 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 00:48:28.486273 disk-uuid[522]: The operation has completed successfully. Feb 9 00:48:28.506596 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 00:48:28.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:28.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:28.506675 systemd[1]: Finished disk-uuid.service. Feb 9 00:48:28.514266 systemd[1]: Starting verity-setup.service... Feb 9 00:48:28.526126 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Feb 9 00:48:28.544530 systemd[1]: Found device dev-mapper-usr.device. Feb 9 00:48:28.547015 systemd[1]: Mounting sysusr-usr.mount... Feb 9 00:48:28.548966 systemd[1]: Finished verity-setup.service. Feb 9 00:48:28.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:28.608107 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 00:48:28.608370 systemd[1]: Mounted sysusr-usr.mount. Feb 9 00:48:28.609126 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 00:48:28.609721 systemd[1]: Starting ignition-setup.service... Feb 9 00:48:28.611595 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 00:48:28.618367 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 00:48:28.618391 kernel: BTRFS info (device vda6): using free space tree Feb 9 00:48:28.618401 kernel: BTRFS info (device vda6): has skinny extents Feb 9 00:48:28.628037 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 00:48:28.634984 systemd[1]: Finished ignition-setup.service. Feb 9 00:48:28.636281 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 00:48:28.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:28.669306 ignition[635]: Ignition 2.14.0 Feb 9 00:48:28.669347 ignition[635]: Stage: fetch-offline Feb 9 00:48:28.669384 ignition[635]: no configs at "/usr/lib/ignition/base.d" Feb 9 00:48:28.669391 ignition[635]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 00:48:28.669480 ignition[635]: parsed url from cmdline: "" Feb 9 00:48:28.669483 ignition[635]: no config URL provided Feb 9 00:48:28.669487 ignition[635]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 00:48:28.669494 ignition[635]: no config at "/usr/lib/ignition/user.ign" Feb 9 00:48:28.669509 ignition[635]: op(1): [started] loading QEMU firmware config module Feb 9 00:48:28.669514 ignition[635]: op(1): executing: "modprobe" "qemu_fw_cfg" Feb 9 00:48:28.677775 ignition[635]: op(1): [finished] loading QEMU firmware config module Feb 9 00:48:28.681373 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 00:48:28.683312 systemd[1]: Starting systemd-networkd.service... Feb 9 00:48:28.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:28.682000 audit: BPF prog-id=9 op=LOAD Feb 9 00:48:28.739959 ignition[635]: parsing config with SHA512: a13db17f424b6d6d9cd40591b81c5d44a6230c6ab0a2af0996432a701dab62c86d3ad4b306f37c5a344263915bba9a9b6eed4b7167d8c4e92b69bbe7cb0dc80c Feb 9 00:48:28.759210 systemd-networkd[715]: lo: Link UP Feb 9 00:48:28.759219 systemd-networkd[715]: lo: Gained carrier Feb 9 00:48:28.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:28.759598 systemd-networkd[715]: Enumeration completed Feb 9 00:48:28.759676 systemd[1]: Started systemd-networkd.service. Feb 9 00:48:28.759784 systemd-networkd[715]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 00:48:28.760767 systemd-networkd[715]: eth0: Link UP Feb 9 00:48:28.760770 systemd-networkd[715]: eth0: Gained carrier Feb 9 00:48:28.760883 systemd[1]: Reached target network.target. Feb 9 00:48:28.762690 systemd[1]: Starting iscsiuio.service... Feb 9 00:48:28.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:28.766851 systemd[1]: Started iscsiuio.service. Feb 9 00:48:28.768667 systemd[1]: Starting iscsid.service... Feb 9 00:48:28.771718 iscsid[720]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 00:48:28.771718 iscsid[720]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 00:48:28.771718 iscsid[720]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 00:48:28.771718 iscsid[720]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 00:48:28.771718 iscsid[720]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 00:48:28.771718 iscsid[720]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 00:48:28.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:28.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:28.772755 systemd[1]: Started iscsid.service. Feb 9 00:48:28.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:28.775224 ignition[635]: fetch-offline: fetch-offline passed Feb 9 00:48:28.773624 systemd[1]: Starting dracut-initqueue.service... Feb 9 00:48:28.775285 ignition[635]: Ignition finished successfully Feb 9 00:48:28.774623 unknown[635]: fetched base config from "system" Feb 9 00:48:28.774631 unknown[635]: fetched user config from "qemu" Feb 9 00:48:28.776183 systemd-networkd[715]: eth0: DHCPv4 address 10.0.0.84/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 9 00:48:28.790656 ignition[727]: Ignition 2.14.0 Feb 9 00:48:28.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:28.778330 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 00:48:28.790661 ignition[727]: Stage: kargs Feb 9 00:48:28.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:28.779893 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 9 00:48:28.790738 ignition[727]: no configs at "/usr/lib/ignition/base.d" Feb 9 00:48:28.780829 systemd[1]: Starting ignition-kargs.service... Feb 9 00:48:28.790746 ignition[727]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 00:48:28.782620 systemd[1]: Finished dracut-initqueue.service. Feb 9 00:48:28.791684 ignition[727]: kargs: kargs passed Feb 9 00:48:28.784333 systemd[1]: Reached target remote-fs-pre.target. Feb 9 00:48:28.791716 ignition[727]: Ignition finished successfully Feb 9 00:48:28.785004 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 00:48:28.785429 systemd[1]: Reached target remote-fs.target. Feb 9 00:48:28.801265 ignition[740]: Ignition 2.14.0 Feb 9 00:48:28.786132 systemd[1]: Starting dracut-pre-mount.service... Feb 9 00:48:28.801271 ignition[740]: Stage: disks Feb 9 00:48:28.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:28.792666 systemd[1]: Finished ignition-kargs.service. Feb 9 00:48:28.801344 ignition[740]: no configs at "/usr/lib/ignition/base.d" Feb 9 00:48:28.793830 systemd[1]: Finished dracut-pre-mount.service. Feb 9 00:48:28.801351 ignition[740]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 00:48:28.795560 systemd[1]: Starting ignition-disks.service... Feb 9 00:48:28.802420 ignition[740]: disks: disks passed Feb 9 00:48:28.802952 systemd[1]: Finished ignition-disks.service. Feb 9 00:48:28.802451 ignition[740]: Ignition finished successfully Feb 9 00:48:28.804125 systemd[1]: Reached target initrd-root-device.target. Feb 9 00:48:28.805176 systemd[1]: Reached target local-fs-pre.target. Feb 9 00:48:28.805750 systemd[1]: Reached target local-fs.target. Feb 9 00:48:28.806294 systemd[1]: Reached target sysinit.target. Feb 9 00:48:28.807470 systemd[1]: Reached target basic.target. Feb 9 00:48:28.819023 systemd-fsck[748]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 9 00:48:28.808731 systemd[1]: Starting systemd-fsck-root.service... Feb 9 00:48:28.823387 systemd[1]: Finished systemd-fsck-root.service. Feb 9 00:48:28.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:28.825333 systemd[1]: Mounting sysroot.mount... Feb 9 00:48:28.832119 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 00:48:28.832229 systemd[1]: Mounted sysroot.mount. Feb 9 00:48:28.833435 systemd[1]: Reached target initrd-root-fs.target. Feb 9 00:48:28.835104 systemd[1]: Mounting sysroot-usr.mount... Feb 9 00:48:28.835571 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 9 00:48:28.835624 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 00:48:28.835645 systemd[1]: Reached target ignition-diskful.target. Feb 9 00:48:28.837290 systemd[1]: Mounted sysroot-usr.mount. Feb 9 00:48:28.839789 systemd[1]: Starting initrd-setup-root.service... Feb 9 00:48:28.845886 initrd-setup-root[758]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 00:48:28.848860 initrd-setup-root[766]: cut: /sysroot/etc/group: No such file or directory Feb 9 00:48:28.851393 initrd-setup-root[774]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 00:48:28.854869 initrd-setup-root[782]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 00:48:28.876220 systemd[1]: Finished initrd-setup-root.service. Feb 9 00:48:28.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:28.877296 systemd[1]: Starting ignition-mount.service... Feb 9 00:48:28.878084 systemd[1]: Starting sysroot-boot.service... Feb 9 00:48:28.884025 bash[800]: umount: /sysroot/usr/share/oem: not mounted. Feb 9 00:48:28.891019 ignition[801]: INFO : Ignition 2.14.0 Feb 9 00:48:28.891019 ignition[801]: INFO : Stage: mount Feb 9 00:48:28.892088 ignition[801]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 9 00:48:28.892088 ignition[801]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 00:48:28.892088 ignition[801]: INFO : mount: mount passed Feb 9 00:48:28.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:28.891524 systemd[1]: Finished sysroot-boot.service. Feb 9 00:48:28.895891 ignition[801]: INFO : Ignition finished successfully Feb 9 00:48:28.897049 systemd[1]: Finished ignition-mount.service. Feb 9 00:48:28.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:29.555236 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 00:48:29.561842 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (809) Feb 9 00:48:29.561867 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 00:48:29.561884 kernel: BTRFS info (device vda6): using free space tree Feb 9 00:48:29.562399 kernel: BTRFS info (device vda6): has skinny extents Feb 9 00:48:29.565648 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 00:48:29.566507 systemd[1]: Starting ignition-files.service... Feb 9 00:48:29.579956 ignition[829]: INFO : Ignition 2.14.0 Feb 9 00:48:29.579956 ignition[829]: INFO : Stage: files Feb 9 00:48:29.581141 ignition[829]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 9 00:48:29.581141 ignition[829]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 00:48:29.582804 ignition[829]: DEBUG : files: compiled without relabeling support, skipping Feb 9 00:48:29.582804 ignition[829]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 00:48:29.582804 ignition[829]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 00:48:29.585509 ignition[829]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 00:48:29.585509 ignition[829]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 00:48:29.585509 ignition[829]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 00:48:29.585509 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 00:48:29.585509 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 9 00:48:29.584276 unknown[829]: wrote ssh authorized keys file for user: core Feb 9 00:48:30.060945 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 00:48:30.197594 ignition[829]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 9 00:48:30.199649 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 00:48:30.199649 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 00:48:30.199649 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 9 00:48:30.513291 systemd-networkd[715]: eth0: Gained IPv6LL Feb 9 00:48:30.618972 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 00:48:30.693978 ignition[829]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 9 00:48:30.696082 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 00:48:30.696082 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 00:48:30.696082 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 9 00:48:30.713320 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 00:48:30.771117 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 00:48:30.772543 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 00:48:30.772543 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Feb 9 00:48:30.844160 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 00:48:31.045182 ignition[829]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Feb 9 00:48:31.045182 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 00:48:31.048692 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 00:48:31.048692 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Feb 9 00:48:31.093708 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 9 00:48:31.693549 ignition[829]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Feb 9 00:48:31.696670 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 00:48:31.696670 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Feb 9 00:48:31.696670 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubectl: attempt #1 Feb 9 00:48:31.740225 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 9 00:48:31.923701 ignition[829]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 857e67001e74840518413593d90c6e64ad3f00d55fa44ad9a8e2ed6135392c908caff7ec19af18cbe10784b8f83afe687a0bc3bacbc9eee984cdeb9c0749cb83 Feb 9 00:48:31.925907 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 9 00:48:31.925907 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 00:48:31.925907 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 00:48:31.925907 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 9 00:48:31.925907 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 00:48:31.925907 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 9 00:48:31.925907 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 9 00:48:31.925907 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 00:48:31.925907 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 00:48:31.925907 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 00:48:31.925907 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 00:48:31.925907 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 00:48:31.925907 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 00:48:31.925907 ignition[829]: INFO : files: op(f): [started] processing unit "prepare-cni-plugins.service" Feb 9 00:48:31.925907 ignition[829]: INFO : files: op(f): op(10): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 00:48:31.925907 ignition[829]: INFO : files: op(f): op(10): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 00:48:31.925907 ignition[829]: INFO : files: op(f): [finished] processing unit "prepare-cni-plugins.service" Feb 9 00:48:31.950588 ignition[829]: INFO : files: op(11): [started] processing unit "prepare-critools.service" Feb 9 00:48:31.950588 ignition[829]: INFO : files: op(11): op(12): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 00:48:31.950588 ignition[829]: INFO : files: op(11): op(12): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 00:48:31.950588 ignition[829]: INFO : files: op(11): [finished] processing unit "prepare-critools.service" Feb 9 00:48:31.950588 ignition[829]: INFO : files: op(13): [started] processing unit "prepare-helm.service" Feb 9 00:48:31.950588 ignition[829]: INFO : files: op(13): op(14): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 00:48:31.950588 ignition[829]: INFO : files: op(13): op(14): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 00:48:31.950588 ignition[829]: INFO : files: op(13): [finished] processing unit "prepare-helm.service" Feb 9 00:48:31.950588 ignition[829]: INFO : files: op(15): [started] processing unit "coreos-metadata.service" Feb 9 00:48:31.950588 ignition[829]: INFO : files: op(15): op(16): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 9 00:48:31.950588 ignition[829]: INFO : files: op(15): op(16): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 9 00:48:31.950588 ignition[829]: INFO : files: op(15): [finished] processing unit "coreos-metadata.service" Feb 9 00:48:31.950588 ignition[829]: INFO : files: op(17): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 00:48:31.950588 ignition[829]: INFO : files: op(17): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 00:48:31.950588 ignition[829]: INFO : files: op(18): [started] setting preset to enabled for "prepare-critools.service" Feb 9 00:48:31.950588 ignition[829]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 00:48:31.950588 ignition[829]: INFO : files: op(19): [started] setting preset to enabled for "prepare-helm.service" Feb 9 00:48:31.950588 ignition[829]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-helm.service" Feb 9 00:48:31.950588 ignition[829]: INFO : files: op(1a): [started] setting preset to disabled for "coreos-metadata.service" Feb 9 00:48:31.988782 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 00:48:31.988810 kernel: audit: type=1130 audit(1707439711.952:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:31.988827 kernel: audit: type=1130 audit(1707439711.962:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:31.988837 kernel: audit: type=1131 audit(1707439711.962:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:31.988846 kernel: audit: type=1130 audit(1707439711.970:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:31.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:31.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:31.962000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:31.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:31.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:31.951162 systemd[1]: Finished ignition-files.service. Feb 9 00:48:31.995116 kernel: audit: type=1130 audit(1707439711.988:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:31.995134 kernel: audit: type=1131 audit(1707439711.988:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:31.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:31.995195 ignition[829]: INFO : files: op(1a): op(1b): [started] removing enablement symlink(s) for "coreos-metadata.service" Feb 9 00:48:31.995195 ignition[829]: INFO : files: op(1a): op(1b): [finished] removing enablement symlink(s) for "coreos-metadata.service" Feb 9 00:48:31.995195 ignition[829]: INFO : files: op(1a): [finished] setting preset to disabled for "coreos-metadata.service" Feb 9 00:48:31.995195 ignition[829]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 00:48:31.995195 ignition[829]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 00:48:31.995195 ignition[829]: INFO : files: files passed Feb 9 00:48:31.995195 ignition[829]: INFO : Ignition finished successfully Feb 9 00:48:31.953124 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 00:48:31.958000 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 00:48:32.004243 initrd-setup-root-after-ignition[852]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Feb 9 00:48:31.959238 systemd[1]: Starting ignition-quench.service... Feb 9 00:48:32.009592 kernel: audit: type=1130 audit(1707439712.005:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.009643 initrd-setup-root-after-ignition[855]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 00:48:31.961631 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 00:48:31.961701 systemd[1]: Finished ignition-quench.service. Feb 9 00:48:31.962743 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 00:48:31.970253 systemd[1]: Reached target ignition-complete.target. Feb 9 00:48:31.975606 systemd[1]: Starting initrd-parse-etc.service... Feb 9 00:48:31.987487 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 00:48:31.987640 systemd[1]: Finished initrd-parse-etc.service. Feb 9 00:48:31.988951 systemd[1]: Reached target initrd-fs.target. Feb 9 00:48:31.994105 systemd[1]: Reached target initrd.target. Feb 9 00:48:32.022859 kernel: audit: type=1131 audit(1707439712.018:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:31.995142 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 00:48:32.036535 kernel: audit: type=1131 audit(1707439712.023:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.036562 kernel: audit: type=1131 audit(1707439712.023:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:31.996016 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 00:48:32.004934 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 00:48:32.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.006626 systemd[1]: Starting initrd-cleanup.service... Feb 9 00:48:32.014278 systemd[1]: Stopped target network.target. Feb 9 00:48:32.046676 ignition[869]: INFO : Ignition 2.14.0 Feb 9 00:48:32.046676 ignition[869]: INFO : Stage: umount Feb 9 00:48:32.046676 ignition[869]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 9 00:48:32.046676 ignition[869]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 00:48:32.014914 systemd[1]: Stopped target nss-lookup.target. Feb 9 00:48:32.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.051358 ignition[869]: INFO : umount: umount passed Feb 9 00:48:32.051358 ignition[869]: INFO : Ignition finished successfully Feb 9 00:48:32.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.052000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.016239 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 00:48:32.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.016872 systemd[1]: Stopped target timers.target. Feb 9 00:48:32.017904 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 00:48:32.017955 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 00:48:32.019131 systemd[1]: Stopped target initrd.target. Feb 9 00:48:32.022885 systemd[1]: Stopped target basic.target. Feb 9 00:48:32.023433 systemd[1]: Stopped target ignition-complete.target. Feb 9 00:48:32.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.023730 systemd[1]: Stopped target ignition-diskful.target. Feb 9 00:48:32.059000 audit: BPF prog-id=6 op=UNLOAD Feb 9 00:48:32.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.023846 systemd[1]: Stopped target initrd-root-device.target. Feb 9 00:48:32.023985 systemd[1]: Stopped target remote-fs.target. Feb 9 00:48:32.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.024110 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 00:48:32.024218 systemd[1]: Stopped target sysinit.target. Feb 9 00:48:32.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.024322 systemd[1]: Stopped target local-fs.target. Feb 9 00:48:32.066000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.024427 systemd[1]: Stopped target local-fs-pre.target. Feb 9 00:48:32.024548 systemd[1]: Stopped target swap.target. Feb 9 00:48:32.024669 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 00:48:32.024713 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 00:48:32.024821 systemd[1]: Stopped target cryptsetup.target. Feb 9 00:48:32.027696 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 00:48:32.027725 systemd[1]: Stopped dracut-initqueue.service. Feb 9 00:48:32.027842 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 00:48:32.073000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.027868 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 00:48:32.030770 systemd[1]: Stopped target paths.target. Feb 9 00:48:32.030842 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 00:48:32.037123 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 00:48:32.038081 systemd[1]: Stopped target slices.target. Feb 9 00:48:32.038303 systemd[1]: Stopped target sockets.target. Feb 9 00:48:32.038628 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 00:48:32.038648 systemd[1]: Closed iscsid.socket. Feb 9 00:48:32.038773 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 00:48:32.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.038790 systemd[1]: Closed iscsiuio.socket. Feb 9 00:48:32.038929 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 00:48:32.038957 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 00:48:32.039078 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 00:48:32.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.085000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.039128 systemd[1]: Stopped ignition-files.service. Feb 9 00:48:32.040179 systemd[1]: Stopping ignition-mount.service... Feb 9 00:48:32.086000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.040910 systemd[1]: Stopping sysroot-boot.service... Feb 9 00:48:32.041664 systemd[1]: Stopping systemd-networkd.service... Feb 9 00:48:32.041898 systemd[1]: Stopping systemd-resolved.service... Feb 9 00:48:32.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.042245 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 00:48:32.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.091000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.042279 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 00:48:32.042510 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 00:48:32.042536 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 00:48:32.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.043054 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 00:48:32.043207 systemd[1]: Finished initrd-cleanup.service. Feb 9 00:48:32.048718 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 00:48:32.048806 systemd[1]: Stopped ignition-mount.service. Feb 9 00:48:32.050246 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 00:48:32.050286 systemd[1]: Stopped ignition-disks.service. Feb 9 00:48:32.051192 systemd-networkd[715]: eth0: DHCPv6 lease lost Feb 9 00:48:32.098000 audit: BPF prog-id=9 op=UNLOAD Feb 9 00:48:32.051337 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 00:48:32.051369 systemd[1]: Stopped ignition-kargs.service. Feb 9 00:48:32.052532 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 00:48:32.052560 systemd[1]: Stopped ignition-setup.service. Feb 9 00:48:32.053903 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 00:48:32.053979 systemd[1]: Stopped systemd-resolved.service. Feb 9 00:48:32.057397 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 00:48:32.057712 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 00:48:32.057784 systemd[1]: Stopped systemd-networkd.service. Feb 9 00:48:32.060056 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 00:48:32.060187 systemd[1]: Stopped sysroot-boot.service. Feb 9 00:48:32.061154 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 00:48:32.061178 systemd[1]: Closed systemd-networkd.socket. Feb 9 00:48:32.062374 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 00:48:32.062404 systemd[1]: Stopped initrd-setup-root.service. Feb 9 00:48:32.064209 systemd[1]: Stopping network-cleanup.service... Feb 9 00:48:32.064752 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 00:48:32.064787 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 00:48:32.066039 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 00:48:32.066070 systemd[1]: Stopped systemd-sysctl.service. Feb 9 00:48:32.067188 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 00:48:32.067218 systemd[1]: Stopped systemd-modules-load.service. Feb 9 00:48:32.067923 systemd[1]: Stopping systemd-udevd.service... Feb 9 00:48:32.069231 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 00:48:32.073064 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 00:48:32.073249 systemd[1]: Stopped network-cleanup.service. Feb 9 00:48:32.078876 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 00:48:32.078992 systemd[1]: Stopped systemd-udevd.service. Feb 9 00:48:32.080518 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 00:48:32.080549 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 00:48:32.081511 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 00:48:32.081535 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 00:48:32.082802 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 00:48:32.082843 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 00:48:32.084015 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 00:48:32.084051 systemd[1]: Stopped dracut-cmdline.service. Feb 9 00:48:32.085179 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 00:48:32.085212 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 00:48:32.086930 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 00:48:32.087876 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 9 00:48:32.087914 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 9 00:48:32.089570 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 00:48:32.089609 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 00:48:32.090227 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 00:48:32.090266 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 00:48:32.092187 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 9 00:48:32.092559 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 00:48:32.092625 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 00:48:32.093543 systemd[1]: Reached target initrd-switch-root.target. Feb 9 00:48:32.095137 systemd[1]: Starting initrd-switch-root.service... Feb 9 00:48:32.112900 systemd[1]: Switching root. Feb 9 00:48:32.134430 iscsid[720]: iscsid shutting down. Feb 9 00:48:32.134971 systemd-journald[196]: Journal stopped Feb 9 00:48:34.819320 systemd-journald[196]: Received SIGTERM from PID 1 (systemd). Feb 9 00:48:34.819379 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 00:48:34.819397 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 00:48:34.819411 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 00:48:34.819433 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 00:48:34.819447 kernel: SELinux: policy capability open_perms=1 Feb 9 00:48:34.819461 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 00:48:34.819474 kernel: SELinux: policy capability always_check_network=0 Feb 9 00:48:34.819491 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 00:48:34.819507 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 00:48:34.819525 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 00:48:34.819542 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 00:48:34.819557 systemd[1]: Successfully loaded SELinux policy in 34.967ms. Feb 9 00:48:34.819579 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 9.292ms. Feb 9 00:48:34.819596 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 00:48:34.819612 systemd[1]: Detected virtualization kvm. Feb 9 00:48:34.819626 systemd[1]: Detected architecture x86-64. Feb 9 00:48:34.819643 systemd[1]: Detected first boot. Feb 9 00:48:34.819658 systemd[1]: Initializing machine ID from VM UUID. Feb 9 00:48:34.819672 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 00:48:34.819687 systemd[1]: Populated /etc with preset unit settings. Feb 9 00:48:34.819702 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 00:48:34.819722 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 00:48:34.819738 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 00:48:34.819753 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 00:48:34.819770 systemd[1]: Stopped iscsiuio.service. Feb 9 00:48:34.819784 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 00:48:34.819802 systemd[1]: Stopped iscsid.service. Feb 9 00:48:34.819816 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 00:48:34.819830 systemd[1]: Stopped initrd-switch-root.service. Feb 9 00:48:34.819845 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 00:48:34.819858 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 00:48:34.819870 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 00:48:34.819882 systemd[1]: Created slice system-getty.slice. Feb 9 00:48:34.819896 systemd[1]: Created slice system-modprobe.slice. Feb 9 00:48:34.819909 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 00:48:34.819922 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 00:48:34.819935 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 00:48:34.819949 systemd[1]: Created slice user.slice. Feb 9 00:48:34.819965 systemd[1]: Started systemd-ask-password-console.path. Feb 9 00:48:34.819979 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 00:48:34.819994 systemd[1]: Set up automount boot.automount. Feb 9 00:48:34.820011 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 00:48:34.820026 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 00:48:34.820041 systemd[1]: Stopped target initrd-fs.target. Feb 9 00:48:34.820056 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 00:48:34.820070 systemd[1]: Reached target integritysetup.target. Feb 9 00:48:34.820085 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 00:48:34.820113 systemd[1]: Reached target remote-fs.target. Feb 9 00:48:34.820128 systemd[1]: Reached target slices.target. Feb 9 00:48:34.820143 systemd[1]: Reached target swap.target. Feb 9 00:48:34.820162 systemd[1]: Reached target torcx.target. Feb 9 00:48:34.820177 systemd[1]: Reached target veritysetup.target. Feb 9 00:48:34.820191 systemd[1]: Listening on systemd-coredump.socket. Feb 9 00:48:34.820205 systemd[1]: Listening on systemd-initctl.socket. Feb 9 00:48:34.820219 systemd[1]: Listening on systemd-networkd.socket. Feb 9 00:48:34.820234 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 00:48:34.820249 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 00:48:34.820263 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 00:48:34.820278 systemd[1]: Mounting dev-hugepages.mount... Feb 9 00:48:34.820294 systemd[1]: Mounting dev-mqueue.mount... Feb 9 00:48:34.820310 systemd[1]: Mounting media.mount... Feb 9 00:48:34.820325 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 00:48:34.820340 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 00:48:34.820354 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 00:48:34.820368 systemd[1]: Mounting tmp.mount... Feb 9 00:48:34.820382 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 00:48:34.820397 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 00:48:34.820411 systemd[1]: Starting kmod-static-nodes.service... Feb 9 00:48:34.820435 systemd[1]: Starting modprobe@configfs.service... Feb 9 00:48:34.820453 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 00:48:34.820467 systemd[1]: Starting modprobe@drm.service... Feb 9 00:48:34.820484 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 00:48:34.820498 systemd[1]: Starting modprobe@fuse.service... Feb 9 00:48:34.820513 systemd[1]: Starting modprobe@loop.service... Feb 9 00:48:34.820528 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 00:48:34.820542 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 00:48:34.820557 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 00:48:34.820574 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 00:48:34.820590 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 00:48:34.820609 kernel: loop: module loaded Feb 9 00:48:34.820626 systemd[1]: Stopped systemd-journald.service. Feb 9 00:48:34.820641 kernel: fuse: init (API version 7.34) Feb 9 00:48:34.820657 systemd[1]: Starting systemd-journald.service... Feb 9 00:48:34.820672 systemd[1]: Starting systemd-modules-load.service... Feb 9 00:48:34.820687 systemd[1]: Starting systemd-network-generator.service... Feb 9 00:48:34.820702 systemd[1]: Starting systemd-remount-fs.service... Feb 9 00:48:34.820717 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 00:48:34.820733 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 00:48:34.820747 systemd[1]: Stopped verity-setup.service. Feb 9 00:48:34.820763 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 00:48:34.820777 systemd[1]: Mounted dev-hugepages.mount. Feb 9 00:48:34.820794 systemd[1]: Mounted dev-mqueue.mount. Feb 9 00:48:34.820811 systemd[1]: Mounted media.mount. Feb 9 00:48:34.820828 systemd-journald[980]: Journal started Feb 9 00:48:34.820876 systemd-journald[980]: Runtime Journal (/run/log/journal/5af944cbb1c94ec4a7fc721eebf27de5) is 6.0M, max 48.4M, 42.4M free. Feb 9 00:48:32.189000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 00:48:32.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 00:48:32.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 00:48:32.639000 audit: BPF prog-id=10 op=LOAD Feb 9 00:48:32.639000 audit: BPF prog-id=10 op=UNLOAD Feb 9 00:48:32.639000 audit: BPF prog-id=11 op=LOAD Feb 9 00:48:32.639000 audit: BPF prog-id=11 op=UNLOAD Feb 9 00:48:32.665000 audit[903]: AVC avc: denied { associate } for pid=903 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 00:48:32.665000 audit[903]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001c58b2 a1=c000146de0 a2=c00014f0c0 a3=32 items=0 ppid=886 pid=903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:48:32.665000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 00:48:32.667000 audit[903]: AVC avc: denied { associate } for pid=903 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 00:48:32.667000 audit[903]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001c5989 a2=1ed a3=0 items=2 ppid=886 pid=903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:48:32.667000 audit: CWD cwd="/" Feb 9 00:48:32.667000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:32.667000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:32.667000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 00:48:34.710000 audit: BPF prog-id=12 op=LOAD Feb 9 00:48:34.710000 audit: BPF prog-id=3 op=UNLOAD Feb 9 00:48:34.710000 audit: BPF prog-id=13 op=LOAD Feb 9 00:48:34.710000 audit: BPF prog-id=14 op=LOAD Feb 9 00:48:34.710000 audit: BPF prog-id=4 op=UNLOAD Feb 9 00:48:34.710000 audit: BPF prog-id=5 op=UNLOAD Feb 9 00:48:34.711000 audit: BPF prog-id=15 op=LOAD Feb 9 00:48:34.711000 audit: BPF prog-id=12 op=UNLOAD Feb 9 00:48:34.711000 audit: BPF prog-id=16 op=LOAD Feb 9 00:48:34.711000 audit: BPF prog-id=17 op=LOAD Feb 9 00:48:34.711000 audit: BPF prog-id=13 op=UNLOAD Feb 9 00:48:34.711000 audit: BPF prog-id=14 op=UNLOAD Feb 9 00:48:34.712000 audit: BPF prog-id=18 op=LOAD Feb 9 00:48:34.712000 audit: BPF prog-id=15 op=UNLOAD Feb 9 00:48:34.712000 audit: BPF prog-id=19 op=LOAD Feb 9 00:48:34.712000 audit: BPF prog-id=20 op=LOAD Feb 9 00:48:34.712000 audit: BPF prog-id=16 op=UNLOAD Feb 9 00:48:34.712000 audit: BPF prog-id=17 op=UNLOAD Feb 9 00:48:34.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:34.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:34.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:34.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:34.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:34.729000 audit: BPF prog-id=18 op=UNLOAD Feb 9 00:48:34.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:34.795000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:34.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:34.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:34.798000 audit: BPF prog-id=21 op=LOAD Feb 9 00:48:34.798000 audit: BPF prog-id=22 op=LOAD Feb 9 00:48:34.798000 audit: BPF prog-id=23 op=LOAD Feb 9 00:48:34.798000 audit: BPF prog-id=19 op=UNLOAD Feb 9 00:48:34.798000 audit: BPF prog-id=20 op=UNLOAD Feb 9 00:48:34.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:34.817000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 00:48:34.817000 audit[980]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffd43d0bab0 a2=4000 a3=7ffd43d0bb4c items=0 ppid=1 pid=980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:48:34.817000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 00:48:34.709177 systemd[1]: Queued start job for default target multi-user.target. Feb 9 00:48:32.664629 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T00:48:32Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 00:48:34.709188 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 9 00:48:32.664815 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T00:48:32Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 00:48:34.713257 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 00:48:34.823106 systemd[1]: Started systemd-journald.service. Feb 9 00:48:32.664835 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T00:48:32Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 00:48:34.823112 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 00:48:32.664865 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T00:48:32Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 00:48:32.664877 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T00:48:32Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 00:48:34.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:32.664907 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T00:48:32Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 00:48:32.664922 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T00:48:32Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 00:48:32.665118 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T00:48:32Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 00:48:32.665151 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T00:48:32Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 00:48:32.665161 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T00:48:32Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 00:48:32.665417 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T00:48:32Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 00:48:32.665446 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T00:48:32Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 00:48:34.824048 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 00:48:32.665460 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T00:48:32Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 00:48:32.665472 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T00:48:32Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 00:48:32.665495 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T00:48:32Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 00:48:32.665506 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T00:48:32Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 00:48:34.467865 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T00:48:34Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 00:48:34.468091 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T00:48:34Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 00:48:34.468193 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T00:48:34Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 00:48:34.468332 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T00:48:34Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 00:48:34.468374 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T00:48:34Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 00:48:34.468426 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T00:48:34Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 00:48:34.824988 systemd[1]: Mounted tmp.mount. Feb 9 00:48:34.825670 systemd[1]: Finished kmod-static-nodes.service. Feb 9 00:48:34.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:34.826397 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 00:48:34.826570 systemd[1]: Finished modprobe@configfs.service. Feb 9 00:48:34.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:34.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:34.827321 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 00:48:34.827438 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 00:48:34.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:34.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:34.828200 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 00:48:34.829215 systemd[1]: Finished modprobe@drm.service. Feb 9 00:48:34.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:34.829000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:34.830053 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 00:48:34.830195 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 00:48:34.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:34.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:34.831063 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 00:48:34.831248 systemd[1]: Finished modprobe@fuse.service. Feb 9 00:48:34.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:34.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:34.832065 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 00:48:34.832237 systemd[1]: Finished modprobe@loop.service. Feb 9 00:48:34.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:34.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:34.833142 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 00:48:34.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:34.833991 systemd[1]: Finished systemd-modules-load.service. Feb 9 00:48:34.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:34.834876 systemd[1]: Finished systemd-network-generator.service. Feb 9 00:48:34.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:34.835812 systemd[1]: Finished systemd-remount-fs.service. Feb 9 00:48:34.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:34.836922 systemd[1]: Reached target network-pre.target. Feb 9 00:48:34.838682 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 00:48:34.840363 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 00:48:34.840989 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 00:48:34.842265 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 00:48:34.843864 systemd[1]: Starting systemd-journal-flush.service... Feb 9 00:48:34.844625 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 00:48:34.845554 systemd[1]: Starting systemd-random-seed.service... Feb 9 00:48:34.846352 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 00:48:34.847276 systemd[1]: Starting systemd-sysctl.service... Feb 9 00:48:34.849327 systemd[1]: Starting systemd-sysusers.service... Feb 9 00:48:34.851561 systemd-journald[980]: Time spent on flushing to /var/log/journal/5af944cbb1c94ec4a7fc721eebf27de5 is 14.967ms for 1198 entries. Feb 9 00:48:34.851561 systemd-journald[980]: System Journal (/var/log/journal/5af944cbb1c94ec4a7fc721eebf27de5) is 8.0M, max 195.6M, 187.6M free. Feb 9 00:48:34.885756 systemd-journald[980]: Received client request to flush runtime journal. Feb 9 00:48:34.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:34.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:34.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:34.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:34.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:34.851967 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 00:48:34.854911 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 00:48:34.856621 systemd[1]: Finished systemd-random-seed.service. Feb 9 00:48:34.857548 systemd[1]: Reached target first-boot-complete.target. Feb 9 00:48:34.859262 systemd[1]: Finished systemd-sysctl.service. Feb 9 00:48:34.870797 systemd[1]: Finished systemd-sysusers.service. Feb 9 00:48:34.872332 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 00:48:34.882496 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 00:48:34.883999 systemd[1]: Starting systemd-udev-settle.service... Feb 9 00:48:34.886862 systemd[1]: Finished systemd-journal-flush.service. Feb 9 00:48:34.890364 udevadm[1010]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 9 00:48:34.894318 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 00:48:34.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:35.250470 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 00:48:35.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:35.251000 audit: BPF prog-id=24 op=LOAD Feb 9 00:48:35.251000 audit: BPF prog-id=25 op=LOAD Feb 9 00:48:35.251000 audit: BPF prog-id=7 op=UNLOAD Feb 9 00:48:35.251000 audit: BPF prog-id=8 op=UNLOAD Feb 9 00:48:35.252320 systemd[1]: Starting systemd-udevd.service... Feb 9 00:48:35.266190 systemd-udevd[1011]: Using default interface naming scheme 'v252'. Feb 9 00:48:35.278179 systemd[1]: Started systemd-udevd.service. Feb 9 00:48:35.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:35.279000 audit: BPF prog-id=26 op=LOAD Feb 9 00:48:35.280743 systemd[1]: Starting systemd-networkd.service... Feb 9 00:48:35.287269 systemd[1]: Starting systemd-userdbd.service... Feb 9 00:48:35.286000 audit: BPF prog-id=27 op=LOAD Feb 9 00:48:35.286000 audit: BPF prog-id=28 op=LOAD Feb 9 00:48:35.286000 audit: BPF prog-id=29 op=LOAD Feb 9 00:48:35.299072 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 9 00:48:35.322227 systemd[1]: Started systemd-userdbd.service. Feb 9 00:48:35.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:35.333488 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 00:48:35.345118 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 9 00:48:35.350124 kernel: ACPI: button: Power Button [PWRF] Feb 9 00:48:35.356000 audit[1016]: AVC avc: denied { confidentiality } for pid=1016 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 00:48:35.367318 systemd-networkd[1023]: lo: Link UP Feb 9 00:48:35.367330 systemd-networkd[1023]: lo: Gained carrier Feb 9 00:48:35.367684 systemd-networkd[1023]: Enumeration completed Feb 9 00:48:35.367787 systemd[1]: Started systemd-networkd.service. Feb 9 00:48:35.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:35.368623 systemd-networkd[1023]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 00:48:35.369452 systemd-networkd[1023]: eth0: Link UP Feb 9 00:48:35.369462 systemd-networkd[1023]: eth0: Gained carrier Feb 9 00:48:35.356000 audit[1016]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55ff7d2b0770 a1=32194 a2=7fd371696bc5 a3=5 items=108 ppid=1011 pid=1016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:48:35.356000 audit: CWD cwd="/" Feb 9 00:48:35.356000 audit: PATH item=0 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=1 name=(null) inode=11905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=2 name=(null) inode=11905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=3 name=(null) inode=11906 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=4 name=(null) inode=11905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=5 name=(null) inode=11907 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=6 name=(null) inode=11905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=7 name=(null) inode=11908 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=8 name=(null) inode=11908 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=9 name=(null) inode=11909 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=10 name=(null) inode=11908 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=11 name=(null) inode=11910 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=12 name=(null) inode=11908 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=13 name=(null) inode=11911 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=14 name=(null) inode=11908 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=15 name=(null) inode=11912 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=16 name=(null) inode=11908 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=17 name=(null) inode=11913 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=18 name=(null) inode=11905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=19 name=(null) inode=11914 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=20 name=(null) inode=11914 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=21 name=(null) inode=11915 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=22 name=(null) inode=11914 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=23 name=(null) inode=11916 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=24 name=(null) inode=11914 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=25 name=(null) inode=11917 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=26 name=(null) inode=11914 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=27 name=(null) inode=11918 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=28 name=(null) inode=11914 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=29 name=(null) inode=11919 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=30 name=(null) inode=11905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=31 name=(null) inode=11920 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=32 name=(null) inode=11920 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=33 name=(null) inode=11921 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=34 name=(null) inode=11920 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=35 name=(null) inode=11922 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=36 name=(null) inode=11920 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=37 name=(null) inode=11923 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=38 name=(null) inode=11920 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=39 name=(null) inode=11924 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=40 name=(null) inode=11920 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=41 name=(null) inode=11925 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=42 name=(null) inode=11905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=43 name=(null) inode=11926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=44 name=(null) inode=11926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=45 name=(null) inode=11927 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=46 name=(null) inode=11926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=47 name=(null) inode=11928 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=48 name=(null) inode=11926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=49 name=(null) inode=11929 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=50 name=(null) inode=11926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=51 name=(null) inode=11930 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=52 name=(null) inode=11926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=53 name=(null) inode=11931 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=54 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=55 name=(null) inode=11932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=56 name=(null) inode=11932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=57 name=(null) inode=11933 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=58 name=(null) inode=11932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=59 name=(null) inode=11934 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=60 name=(null) inode=11932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=61 name=(null) inode=11935 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=62 name=(null) inode=11935 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=63 name=(null) inode=11936 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=64 name=(null) inode=11935 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=65 name=(null) inode=11942 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=66 name=(null) inode=11935 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=67 name=(null) inode=11943 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=68 name=(null) inode=11935 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=69 name=(null) inode=11944 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=70 name=(null) inode=11935 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=71 name=(null) inode=11945 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=72 name=(null) inode=11932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=73 name=(null) inode=11946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=74 name=(null) inode=11946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=75 name=(null) inode=11947 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=76 name=(null) inode=11946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=77 name=(null) inode=11948 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=78 name=(null) inode=11946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=79 name=(null) inode=11949 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=80 name=(null) inode=11946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=81 name=(null) inode=11950 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=82 name=(null) inode=11946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=83 name=(null) inode=11951 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=84 name=(null) inode=11932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=85 name=(null) inode=11952 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=86 name=(null) inode=11952 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=87 name=(null) inode=11953 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=88 name=(null) inode=11952 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=89 name=(null) inode=11954 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=90 name=(null) inode=11952 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=91 name=(null) inode=11955 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=92 name=(null) inode=11952 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=93 name=(null) inode=11956 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=94 name=(null) inode=11952 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=95 name=(null) inode=11957 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=96 name=(null) inode=11932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=97 name=(null) inode=11958 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=98 name=(null) inode=11958 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=99 name=(null) inode=11959 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=100 name=(null) inode=11958 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=101 name=(null) inode=11960 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=102 name=(null) inode=11958 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=103 name=(null) inode=11961 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=104 name=(null) inode=11958 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=105 name=(null) inode=11962 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=106 name=(null) inode=11958 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PATH item=107 name=(null) inode=11979 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:48:35.356000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 00:48:35.378200 systemd-networkd[1023]: eth0: DHCPv4 address 10.0.0.84/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 9 00:48:35.384112 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Feb 9 00:48:35.390549 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 00:48:35.390590 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 0 Feb 9 00:48:35.438348 kernel: kvm: Nested Virtualization enabled Feb 9 00:48:35.438459 kernel: SVM: kvm: Nested Paging enabled Feb 9 00:48:35.439459 kernel: SVM: Virtual VMLOAD VMSAVE supported Feb 9 00:48:35.439495 kernel: SVM: Virtual GIF supported Feb 9 00:48:35.454391 kernel: EDAC MC: Ver: 3.0.0 Feb 9 00:48:35.475492 systemd[1]: Finished systemd-udev-settle.service. Feb 9 00:48:35.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:35.477476 systemd[1]: Starting lvm2-activation-early.service... Feb 9 00:48:35.485564 lvm[1047]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 00:48:35.512997 systemd[1]: Finished lvm2-activation-early.service. Feb 9 00:48:35.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:35.513864 systemd[1]: Reached target cryptsetup.target. Feb 9 00:48:35.515676 systemd[1]: Starting lvm2-activation.service... Feb 9 00:48:35.519379 lvm[1048]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 00:48:35.544427 systemd[1]: Finished lvm2-activation.service. Feb 9 00:48:35.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:35.545182 systemd[1]: Reached target local-fs-pre.target. Feb 9 00:48:35.545935 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 00:48:35.545964 systemd[1]: Reached target local-fs.target. Feb 9 00:48:35.546689 systemd[1]: Reached target machines.target. Feb 9 00:48:35.548556 systemd[1]: Starting ldconfig.service... Feb 9 00:48:35.549461 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 00:48:35.549511 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 00:48:35.550599 systemd[1]: Starting systemd-boot-update.service... Feb 9 00:48:35.552352 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 00:48:35.554364 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 00:48:35.555242 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 00:48:35.555295 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 00:48:35.556323 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 00:48:35.558849 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1050 (bootctl) Feb 9 00:48:35.562190 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 00:48:35.564953 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 00:48:35.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:35.567631 systemd-tmpfiles[1053]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 00:48:35.568370 systemd-tmpfiles[1053]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 00:48:35.569580 systemd-tmpfiles[1053]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 00:48:35.598614 systemd-fsck[1058]: fsck.fat 4.2 (2021-01-31) Feb 9 00:48:35.598614 systemd-fsck[1058]: /dev/vda1: 790 files, 115355/258078 clusters Feb 9 00:48:35.600366 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 00:48:35.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:35.603784 systemd[1]: Mounting boot.mount... Feb 9 00:48:35.631265 systemd[1]: Mounted boot.mount. Feb 9 00:48:35.642195 systemd[1]: Finished systemd-boot-update.service. Feb 9 00:48:35.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:35.647590 ldconfig[1049]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 00:48:36.247017 systemd[1]: Finished ldconfig.service. Feb 9 00:48:36.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:36.252850 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 00:48:36.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:36.254757 systemd[1]: Starting audit-rules.service... Feb 9 00:48:36.256113 systemd[1]: Starting clean-ca-certificates.service... Feb 9 00:48:36.257580 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 00:48:36.259000 audit: BPF prog-id=30 op=LOAD Feb 9 00:48:36.259924 systemd[1]: Starting systemd-resolved.service... Feb 9 00:48:36.261000 audit: BPF prog-id=31 op=LOAD Feb 9 00:48:36.261984 systemd[1]: Starting systemd-timesyncd.service... Feb 9 00:48:36.263406 systemd[1]: Starting systemd-update-utmp.service... Feb 9 00:48:36.265009 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 00:48:36.265644 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 00:48:36.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:36.266828 systemd[1]: Finished clean-ca-certificates.service. Feb 9 00:48:36.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:36.269546 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 00:48:36.274264 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 00:48:36.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:36.276062 systemd[1]: Starting systemd-update-done.service... Feb 9 00:48:36.276000 audit[1074]: SYSTEM_BOOT pid=1074 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 00:48:36.278216 systemd[1]: Finished systemd-update-utmp.service. Feb 9 00:48:36.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:36.280660 systemd[1]: Finished systemd-update-done.service. Feb 9 00:48:36.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:36.286000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 00:48:36.286000 audit[1085]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd5a62c060 a2=420 a3=0 items=0 ppid=1062 pid=1085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:48:36.286000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 00:48:36.286937 augenrules[1085]: No rules Feb 9 00:48:36.287373 systemd[1]: Finished audit-rules.service. Feb 9 00:48:36.310130 systemd-resolved[1072]: Positive Trust Anchors: Feb 9 00:48:36.310145 systemd-resolved[1072]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 00:48:36.310174 systemd-resolved[1072]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 00:48:36.311033 systemd[1]: Started systemd-timesyncd.service. Feb 9 00:48:36.311851 systemd[1]: Reached target time-set.target. Feb 9 00:48:35.887028 systemd-timesyncd[1073]: Contacted time server 10.0.0.1:123 (10.0.0.1). Feb 9 00:48:35.911968 systemd-journald[980]: Time jumped backwards, rotating. Feb 9 00:48:35.887073 systemd-timesyncd[1073]: Initial clock synchronization to Fri 2024-02-09 00:48:35.886934 UTC. Feb 9 00:48:35.893407 systemd-resolved[1072]: Defaulting to hostname 'linux'. Feb 9 00:48:35.894720 systemd[1]: Started systemd-resolved.service. Feb 9 00:48:35.895450 systemd[1]: Reached target network.target. Feb 9 00:48:35.896021 systemd[1]: Reached target nss-lookup.target. Feb 9 00:48:35.896614 systemd[1]: Reached target sysinit.target. Feb 9 00:48:35.897244 systemd[1]: Started motdgen.path. Feb 9 00:48:35.897751 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 00:48:35.898743 systemd[1]: Started logrotate.timer. Feb 9 00:48:35.899336 systemd[1]: Started mdadm.timer. Feb 9 00:48:35.899829 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 00:48:35.901095 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 00:48:35.901116 systemd[1]: Reached target paths.target. Feb 9 00:48:35.901652 systemd[1]: Reached target timers.target. Feb 9 00:48:35.902468 systemd[1]: Listening on dbus.socket. Feb 9 00:48:35.903923 systemd[1]: Starting docker.socket... Feb 9 00:48:35.906381 systemd[1]: Listening on sshd.socket. Feb 9 00:48:35.907024 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 00:48:35.907351 systemd[1]: Listening on docker.socket. Feb 9 00:48:35.907948 systemd[1]: Reached target sockets.target. Feb 9 00:48:35.908604 systemd[1]: Reached target basic.target. Feb 9 00:48:35.909260 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 00:48:35.909284 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 00:48:35.910081 systemd[1]: Starting containerd.service... Feb 9 00:48:35.911452 systemd[1]: Starting dbus.service... Feb 9 00:48:35.913377 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 00:48:35.914869 systemd[1]: Starting extend-filesystems.service... Feb 9 00:48:35.915542 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 00:48:35.916394 systemd[1]: Starting motdgen.service... Feb 9 00:48:35.917711 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 00:48:35.919103 systemd[1]: Starting prepare-critools.service... Feb 9 00:48:35.920573 systemd[1]: Starting prepare-helm.service... Feb 9 00:48:35.922488 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 00:48:35.923344 jq[1096]: false Feb 9 00:48:35.924575 systemd[1]: Starting sshd-keygen.service... Feb 9 00:48:35.927627 dbus-daemon[1095]: [system] SELinux support is enabled Feb 9 00:48:35.928715 systemd[1]: Starting systemd-logind.service... Feb 9 00:48:35.929271 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 00:48:35.929320 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 00:48:35.929619 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 00:48:35.930127 systemd[1]: Starting update-engine.service... Feb 9 00:48:35.934263 extend-filesystems[1097]: Found sr0 Feb 9 00:48:35.934263 extend-filesystems[1097]: Found vda Feb 9 00:48:35.934263 extend-filesystems[1097]: Found vda1 Feb 9 00:48:35.934263 extend-filesystems[1097]: Found vda2 Feb 9 00:48:35.934263 extend-filesystems[1097]: Found vda3 Feb 9 00:48:35.934263 extend-filesystems[1097]: Found usr Feb 9 00:48:35.934263 extend-filesystems[1097]: Found vda4 Feb 9 00:48:35.934263 extend-filesystems[1097]: Found vda6 Feb 9 00:48:35.934263 extend-filesystems[1097]: Found vda7 Feb 9 00:48:35.934263 extend-filesystems[1097]: Found vda9 Feb 9 00:48:35.934263 extend-filesystems[1097]: Checking size of /dev/vda9 Feb 9 00:48:35.931701 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 00:48:35.953487 jq[1113]: true Feb 9 00:48:35.932987 systemd[1]: Started dbus.service. Feb 9 00:48:35.954030 tar[1117]: ./ Feb 9 00:48:35.954030 tar[1117]: ./loopback Feb 9 00:48:35.935889 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 00:48:35.936033 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 00:48:35.954436 tar[1119]: linux-amd64/helm Feb 9 00:48:35.937639 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 00:48:35.937952 systemd[1]: Finished motdgen.service. Feb 9 00:48:35.943054 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 00:48:35.943164 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 00:48:35.945242 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 00:48:35.945265 systemd[1]: Reached target system-config.target. Feb 9 00:48:35.946017 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 00:48:35.946028 systemd[1]: Reached target user-config.target. Feb 9 00:48:35.957866 tar[1118]: crictl Feb 9 00:48:35.959834 jq[1126]: true Feb 9 00:48:35.970698 extend-filesystems[1097]: Resized partition /dev/vda9 Feb 9 00:48:35.974739 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Feb 9 00:48:35.974776 extend-filesystems[1137]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 00:48:35.976713 update_engine[1112]: I0209 00:48:35.972916 1112 main.cc:92] Flatcar Update Engine starting Feb 9 00:48:35.977146 systemd[1]: Started update-engine.service. Feb 9 00:48:35.978213 update_engine[1112]: I0209 00:48:35.978062 1112 update_check_scheduler.cc:74] Next update check in 9m37s Feb 9 00:48:35.980520 systemd[1]: Started locksmithd.service. Feb 9 00:48:35.991968 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Feb 9 00:48:36.007787 env[1127]: time="2024-02-09T00:48:36.006523312Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 00:48:36.009424 extend-filesystems[1137]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 9 00:48:36.009424 extend-filesystems[1137]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 9 00:48:36.009424 extend-filesystems[1137]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Feb 9 00:48:36.018979 extend-filesystems[1097]: Resized filesystem in /dev/vda9 Feb 9 00:48:36.011207 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 00:48:36.011341 systemd[1]: Finished extend-filesystems.service. Feb 9 00:48:36.017464 systemd-logind[1111]: Watching system buttons on /dev/input/event1 (Power Button) Feb 9 00:48:36.017479 systemd-logind[1111]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 00:48:36.018877 systemd-logind[1111]: New seat seat0. Feb 9 00:48:36.023706 systemd[1]: Started systemd-logind.service. Feb 9 00:48:36.025691 bash[1152]: Updated "/home/core/.ssh/authorized_keys" Feb 9 00:48:36.026161 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 00:48:36.042057 env[1127]: time="2024-02-09T00:48:36.042021010Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 00:48:36.043620 tar[1117]: ./bandwidth Feb 9 00:48:36.045080 env[1127]: time="2024-02-09T00:48:36.045064046Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 00:48:36.050140 env[1127]: time="2024-02-09T00:48:36.050116519Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 00:48:36.050212 env[1127]: time="2024-02-09T00:48:36.050193905Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 00:48:36.050459 env[1127]: time="2024-02-09T00:48:36.050440357Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 00:48:36.050530 env[1127]: time="2024-02-09T00:48:36.050511841Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 00:48:36.050608 env[1127]: time="2024-02-09T00:48:36.050589807Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 00:48:36.050675 env[1127]: time="2024-02-09T00:48:36.050657554Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 00:48:36.050814 env[1127]: time="2024-02-09T00:48:36.050796785Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 00:48:36.051074 env[1127]: time="2024-02-09T00:48:36.051057754Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 00:48:36.051251 env[1127]: time="2024-02-09T00:48:36.051232893Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 00:48:36.051319 env[1127]: time="2024-02-09T00:48:36.051301912Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 00:48:36.051430 env[1127]: time="2024-02-09T00:48:36.051411848Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 00:48:36.051498 env[1127]: time="2024-02-09T00:48:36.051480617Z" level=info msg="metadata content store policy set" policy=shared Feb 9 00:48:36.056568 env[1127]: time="2024-02-09T00:48:36.056551746Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 00:48:36.056643 env[1127]: time="2024-02-09T00:48:36.056624752Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 00:48:36.056715 env[1127]: time="2024-02-09T00:48:36.056696918Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 00:48:36.056800 env[1127]: time="2024-02-09T00:48:36.056783540Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 00:48:36.056903 env[1127]: time="2024-02-09T00:48:36.056888447Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 00:48:36.056989 env[1127]: time="2024-02-09T00:48:36.056971663Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 00:48:36.057061 env[1127]: time="2024-02-09T00:48:36.057043528Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 00:48:36.057143 env[1127]: time="2024-02-09T00:48:36.057125451Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 00:48:36.057229 env[1127]: time="2024-02-09T00:48:36.057201143Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 00:48:36.057304 env[1127]: time="2024-02-09T00:48:36.057285311Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 00:48:36.057385 env[1127]: time="2024-02-09T00:48:36.057367205Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 00:48:36.057462 env[1127]: time="2024-02-09T00:48:36.057443548Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 00:48:36.057592 env[1127]: time="2024-02-09T00:48:36.057575355Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 00:48:36.057729 env[1127]: time="2024-02-09T00:48:36.057712873Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 00:48:36.058031 env[1127]: time="2024-02-09T00:48:36.058007154Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 00:48:36.058115 env[1127]: time="2024-02-09T00:48:36.058098766Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 00:48:36.058196 env[1127]: time="2024-02-09T00:48:36.058177514Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 00:48:36.058308 env[1127]: time="2024-02-09T00:48:36.058291938Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 00:48:36.058417 env[1127]: time="2024-02-09T00:48:36.058401624Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 00:48:36.058495 env[1127]: time="2024-02-09T00:48:36.058477787Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 00:48:36.058566 env[1127]: time="2024-02-09T00:48:36.058548620Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 00:48:36.058639 env[1127]: time="2024-02-09T00:48:36.058621556Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 00:48:36.058719 env[1127]: time="2024-02-09T00:48:36.058700314Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 00:48:36.058791 env[1127]: time="2024-02-09T00:48:36.058773421Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 00:48:36.058863 env[1127]: time="2024-02-09T00:48:36.058844745Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 00:48:36.058958 env[1127]: time="2024-02-09T00:48:36.058928261Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 00:48:36.059115 env[1127]: time="2024-02-09T00:48:36.059097940Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 00:48:36.059199 env[1127]: time="2024-02-09T00:48:36.059171167Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 00:48:36.059295 env[1127]: time="2024-02-09T00:48:36.059274641Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 00:48:36.059376 env[1127]: time="2024-02-09T00:48:36.059358278Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 00:48:36.059455 env[1127]: time="2024-02-09T00:48:36.059435863Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 00:48:36.059524 env[1127]: time="2024-02-09T00:48:36.059505935Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 00:48:36.059607 env[1127]: time="2024-02-09T00:48:36.059588740Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 00:48:36.059703 env[1127]: time="2024-02-09T00:48:36.059686002Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 00:48:36.060012 env[1127]: time="2024-02-09T00:48:36.059966348Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 00:48:36.060545 env[1127]: time="2024-02-09T00:48:36.060131077Z" level=info msg="Connect containerd service" Feb 9 00:48:36.060545 env[1127]: time="2024-02-09T00:48:36.060374092Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 00:48:36.061059 env[1127]: time="2024-02-09T00:48:36.061040041Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 00:48:36.061261 env[1127]: time="2024-02-09T00:48:36.061234686Z" level=info msg="Start subscribing containerd event" Feb 9 00:48:36.061350 env[1127]: time="2024-02-09T00:48:36.061334243Z" level=info msg="Start recovering state" Feb 9 00:48:36.061466 env[1127]: time="2024-02-09T00:48:36.061451713Z" level=info msg="Start event monitor" Feb 9 00:48:36.061585 env[1127]: time="2024-02-09T00:48:36.061569374Z" level=info msg="Start snapshots syncer" Feb 9 00:48:36.061670 env[1127]: time="2024-02-09T00:48:36.061654483Z" level=info msg="Start cni network conf syncer for default" Feb 9 00:48:36.061776 env[1127]: time="2024-02-09T00:48:36.061760963Z" level=info msg="Start streaming server" Feb 9 00:48:36.062066 env[1127]: time="2024-02-09T00:48:36.062043793Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 00:48:36.062190 env[1127]: time="2024-02-09T00:48:36.062164720Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 00:48:36.062402 systemd[1]: Started containerd.service. Feb 9 00:48:36.066321 env[1127]: time="2024-02-09T00:48:36.066300304Z" level=info msg="containerd successfully booted in 0.074438s" Feb 9 00:48:36.079857 tar[1117]: ./ptp Feb 9 00:48:36.104054 systemd-networkd[1023]: eth0: Gained IPv6LL Feb 9 00:48:36.116233 tar[1117]: ./vlan Feb 9 00:48:36.149097 tar[1117]: ./host-device Feb 9 00:48:36.181163 tar[1117]: ./tuning Feb 9 00:48:36.210280 tar[1117]: ./vrf Feb 9 00:48:36.242796 tar[1117]: ./sbr Feb 9 00:48:36.272866 tar[1117]: ./tap Feb 9 00:48:36.310086 tar[1117]: ./dhcp Feb 9 00:48:36.385541 systemd[1]: Finished prepare-critools.service. Feb 9 00:48:36.394913 tar[1119]: linux-amd64/LICENSE Feb 9 00:48:36.394993 tar[1119]: linux-amd64/README.md Feb 9 00:48:36.397736 tar[1117]: ./static Feb 9 00:48:36.398334 systemd[1]: Finished prepare-helm.service. Feb 9 00:48:36.401400 locksmithd[1153]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 00:48:36.420354 tar[1117]: ./firewall Feb 9 00:48:36.452696 tar[1117]: ./macvlan Feb 9 00:48:36.482381 tar[1117]: ./dummy Feb 9 00:48:36.511288 tar[1117]: ./bridge Feb 9 00:48:36.542957 tar[1117]: ./ipvlan Feb 9 00:48:36.572051 tar[1117]: ./portmap Feb 9 00:48:36.599664 tar[1117]: ./host-local Feb 9 00:48:36.632237 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 00:48:37.166035 sshd_keygen[1134]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 00:48:37.183438 systemd[1]: Finished sshd-keygen.service. Feb 9 00:48:37.185363 systemd[1]: Starting issuegen.service... Feb 9 00:48:37.189534 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 00:48:37.189649 systemd[1]: Finished issuegen.service. Feb 9 00:48:37.191274 systemd[1]: Starting systemd-user-sessions.service... Feb 9 00:48:37.196453 systemd[1]: Finished systemd-user-sessions.service. Feb 9 00:48:37.198147 systemd[1]: Started getty@tty1.service. Feb 9 00:48:37.199636 systemd[1]: Started serial-getty@ttyS0.service. Feb 9 00:48:37.200388 systemd[1]: Reached target getty.target. Feb 9 00:48:37.201011 systemd[1]: Reached target multi-user.target. Feb 9 00:48:37.202447 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 00:48:37.208996 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 00:48:37.209106 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 00:48:37.209904 systemd[1]: Startup finished in 518ms (kernel) + 5.474s (initrd) + 5.481s (userspace) = 11.474s. Feb 9 00:48:41.547359 systemd[1]: Created slice system-sshd.slice. Feb 9 00:48:41.548242 systemd[1]: Started sshd@0-10.0.0.84:22-10.0.0.1:57160.service. Feb 9 00:48:41.585393 sshd[1187]: Accepted publickey for core from 10.0.0.1 port 57160 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:48:41.586588 sshd[1187]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:48:41.593673 systemd-logind[1111]: New session 1 of user core. Feb 9 00:48:41.594455 systemd[1]: Created slice user-500.slice. Feb 9 00:48:41.595310 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 00:48:41.601402 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 00:48:41.602352 systemd[1]: Starting user@500.service... Feb 9 00:48:41.604346 (systemd)[1190]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:48:41.665949 systemd[1190]: Queued start job for default target default.target. Feb 9 00:48:41.666355 systemd[1190]: Reached target paths.target. Feb 9 00:48:41.666375 systemd[1190]: Reached target sockets.target. Feb 9 00:48:41.666386 systemd[1190]: Reached target timers.target. Feb 9 00:48:41.666396 systemd[1190]: Reached target basic.target. Feb 9 00:48:41.666426 systemd[1190]: Reached target default.target. Feb 9 00:48:41.666445 systemd[1190]: Startup finished in 57ms. Feb 9 00:48:41.666514 systemd[1]: Started user@500.service. Feb 9 00:48:41.667478 systemd[1]: Started session-1.scope. Feb 9 00:48:41.717120 systemd[1]: Started sshd@1-10.0.0.84:22-10.0.0.1:57162.service. Feb 9 00:48:41.751992 sshd[1199]: Accepted publickey for core from 10.0.0.1 port 57162 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:48:41.752987 sshd[1199]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:48:41.756511 systemd-logind[1111]: New session 2 of user core. Feb 9 00:48:41.757700 systemd[1]: Started session-2.scope. Feb 9 00:48:41.810275 sshd[1199]: pam_unix(sshd:session): session closed for user core Feb 9 00:48:41.812666 systemd[1]: sshd@1-10.0.0.84:22-10.0.0.1:57162.service: Deactivated successfully. Feb 9 00:48:41.813144 systemd[1]: session-2.scope: Deactivated successfully. Feb 9 00:48:41.813631 systemd-logind[1111]: Session 2 logged out. Waiting for processes to exit. Feb 9 00:48:41.814570 systemd[1]: Started sshd@2-10.0.0.84:22-10.0.0.1:57174.service. Feb 9 00:48:41.815133 systemd-logind[1111]: Removed session 2. Feb 9 00:48:41.851405 sshd[1205]: Accepted publickey for core from 10.0.0.1 port 57174 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:48:41.852418 sshd[1205]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:48:41.855290 systemd-logind[1111]: New session 3 of user core. Feb 9 00:48:41.855983 systemd[1]: Started session-3.scope. Feb 9 00:48:41.904547 sshd[1205]: pam_unix(sshd:session): session closed for user core Feb 9 00:48:41.908283 systemd[1]: Started sshd@3-10.0.0.84:22-10.0.0.1:57180.service. Feb 9 00:48:41.908802 systemd[1]: sshd@2-10.0.0.84:22-10.0.0.1:57174.service: Deactivated successfully. Feb 9 00:48:41.909377 systemd[1]: session-3.scope: Deactivated successfully. Feb 9 00:48:41.909812 systemd-logind[1111]: Session 3 logged out. Waiting for processes to exit. Feb 9 00:48:41.910399 systemd-logind[1111]: Removed session 3. Feb 9 00:48:41.944908 sshd[1211]: Accepted publickey for core from 10.0.0.1 port 57180 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:48:41.945966 sshd[1211]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:48:41.948755 systemd-logind[1111]: New session 4 of user core. Feb 9 00:48:41.949474 systemd[1]: Started session-4.scope. Feb 9 00:48:42.000484 sshd[1211]: pam_unix(sshd:session): session closed for user core Feb 9 00:48:42.002521 systemd[1]: sshd@3-10.0.0.84:22-10.0.0.1:57180.service: Deactivated successfully. Feb 9 00:48:42.002967 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 00:48:42.003427 systemd-logind[1111]: Session 4 logged out. Waiting for processes to exit. Feb 9 00:48:42.004162 systemd[1]: Started sshd@4-10.0.0.84:22-10.0.0.1:57188.service. Feb 9 00:48:42.004649 systemd-logind[1111]: Removed session 4. Feb 9 00:48:42.038657 sshd[1218]: Accepted publickey for core from 10.0.0.1 port 57188 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:48:42.039701 sshd[1218]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:48:42.042508 systemd-logind[1111]: New session 5 of user core. Feb 9 00:48:42.043220 systemd[1]: Started session-5.scope. Feb 9 00:48:42.096514 sudo[1221]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 00:48:42.096675 sudo[1221]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 00:48:42.104164 dbus-daemon[1095]: \xd0\u001d\xd3_JV: received setenforce notice (enforcing=-2063975024) Feb 9 00:48:42.105880 sudo[1221]: pam_unix(sudo:session): session closed for user root Feb 9 00:48:42.107394 sshd[1218]: pam_unix(sshd:session): session closed for user core Feb 9 00:48:42.109623 systemd[1]: sshd@4-10.0.0.84:22-10.0.0.1:57188.service: Deactivated successfully. Feb 9 00:48:42.110123 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 00:48:42.110579 systemd-logind[1111]: Session 5 logged out. Waiting for processes to exit. Feb 9 00:48:42.111335 systemd[1]: Started sshd@5-10.0.0.84:22-10.0.0.1:57196.service. Feb 9 00:48:42.112024 systemd-logind[1111]: Removed session 5. Feb 9 00:48:42.144775 sshd[1225]: Accepted publickey for core from 10.0.0.1 port 57196 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:48:42.145818 sshd[1225]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:48:42.148912 systemd-logind[1111]: New session 6 of user core. Feb 9 00:48:42.149697 systemd[1]: Started session-6.scope. Feb 9 00:48:42.199887 sudo[1229]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 00:48:42.200110 sudo[1229]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 00:48:42.202428 sudo[1229]: pam_unix(sudo:session): session closed for user root Feb 9 00:48:42.206457 sudo[1228]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 00:48:42.206663 sudo[1228]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 00:48:42.214050 systemd[1]: Stopping audit-rules.service... Feb 9 00:48:42.213000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 00:48:42.215594 auditctl[1232]: No rules Feb 9 00:48:42.215839 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 00:48:42.215963 systemd[1]: Stopped audit-rules.service. Feb 9 00:48:42.216086 kernel: kauditd_printk_skb: 250 callbacks suppressed Feb 9 00:48:42.216108 kernel: audit: type=1305 audit(1707439722.213:174): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 00:48:42.220973 kernel: audit: type=1300 audit(1707439722.213:174): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc4ba9cf80 a2=420 a3=0 items=0 ppid=1 pid=1232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:48:42.221028 kernel: audit: type=1327 audit(1707439722.213:174): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 00:48:42.213000 audit[1232]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc4ba9cf80 a2=420 a3=0 items=0 ppid=1 pid=1232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:48:42.213000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 00:48:42.217704 systemd[1]: Starting audit-rules.service... Feb 9 00:48:42.221203 kernel: audit: type=1131 audit(1707439722.214:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:42.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:42.229963 augenrules[1249]: No rules Feb 9 00:48:42.230441 systemd[1]: Finished audit-rules.service. Feb 9 00:48:42.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:42.231481 sudo[1228]: pam_unix(sudo:session): session closed for user root Feb 9 00:48:42.229000 audit[1228]: USER_END pid=1228 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 00:48:42.232717 sshd[1225]: pam_unix(sshd:session): session closed for user core Feb 9 00:48:42.235960 kernel: audit: type=1130 audit(1707439722.228:176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:42.235999 kernel: audit: type=1106 audit(1707439722.229:177): pid=1228 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 00:48:42.236024 kernel: audit: type=1104 audit(1707439722.229:178): pid=1228 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 00:48:42.229000 audit[1228]: CRED_DISP pid=1228 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 00:48:42.235422 systemd[1]: sshd@5-10.0.0.84:22-10.0.0.1:57196.service: Deactivated successfully. Feb 9 00:48:42.235855 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 00:48:42.236334 systemd-logind[1111]: Session 6 logged out. Waiting for processes to exit. Feb 9 00:48:42.237182 systemd[1]: Started sshd@6-10.0.0.84:22-10.0.0.1:57206.service. Feb 9 00:48:42.238965 kernel: audit: type=1106 audit(1707439722.231:179): pid=1225 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:48:42.231000 audit[1225]: USER_END pid=1225 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:48:42.237756 systemd-logind[1111]: Removed session 6. Feb 9 00:48:42.231000 audit[1225]: CRED_DISP pid=1225 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:48:42.242500 kernel: audit: type=1104 audit(1707439722.231:180): pid=1225 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:48:42.242532 kernel: audit: type=1131 audit(1707439722.233:181): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.84:22-10.0.0.1:57196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:42.233000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.84:22-10.0.0.1:57196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:42.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.84:22-10.0.0.1:57206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:42.271000 audit[1255]: USER_ACCT pid=1255 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:48:42.273293 sshd[1255]: Accepted publickey for core from 10.0.0.1 port 57206 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:48:42.272000 audit[1255]: CRED_ACQ pid=1255 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:48:42.272000 audit[1255]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc39c18ed0 a2=3 a3=0 items=0 ppid=1 pid=1255 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:48:42.272000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 00:48:42.274282 sshd[1255]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:48:42.277200 systemd-logind[1111]: New session 7 of user core. Feb 9 00:48:42.277880 systemd[1]: Started session-7.scope. Feb 9 00:48:42.278000 audit[1255]: USER_START pid=1255 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:48:42.279000 audit[1257]: CRED_ACQ pid=1257 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:48:42.326000 audit[1258]: USER_ACCT pid=1258 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 00:48:42.328302 sudo[1258]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 00:48:42.326000 audit[1258]: CRED_REFR pid=1258 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 00:48:42.328457 sudo[1258]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 00:48:42.327000 audit[1258]: USER_START pid=1258 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 00:48:42.854257 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 00:48:42.858841 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 00:48:42.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:42.859132 systemd[1]: Reached target network-online.target. Feb 9 00:48:42.860192 systemd[1]: Starting docker.service... Feb 9 00:48:42.890172 env[1276]: time="2024-02-09T00:48:42.890123972Z" level=info msg="Starting up" Feb 9 00:48:42.891468 env[1276]: time="2024-02-09T00:48:42.891435260Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 00:48:42.891468 env[1276]: time="2024-02-09T00:48:42.891460618Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 00:48:42.891529 env[1276]: time="2024-02-09T00:48:42.891481617Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 00:48:42.891529 env[1276]: time="2024-02-09T00:48:42.891492568Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 00:48:42.895911 env[1276]: time="2024-02-09T00:48:42.895887719Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 00:48:42.895911 env[1276]: time="2024-02-09T00:48:42.895904861Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 00:48:42.895999 env[1276]: time="2024-02-09T00:48:42.895918757Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 00:48:42.895999 env[1276]: time="2024-02-09T00:48:42.895925690Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 00:48:42.899754 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3153001151-merged.mount: Deactivated successfully. Feb 9 00:48:45.468602 env[1276]: time="2024-02-09T00:48:45.468543778Z" level=info msg="Loading containers: start." Feb 9 00:48:45.504000 audit[1310]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1310 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:48:45.504000 audit[1310]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc0717a820 a2=0 a3=7ffc0717a80c items=0 ppid=1276 pid=1310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:48:45.504000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 00:48:45.506000 audit[1312]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1312 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:48:45.506000 audit[1312]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc7f371b40 a2=0 a3=7ffc7f371b2c items=0 ppid=1276 pid=1312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:48:45.506000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 00:48:45.507000 audit[1314]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1314 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:48:45.507000 audit[1314]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc2d3b5ad0 a2=0 a3=7ffc2d3b5abc items=0 ppid=1276 pid=1314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:48:45.507000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 00:48:45.509000 audit[1316]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1316 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:48:45.509000 audit[1316]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcbfc2fcb0 a2=0 a3=7ffcbfc2fc9c items=0 ppid=1276 pid=1316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:48:45.509000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 00:48:45.510000 audit[1318]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1318 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:48:45.510000 audit[1318]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffef3d5afe0 a2=0 a3=7ffef3d5afcc items=0 ppid=1276 pid=1318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:48:45.510000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 9 00:48:45.524000 audit[1323]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1323 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:48:45.524000 audit[1323]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd1df8d5f0 a2=0 a3=7ffd1df8d5dc items=0 ppid=1276 pid=1323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:48:45.524000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 9 00:48:45.589000 audit[1325]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1325 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:48:45.589000 audit[1325]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffe45303d0 a2=0 a3=7fffe45303bc items=0 ppid=1276 pid=1325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:48:45.589000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 9 00:48:45.591000 audit[1327]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1327 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:48:45.591000 audit[1327]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd0197beb0 a2=0 a3=7ffd0197be9c items=0 ppid=1276 pid=1327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:48:45.591000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 9 00:48:45.593000 audit[1329]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1329 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:48:45.593000 audit[1329]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffc25d93c10 a2=0 a3=7ffc25d93bfc items=0 ppid=1276 pid=1329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:48:45.593000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 00:48:45.748000 audit[1333]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1333 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:48:45.748000 audit[1333]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc883c1900 a2=0 a3=7ffc883c18ec items=0 ppid=1276 pid=1333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:48:45.748000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 00:48:45.749000 audit[1334]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1334 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:48:45.749000 audit[1334]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd78bf97e0 a2=0 a3=7ffd78bf97cc items=0 ppid=1276 pid=1334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:48:45.749000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 00:48:45.756971 kernel: Initializing XFRM netlink socket Feb 9 00:48:45.781643 env[1276]: time="2024-02-09T00:48:45.781609136Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 00:48:45.792000 audit[1342]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1342 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:48:45.792000 audit[1342]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff62115000 a2=0 a3=7fff62114fec items=0 ppid=1276 pid=1342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:48:45.792000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 9 00:48:45.801000 audit[1345]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1345 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:48:45.801000 audit[1345]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffd209bec60 a2=0 a3=7ffd209bec4c items=0 ppid=1276 pid=1345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:48:45.801000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 9 00:48:45.803000 audit[1348]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1348 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:48:45.803000 audit[1348]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd31c82d90 a2=0 a3=7ffd31c82d7c items=0 ppid=1276 pid=1348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:48:45.803000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 9 00:48:45.804000 audit[1350]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1350 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:48:45.804000 audit[1350]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdab579ff0 a2=0 a3=7ffdab579fdc items=0 ppid=1276 pid=1350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:48:45.804000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 9 00:48:45.806000 audit[1352]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1352 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:48:45.806000 audit[1352]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffd1817e960 a2=0 a3=7ffd1817e94c items=0 ppid=1276 pid=1352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:48:45.806000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 9 00:48:45.807000 audit[1354]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1354 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:48:45.807000 audit[1354]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffc8747e900 a2=0 a3=7ffc8747e8ec items=0 ppid=1276 pid=1354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:48:45.807000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 9 00:48:45.809000 audit[1356]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1356 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:48:45.809000 audit[1356]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffea8484df0 a2=0 a3=7ffea8484ddc items=0 ppid=1276 pid=1356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:48:45.809000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 9 00:48:45.814000 audit[1359]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1359 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:48:45.814000 audit[1359]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffdb6bb7c80 a2=0 a3=7ffdb6bb7c6c items=0 ppid=1276 pid=1359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:48:45.814000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 9 00:48:45.816000 audit[1361]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1361 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:48:45.816000 audit[1361]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe3063e430 a2=0 a3=7ffe3063e41c items=0 ppid=1276 pid=1361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:48:45.816000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 00:48:45.818000 audit[1363]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1363 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:48:45.818000 audit[1363]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff44422ac0 a2=0 a3=7fff44422aac items=0 ppid=1276 pid=1363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:48:45.818000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 00:48:45.820000 audit[1365]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1365 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:48:45.820000 audit[1365]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe10dc99b0 a2=0 a3=7ffe10dc999c items=0 ppid=1276 pid=1365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:48:45.820000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 9 00:48:45.822680 systemd-networkd[1023]: docker0: Link UP Feb 9 00:48:45.847000 audit[1369]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1369 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:48:45.847000 audit[1369]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff11c25580 a2=0 a3=7fff11c2556c items=0 ppid=1276 pid=1369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:48:45.847000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 00:48:45.847000 audit[1370]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1370 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:48:45.847000 audit[1370]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe4475f510 a2=0 a3=7ffe4475f4fc items=0 ppid=1276 pid=1370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:48:45.847000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 00:48:45.850068 env[1276]: time="2024-02-09T00:48:45.850042598Z" level=info msg="Loading containers: done." Feb 9 00:48:45.864444 env[1276]: time="2024-02-09T00:48:45.864396822Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 00:48:45.864591 env[1276]: time="2024-02-09T00:48:45.864565519Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 00:48:45.864683 env[1276]: time="2024-02-09T00:48:45.864662360Z" level=info msg="Daemon has completed initialization" Feb 9 00:48:45.880580 systemd[1]: Started docker.service. Feb 9 00:48:45.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:45.884631 env[1276]: time="2024-02-09T00:48:45.884574045Z" level=info msg="API listen on /run/docker.sock" Feb 9 00:48:45.900306 systemd[1]: Reloading. Feb 9 00:48:45.973369 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2024-02-09T00:48:45Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 00:48:45.973394 /usr/lib/systemd/system-generators/torcx-generator[1421]: time="2024-02-09T00:48:45Z" level=info msg="torcx already run" Feb 9 00:48:46.029053 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 00:48:46.029068 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 00:48:46.047686 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 00:48:46.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.098000 audit: BPF prog-id=37 op=LOAD Feb 9 00:48:46.098000 audit: BPF prog-id=31 op=UNLOAD Feb 9 00:48:46.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.099000 audit: BPF prog-id=38 op=LOAD Feb 9 00:48:46.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.099000 audit: BPF prog-id=39 op=LOAD Feb 9 00:48:46.099000 audit: BPF prog-id=24 op=UNLOAD Feb 9 00:48:46.099000 audit: BPF prog-id=25 op=UNLOAD Feb 9 00:48:46.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.099000 audit: BPF prog-id=40 op=LOAD Feb 9 00:48:46.099000 audit: BPF prog-id=21 op=UNLOAD Feb 9 00:48:46.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.100000 audit: BPF prog-id=41 op=LOAD Feb 9 00:48:46.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.100000 audit: BPF prog-id=42 op=LOAD Feb 9 00:48:46.100000 audit: BPF prog-id=22 op=UNLOAD Feb 9 00:48:46.100000 audit: BPF prog-id=23 op=UNLOAD Feb 9 00:48:46.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.102000 audit: BPF prog-id=43 op=LOAD Feb 9 00:48:46.102000 audit: BPF prog-id=35 op=UNLOAD Feb 9 00:48:46.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.103000 audit: BPF prog-id=44 op=LOAD Feb 9 00:48:46.103000 audit: BPF prog-id=26 op=UNLOAD Feb 9 00:48:46.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.104000 audit: BPF prog-id=45 op=LOAD Feb 9 00:48:46.104000 audit: BPF prog-id=27 op=UNLOAD Feb 9 00:48:46.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.104000 audit: BPF prog-id=46 op=LOAD Feb 9 00:48:46.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.105000 audit: BPF prog-id=47 op=LOAD Feb 9 00:48:46.105000 audit: BPF prog-id=28 op=UNLOAD Feb 9 00:48:46.105000 audit: BPF prog-id=29 op=UNLOAD Feb 9 00:48:46.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.106000 audit: BPF prog-id=48 op=LOAD Feb 9 00:48:46.106000 audit: BPF prog-id=32 op=UNLOAD Feb 9 00:48:46.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.106000 audit: BPF prog-id=49 op=LOAD Feb 9 00:48:46.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.106000 audit: BPF prog-id=50 op=LOAD Feb 9 00:48:46.106000 audit: BPF prog-id=33 op=UNLOAD Feb 9 00:48:46.106000 audit: BPF prog-id=34 op=UNLOAD Feb 9 00:48:46.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:48:46.107000 audit: BPF prog-id=51 op=LOAD Feb 9 00:48:46.107000 audit: BPF prog-id=30 op=UNLOAD Feb 9 00:48:46.115853 systemd[1]: Started kubelet.service. Feb 9 00:48:46.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:46.157314 kubelet[1459]: E0209 00:48:46.157246 1459 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 00:48:46.159310 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 00:48:46.159443 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 00:48:46.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 00:48:46.572802 env[1127]: time="2024-02-09T00:48:46.572734776Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\"" Feb 9 00:48:48.441118 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount668760686.mount: Deactivated successfully. Feb 9 00:48:50.192394 env[1127]: time="2024-02-09T00:48:50.192343241Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:48:50.193823 env[1127]: time="2024-02-09T00:48:50.193782329Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7968fc5c824ed95404f421a90882835f250220c0fd799b4fceef340dd5585ed5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:48:50.195320 env[1127]: time="2024-02-09T00:48:50.195294565Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:48:50.196902 env[1127]: time="2024-02-09T00:48:50.196872203Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:cfcebda74d6e665b68931d3589ee69fde81cd503ff3169888e4502af65579d98,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:48:50.197473 env[1127]: time="2024-02-09T00:48:50.197440047Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\" returns image reference \"sha256:7968fc5c824ed95404f421a90882835f250220c0fd799b4fceef340dd5585ed5\"" Feb 9 00:48:50.206241 env[1127]: time="2024-02-09T00:48:50.206204310Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\"" Feb 9 00:48:52.646230 env[1127]: time="2024-02-09T00:48:52.646171739Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:48:52.648272 env[1127]: time="2024-02-09T00:48:52.648223045Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c8134be729ba23c6e0c3e5dd52c393fc8d3cfc688bcec33540f64bb0137b67e0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:48:52.650012 env[1127]: time="2024-02-09T00:48:52.649977404Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:48:52.651735 env[1127]: time="2024-02-09T00:48:52.651711185Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fa168ebca1f6dbfe86ef0a690e007531c1f53569274fc7dc2774fe228b6ce8c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:48:52.652550 env[1127]: time="2024-02-09T00:48:52.652517096Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\" returns image reference \"sha256:c8134be729ba23c6e0c3e5dd52c393fc8d3cfc688bcec33540f64bb0137b67e0\"" Feb 9 00:48:52.662470 env[1127]: time="2024-02-09T00:48:52.662427318Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\"" Feb 9 00:48:55.291110 env[1127]: time="2024-02-09T00:48:55.291051357Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:48:55.369798 env[1127]: time="2024-02-09T00:48:55.369769363Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5eed9876e7181341b7015e3486dfd234f8e0d0d7d3d19b1bb971d720cd320975,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:48:55.453909 env[1127]: time="2024-02-09T00:48:55.453845206Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:48:55.456575 env[1127]: time="2024-02-09T00:48:55.456534017Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09294de61e63987f181077cbc2f5c82463878af9cd8ecc6110c54150c9ae3143,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:48:55.457241 env[1127]: time="2024-02-09T00:48:55.457212569Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\" returns image reference \"sha256:5eed9876e7181341b7015e3486dfd234f8e0d0d7d3d19b1bb971d720cd320975\"" Feb 9 00:48:55.467061 env[1127]: time="2024-02-09T00:48:55.467017133Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\"" Feb 9 00:48:56.410335 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 9 00:48:56.410643 systemd[1]: Stopped kubelet.service. Feb 9 00:48:56.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:56.411757 kernel: kauditd_printk_skb: 259 callbacks suppressed Feb 9 00:48:56.411795 kernel: audit: type=1130 audit(1707439736.408:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:56.411894 systemd[1]: Started kubelet.service. Feb 9 00:48:56.408000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:56.418615 kernel: audit: type=1131 audit(1707439736.408:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:56.418678 kernel: audit: type=1130 audit(1707439736.410:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:56.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:48:56.455959 kubelet[1502]: E0209 00:48:56.455883 1502 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 00:48:56.459389 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 00:48:56.459547 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 00:48:56.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 00:48:56.462986 kernel: audit: type=1131 audit(1707439736.457:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 00:48:56.864090 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3362291483.mount: Deactivated successfully. Feb 9 00:48:57.805853 env[1127]: time="2024-02-09T00:48:57.805797756Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:48:57.807902 env[1127]: time="2024-02-09T00:48:57.807877846Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:48:57.809707 env[1127]: time="2024-02-09T00:48:57.809681288Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:48:57.811139 env[1127]: time="2024-02-09T00:48:57.811100248Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:48:57.811405 env[1127]: time="2024-02-09T00:48:57.811377668Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\" returns image reference \"sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae\"" Feb 9 00:48:57.819492 env[1127]: time="2024-02-09T00:48:57.819456105Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 9 00:48:58.809177 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1318704906.mount: Deactivated successfully. Feb 9 00:48:58.815430 env[1127]: time="2024-02-09T00:48:58.815391935Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:48:58.817517 env[1127]: time="2024-02-09T00:48:58.817473728Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:48:58.818984 env[1127]: time="2024-02-09T00:48:58.818922935Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:48:58.820530 env[1127]: time="2024-02-09T00:48:58.820500223Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:48:58.820870 env[1127]: time="2024-02-09T00:48:58.820840581Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 9 00:48:58.830239 env[1127]: time="2024-02-09T00:48:58.830216030Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Feb 9 00:48:59.500657 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3938518566.mount: Deactivated successfully. Feb 9 00:49:05.017828 env[1127]: time="2024-02-09T00:49:05.017757889Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:05.019494 env[1127]: time="2024-02-09T00:49:05.019416229Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:05.021306 env[1127]: time="2024-02-09T00:49:05.021278230Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:05.024647 env[1127]: time="2024-02-09T00:49:05.024587535Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681\"" Feb 9 00:49:05.026400 env[1127]: time="2024-02-09T00:49:05.026358365Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:05.036392 env[1127]: time="2024-02-09T00:49:05.036367432Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 9 00:49:05.638855 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2240607220.mount: Deactivated successfully. Feb 9 00:49:06.328266 env[1127]: time="2024-02-09T00:49:06.328200980Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:06.329916 env[1127]: time="2024-02-09T00:49:06.329882192Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:06.331558 env[1127]: time="2024-02-09T00:49:06.331532516Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:06.333201 env[1127]: time="2024-02-09T00:49:06.333143637Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:06.333574 env[1127]: time="2024-02-09T00:49:06.333542756Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Feb 9 00:49:06.569436 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Feb 9 00:49:06.569614 systemd[1]: Stopped kubelet.service. Feb 9 00:49:06.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:49:06.570934 systemd[1]: Started kubelet.service. Feb 9 00:49:06.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:49:06.576216 kernel: audit: type=1130 audit(1707439746.567:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:49:06.576344 kernel: audit: type=1131 audit(1707439746.567:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:49:06.576364 kernel: audit: type=1130 audit(1707439746.569:397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:49:06.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:49:06.612509 kubelet[1537]: E0209 00:49:06.612390 1537 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 00:49:06.614512 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 00:49:06.614652 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 00:49:06.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 00:49:06.617962 kernel: audit: type=1131 audit(1707439746.612:398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 00:49:07.935184 systemd[1]: Stopped kubelet.service. Feb 9 00:49:07.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:49:07.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:49:07.939863 kernel: audit: type=1130 audit(1707439747.933:399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:49:07.939980 kernel: audit: type=1131 audit(1707439747.933:400): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:49:07.946746 systemd[1]: Reloading. Feb 9 00:49:08.007575 /usr/lib/systemd/system-generators/torcx-generator[1636]: time="2024-02-09T00:49:08Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 00:49:08.007922 /usr/lib/systemd/system-generators/torcx-generator[1636]: time="2024-02-09T00:49:08Z" level=info msg="torcx already run" Feb 9 00:49:08.067910 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 00:49:08.067927 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 00:49:08.086195 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 00:49:08.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.142564 kernel: audit: type=1400 audit(1707439748.135:401): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.142609 kernel: audit: type=1400 audit(1707439748.135:402): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.142627 kernel: audit: type=1400 audit(1707439748.135:403): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.147483 kernel: audit: type=1400 audit(1707439748.135:404): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.140000 audit: BPF prog-id=52 op=LOAD Feb 9 00:49:08.140000 audit: BPF prog-id=37 op=UNLOAD Feb 9 00:49:08.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.143000 audit: BPF prog-id=53 op=LOAD Feb 9 00:49:08.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.145000 audit: BPF prog-id=54 op=LOAD Feb 9 00:49:08.145000 audit: BPF prog-id=38 op=UNLOAD Feb 9 00:49:08.145000 audit: BPF prog-id=39 op=UNLOAD Feb 9 00:49:08.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.146000 audit: BPF prog-id=55 op=LOAD Feb 9 00:49:08.146000 audit: BPF prog-id=40 op=UNLOAD Feb 9 00:49:08.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.146000 audit: BPF prog-id=56 op=LOAD Feb 9 00:49:08.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.146000 audit: BPF prog-id=57 op=LOAD Feb 9 00:49:08.146000 audit: BPF prog-id=41 op=UNLOAD Feb 9 00:49:08.146000 audit: BPF prog-id=42 op=UNLOAD Feb 9 00:49:08.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.148000 audit: BPF prog-id=58 op=LOAD Feb 9 00:49:08.148000 audit: BPF prog-id=43 op=UNLOAD Feb 9 00:49:08.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.149000 audit: BPF prog-id=59 op=LOAD Feb 9 00:49:08.149000 audit: BPF prog-id=44 op=UNLOAD Feb 9 00:49:08.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.150000 audit: BPF prog-id=60 op=LOAD Feb 9 00:49:08.150000 audit: BPF prog-id=45 op=UNLOAD Feb 9 00:49:08.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.150000 audit: BPF prog-id=61 op=LOAD Feb 9 00:49:08.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.150000 audit: BPF prog-id=62 op=LOAD Feb 9 00:49:08.150000 audit: BPF prog-id=46 op=UNLOAD Feb 9 00:49:08.150000 audit: BPF prog-id=47 op=UNLOAD Feb 9 00:49:08.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.151000 audit: BPF prog-id=63 op=LOAD Feb 9 00:49:08.151000 audit: BPF prog-id=48 op=UNLOAD Feb 9 00:49:08.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.151000 audit: BPF prog-id=64 op=LOAD Feb 9 00:49:08.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.151000 audit: BPF prog-id=65 op=LOAD Feb 9 00:49:08.151000 audit: BPF prog-id=49 op=UNLOAD Feb 9 00:49:08.151000 audit: BPF prog-id=50 op=UNLOAD Feb 9 00:49:08.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.152000 audit: BPF prog-id=66 op=LOAD Feb 9 00:49:08.152000 audit: BPF prog-id=51 op=UNLOAD Feb 9 00:49:08.166168 systemd[1]: Started kubelet.service. Feb 9 00:49:08.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:49:08.213837 kubelet[1677]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 00:49:08.213837 kubelet[1677]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 00:49:08.213837 kubelet[1677]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 00:49:08.213837 kubelet[1677]: I0209 00:49:08.213793 1677 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 00:49:08.624739 kubelet[1677]: I0209 00:49:08.624700 1677 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 9 00:49:08.624739 kubelet[1677]: I0209 00:49:08.624736 1677 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 00:49:08.625024 kubelet[1677]: I0209 00:49:08.625010 1677 server.go:837] "Client rotation is on, will bootstrap in background" Feb 9 00:49:08.629376 kubelet[1677]: I0209 00:49:08.629337 1677 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 00:49:08.630096 kubelet[1677]: E0209 00:49:08.630082 1677 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.84:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.84:6443: connect: connection refused Feb 9 00:49:08.633099 kubelet[1677]: I0209 00:49:08.633082 1677 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 00:49:08.633272 kubelet[1677]: I0209 00:49:08.633261 1677 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 00:49:08.633326 kubelet[1677]: I0209 00:49:08.633318 1677 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 00:49:08.633412 kubelet[1677]: I0209 00:49:08.633333 1677 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 00:49:08.633412 kubelet[1677]: I0209 00:49:08.633343 1677 container_manager_linux.go:302] "Creating device plugin manager" Feb 9 00:49:08.633455 kubelet[1677]: I0209 00:49:08.633420 1677 state_mem.go:36] "Initialized new in-memory state store" Feb 9 00:49:08.635459 kubelet[1677]: I0209 00:49:08.635441 1677 kubelet.go:405] "Attempting to sync node with API server" Feb 9 00:49:08.635459 kubelet[1677]: I0209 00:49:08.635462 1677 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 00:49:08.635526 kubelet[1677]: I0209 00:49:08.635478 1677 kubelet.go:309] "Adding apiserver pod source" Feb 9 00:49:08.635526 kubelet[1677]: I0209 00:49:08.635491 1677 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 00:49:08.638908 kubelet[1677]: I0209 00:49:08.638887 1677 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 00:49:08.638981 kubelet[1677]: W0209 00:49:08.638918 1677 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.0.0.84:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.84:6443: connect: connection refused Feb 9 00:49:08.639022 kubelet[1677]: E0209 00:49:08.638989 1677 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.84:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.84:6443: connect: connection refused Feb 9 00:49:08.639128 kubelet[1677]: W0209 00:49:08.639084 1677 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.0.0.84:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.84:6443: connect: connection refused Feb 9 00:49:08.639179 kubelet[1677]: E0209 00:49:08.639136 1677 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.84:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.84:6443: connect: connection refused Feb 9 00:49:08.639179 kubelet[1677]: W0209 00:49:08.639165 1677 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 00:49:08.639528 kubelet[1677]: I0209 00:49:08.639505 1677 server.go:1168] "Started kubelet" Feb 9 00:49:08.639583 kubelet[1677]: I0209 00:49:08.639568 1677 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 00:49:08.639723 kubelet[1677]: I0209 00:49:08.639704 1677 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 00:49:08.640071 kubelet[1677]: E0209 00:49:08.639968 1677 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.17b20b67ad09f690", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 49, 8, 639487632, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 49, 8, 639487632, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.0.0.84:6443/api/v1/namespaces/default/events": dial tcp 10.0.0.84:6443: connect: connection refused'(may retry after sleeping) Feb 9 00:49:08.640196 kubelet[1677]: E0209 00:49:08.640105 1677 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 00:49:08.640196 kubelet[1677]: E0209 00:49:08.640122 1677 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 00:49:08.640454 kubelet[1677]: I0209 00:49:08.640437 1677 server.go:461] "Adding debug handlers to kubelet server" Feb 9 00:49:08.639000 audit[1677]: AVC avc: denied { mac_admin } for pid=1677 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.639000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 00:49:08.639000 audit[1677]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000fcd0b0 a1=c000fe6870 a2=c000fcd080 a3=25 items=0 ppid=1 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:08.639000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 00:49:08.639000 audit[1677]: AVC avc: denied { mac_admin } for pid=1677 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.639000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 00:49:08.639000 audit[1677]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e86000 a1=c000fe6888 a2=c000fcd140 a3=25 items=0 ppid=1 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:08.639000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 00:49:08.641431 kubelet[1677]: I0209 00:49:08.641067 1677 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 00:49:08.641431 kubelet[1677]: I0209 00:49:08.641110 1677 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 00:49:08.641431 kubelet[1677]: I0209 00:49:08.641168 1677 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 00:49:08.641515 kubelet[1677]: I0209 00:49:08.641460 1677 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 9 00:49:08.642044 kubelet[1677]: W0209 00:49:08.642008 1677 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.0.0.84:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.84:6443: connect: connection refused Feb 9 00:49:08.642094 kubelet[1677]: E0209 00:49:08.642050 1677 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.84:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.84:6443: connect: connection refused Feb 9 00:49:08.642136 kubelet[1677]: E0209 00:49:08.642102 1677 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 9 00:49:08.642136 kubelet[1677]: I0209 00:49:08.642121 1677 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 9 00:49:08.643191 kubelet[1677]: E0209 00:49:08.643169 1677 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.84:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.84:6443: connect: connection refused" interval="200ms" Feb 9 00:49:08.641000 audit[1689]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1689 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:49:08.641000 audit[1689]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd78f86690 a2=0 a3=7ffd78f8667c items=0 ppid=1677 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:08.641000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 00:49:08.643000 audit[1691]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1691 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:49:08.643000 audit[1691]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5f900310 a2=0 a3=7ffe5f9002fc items=0 ppid=1677 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:08.643000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 00:49:08.645000 audit[1693]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1693 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:49:08.645000 audit[1693]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffccb1a4200 a2=0 a3=7ffccb1a41ec items=0 ppid=1677 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:08.645000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 00:49:08.648000 audit[1697]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1697 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:49:08.648000 audit[1697]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe1c8fb260 a2=0 a3=7ffe1c8fb24c items=0 ppid=1677 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:08.648000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 00:49:08.653000 audit[1700]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:49:08.653000 audit[1700]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff3c314270 a2=0 a3=7fff3c31425c items=0 ppid=1677 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:08.653000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 00:49:08.656158 kubelet[1677]: I0209 00:49:08.656138 1677 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 00:49:08.654000 audit[1702]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1702 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:49:08.654000 audit[1702]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd780158a0 a2=0 a3=7ffd7801588c items=0 ppid=1677 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:08.654000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 00:49:08.657007 kubelet[1677]: I0209 00:49:08.656919 1677 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 00:49:08.657007 kubelet[1677]: I0209 00:49:08.656957 1677 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 9 00:49:08.657007 kubelet[1677]: I0209 00:49:08.656978 1677 kubelet.go:2257] "Starting kubelet main sync loop" Feb 9 00:49:08.657091 kubelet[1677]: E0209 00:49:08.657020 1677 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 00:49:08.657642 kubelet[1677]: W0209 00:49:08.657611 1677 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.0.0.84:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.84:6443: connect: connection refused Feb 9 00:49:08.657712 kubelet[1677]: E0209 00:49:08.657658 1677 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.84:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.84:6443: connect: connection refused Feb 9 00:49:08.656000 audit[1703]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1703 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:49:08.656000 audit[1703]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffa327e3b0 a2=0 a3=7fffa327e39c items=0 ppid=1677 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:08.656000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 00:49:08.656000 audit[1704]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1704 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:49:08.656000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc46834620 a2=0 a3=7ffc4683460c items=0 ppid=1677 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:08.656000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 00:49:08.657000 audit[1705]: NETFILTER_CFG table=nat:34 family=10 entries=2 op=nft_register_chain pid=1705 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:49:08.657000 audit[1705]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffcdd12c350 a2=0 a3=7ffcdd12c33c items=0 ppid=1677 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:08.657000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 00:49:08.658000 audit[1706]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=1706 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:49:08.658000 audit[1706]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd32159d0 a2=0 a3=7ffdd32159bc items=0 ppid=1677 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:08.658000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 00:49:08.658000 audit[1708]: NETFILTER_CFG table=filter:36 family=10 entries=2 op=nft_register_chain pid=1708 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:49:08.658000 audit[1708]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffef75dd9f0 a2=0 a3=7ffef75dd9dc items=0 ppid=1677 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:08.658000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 00:49:08.658000 audit[1710]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:49:08.658000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc78c37a0 a2=0 a3=7fffc78c378c items=0 ppid=1677 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:08.658000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 00:49:08.662088 kubelet[1677]: I0209 00:49:08.662070 1677 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 00:49:08.662088 kubelet[1677]: I0209 00:49:08.662088 1677 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 00:49:08.662172 kubelet[1677]: I0209 00:49:08.662102 1677 state_mem.go:36] "Initialized new in-memory state store" Feb 9 00:49:08.677423 kubelet[1677]: I0209 00:49:08.677382 1677 policy_none.go:49] "None policy: Start" Feb 9 00:49:08.678119 kubelet[1677]: I0209 00:49:08.678083 1677 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 00:49:08.678119 kubelet[1677]: I0209 00:49:08.678107 1677 state_mem.go:35] "Initializing new in-memory state store" Feb 9 00:49:08.684575 systemd[1]: Created slice kubepods.slice. Feb 9 00:49:08.688347 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 00:49:08.690765 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 00:49:08.696587 kubelet[1677]: I0209 00:49:08.696562 1677 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 00:49:08.694000 audit[1677]: AVC avc: denied { mac_admin } for pid=1677 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:08.694000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 00:49:08.694000 audit[1677]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ea3cb0 a1=c000c4ce28 a2=c000ea3c80 a3=25 items=0 ppid=1 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:08.694000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 00:49:08.696866 kubelet[1677]: I0209 00:49:08.696619 1677 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 00:49:08.696866 kubelet[1677]: I0209 00:49:08.696782 1677 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 00:49:08.697386 kubelet[1677]: E0209 00:49:08.697372 1677 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Feb 9 00:49:08.743860 kubelet[1677]: I0209 00:49:08.743838 1677 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 9 00:49:08.744147 kubelet[1677]: E0209 00:49:08.744120 1677 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.84:6443/api/v1/nodes\": dial tcp 10.0.0.84:6443: connect: connection refused" node="localhost" Feb 9 00:49:08.757235 kubelet[1677]: I0209 00:49:08.757212 1677 topology_manager.go:212] "Topology Admit Handler" Feb 9 00:49:08.757950 kubelet[1677]: I0209 00:49:08.757928 1677 topology_manager.go:212] "Topology Admit Handler" Feb 9 00:49:08.758615 kubelet[1677]: I0209 00:49:08.758600 1677 topology_manager.go:212] "Topology Admit Handler" Feb 9 00:49:08.762481 systemd[1]: Created slice kubepods-burstable-pod82d03585b4dae41d9647725cb5c0c7de.slice. Feb 9 00:49:08.773744 systemd[1]: Created slice kubepods-burstable-pod2b0e94b38682f4e439413801d3cc54db.slice. Feb 9 00:49:08.775969 systemd[1]: Created slice kubepods-burstable-pod7709ea05d7cdf82b0d7e594b61a10331.slice. Feb 9 00:49:08.843720 kubelet[1677]: E0209 00:49:08.843693 1677 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.84:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.84:6443: connect: connection refused" interval="400ms" Feb 9 00:49:08.944057 kubelet[1677]: I0209 00:49:08.943989 1677 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/82d03585b4dae41d9647725cb5c0c7de-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"82d03585b4dae41d9647725cb5c0c7de\") " pod="kube-system/kube-apiserver-localhost" Feb 9 00:49:08.944057 kubelet[1677]: I0209 00:49:08.944020 1677 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/82d03585b4dae41d9647725cb5c0c7de-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"82d03585b4dae41d9647725cb5c0c7de\") " pod="kube-system/kube-apiserver-localhost" Feb 9 00:49:08.944057 kubelet[1677]: I0209 00:49:08.944041 1677 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/82d03585b4dae41d9647725cb5c0c7de-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"82d03585b4dae41d9647725cb5c0c7de\") " pod="kube-system/kube-apiserver-localhost" Feb 9 00:49:08.944057 kubelet[1677]: I0209 00:49:08.944058 1677 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 00:49:08.944173 kubelet[1677]: I0209 00:49:08.944076 1677 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 00:49:08.944173 kubelet[1677]: I0209 00:49:08.944126 1677 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 00:49:08.944173 kubelet[1677]: I0209 00:49:08.944145 1677 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 00:49:08.944173 kubelet[1677]: I0209 00:49:08.944161 1677 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 00:49:08.944380 kubelet[1677]: I0209 00:49:08.944255 1677 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2b0e94b38682f4e439413801d3cc54db-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2b0e94b38682f4e439413801d3cc54db\") " pod="kube-system/kube-scheduler-localhost" Feb 9 00:49:08.945018 kubelet[1677]: I0209 00:49:08.945006 1677 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 9 00:49:08.945251 kubelet[1677]: E0209 00:49:08.945238 1677 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.84:6443/api/v1/nodes\": dial tcp 10.0.0.84:6443: connect: connection refused" node="localhost" Feb 9 00:49:09.072078 kubelet[1677]: E0209 00:49:09.072039 1677 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:09.072736 env[1127]: time="2024-02-09T00:49:09.072692902Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:82d03585b4dae41d9647725cb5c0c7de,Namespace:kube-system,Attempt:0,}" Feb 9 00:49:09.075904 kubelet[1677]: E0209 00:49:09.075884 1677 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:09.076360 env[1127]: time="2024-02-09T00:49:09.076324096Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2b0e94b38682f4e439413801d3cc54db,Namespace:kube-system,Attempt:0,}" Feb 9 00:49:09.077441 kubelet[1677]: E0209 00:49:09.077428 1677 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:09.077721 env[1127]: time="2024-02-09T00:49:09.077691770Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:7709ea05d7cdf82b0d7e594b61a10331,Namespace:kube-system,Attempt:0,}" Feb 9 00:49:09.245133 kubelet[1677]: E0209 00:49:09.245039 1677 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.84:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.84:6443: connect: connection refused" interval="800ms" Feb 9 00:49:09.346602 kubelet[1677]: I0209 00:49:09.346546 1677 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 9 00:49:09.346918 kubelet[1677]: E0209 00:49:09.346896 1677 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.84:6443/api/v1/nodes\": dial tcp 10.0.0.84:6443: connect: connection refused" node="localhost" Feb 9 00:49:09.585271 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4218439725.mount: Deactivated successfully. Feb 9 00:49:09.588910 env[1127]: time="2024-02-09T00:49:09.588865372Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:09.591844 env[1127]: time="2024-02-09T00:49:09.591816657Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:09.593292 env[1127]: time="2024-02-09T00:49:09.593265147Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:09.594302 env[1127]: time="2024-02-09T00:49:09.594260865Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:09.595140 env[1127]: time="2024-02-09T00:49:09.595097305Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:09.596300 env[1127]: time="2024-02-09T00:49:09.596271809Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:09.597505 env[1127]: time="2024-02-09T00:49:09.597475987Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:09.599190 env[1127]: time="2024-02-09T00:49:09.599165843Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:09.600256 env[1127]: time="2024-02-09T00:49:09.600237336Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:09.600793 env[1127]: time="2024-02-09T00:49:09.600769271Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:09.601909 env[1127]: time="2024-02-09T00:49:09.601881493Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:09.603119 env[1127]: time="2024-02-09T00:49:09.603093588Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:09.620261 env[1127]: time="2024-02-09T00:49:09.620188925Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 00:49:09.620261 env[1127]: time="2024-02-09T00:49:09.620231386Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 00:49:09.620488 env[1127]: time="2024-02-09T00:49:09.620447012Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 00:49:09.623128 env[1127]: time="2024-02-09T00:49:09.620720498Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bd8bc902104804e070f8275f385344330ec1e87e2766ac0125e63664bb7666c3 pid=1726 runtime=io.containerd.runc.v2 Feb 9 00:49:09.623128 env[1127]: time="2024-02-09T00:49:09.621450124Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 00:49:09.623128 env[1127]: time="2024-02-09T00:49:09.621509399Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 00:49:09.623128 env[1127]: time="2024-02-09T00:49:09.621524968Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 00:49:09.623128 env[1127]: time="2024-02-09T00:49:09.622634104Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9f1938b9efba8798db3fdce1a8ee9ed49212f1839372bf0481e47e34632d8251 pid=1727 runtime=io.containerd.runc.v2 Feb 9 00:49:09.629212 env[1127]: time="2024-02-09T00:49:09.629099878Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 00:49:09.629212 env[1127]: time="2024-02-09T00:49:09.629137801Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 00:49:09.629212 env[1127]: time="2024-02-09T00:49:09.629174993Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 00:49:09.629439 env[1127]: time="2024-02-09T00:49:09.629298250Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4362fc1960b3417ba6f1ace37767b613dffb2e03547031dc21b2176b0d8c8362 pid=1762 runtime=io.containerd.runc.v2 Feb 9 00:49:09.632807 systemd[1]: Started cri-containerd-bd8bc902104804e070f8275f385344330ec1e87e2766ac0125e63664bb7666c3.scope. Feb 9 00:49:09.642027 systemd[1]: Started cri-containerd-9f1938b9efba8798db3fdce1a8ee9ed49212f1839372bf0481e47e34632d8251.scope. Feb 9 00:49:09.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.645000 audit: BPF prog-id=67 op=LOAD Feb 9 00:49:09.646000 audit[1744]: AVC avc: denied { bpf } for pid=1744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.646000 audit[1744]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1726 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:09.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264386263393032313034383034653037306638323735663338353334 Feb 9 00:49:09.646000 audit[1744]: AVC avc: denied { perfmon } for pid=1744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.646000 audit[1744]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1726 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:09.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264386263393032313034383034653037306638323735663338353334 Feb 9 00:49:09.646000 audit[1744]: AVC avc: denied { bpf } for pid=1744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.646000 audit[1744]: AVC avc: denied { bpf } for pid=1744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.646000 audit[1744]: AVC avc: denied { bpf } for pid=1744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.646000 audit[1744]: AVC avc: denied { perfmon } for pid=1744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.646000 audit[1744]: AVC avc: denied { perfmon } for pid=1744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.646000 audit[1744]: AVC avc: denied { perfmon } for pid=1744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.646000 audit[1744]: AVC avc: denied { perfmon } for pid=1744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.646000 audit[1744]: AVC avc: denied { perfmon } for pid=1744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.646000 audit[1744]: AVC avc: denied { bpf } for pid=1744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.646000 audit[1744]: AVC avc: denied { bpf } for pid=1744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.646000 audit: BPF prog-id=68 op=LOAD Feb 9 00:49:09.646000 audit[1744]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002ede60 items=0 ppid=1726 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:09.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264386263393032313034383034653037306638323735663338353334 Feb 9 00:49:09.646000 audit[1744]: AVC avc: denied { bpf } for pid=1744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.646000 audit[1744]: AVC avc: denied { bpf } for pid=1744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.646000 audit[1744]: AVC avc: denied { perfmon } for pid=1744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.646000 audit[1744]: AVC avc: denied { perfmon } for pid=1744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.646000 audit[1744]: AVC avc: denied { perfmon } for pid=1744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.646000 audit[1744]: AVC avc: denied { perfmon } for pid=1744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.646000 audit[1744]: AVC avc: denied { perfmon } for pid=1744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.646000 audit[1744]: AVC avc: denied { bpf } for pid=1744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.646000 audit[1744]: AVC avc: denied { bpf } for pid=1744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.646000 audit: BPF prog-id=69 op=LOAD Feb 9 00:49:09.646000 audit[1744]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002edea8 items=0 ppid=1726 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:09.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264386263393032313034383034653037306638323735663338353334 Feb 9 00:49:09.646000 audit: BPF prog-id=69 op=UNLOAD Feb 9 00:49:09.648738 systemd[1]: Started cri-containerd-4362fc1960b3417ba6f1ace37767b613dffb2e03547031dc21b2176b0d8c8362.scope. Feb 9 00:49:09.647000 audit: BPF prog-id=68 op=UNLOAD Feb 9 00:49:09.647000 audit[1744]: AVC avc: denied { bpf } for pid=1744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.647000 audit[1744]: AVC avc: denied { bpf } for pid=1744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.647000 audit[1744]: AVC avc: denied { bpf } for pid=1744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.647000 audit[1744]: AVC avc: denied { perfmon } for pid=1744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.647000 audit[1744]: AVC avc: denied { perfmon } for pid=1744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.647000 audit[1744]: AVC avc: denied { perfmon } for pid=1744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.647000 audit[1744]: AVC avc: denied { perfmon } for pid=1744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.647000 audit[1744]: AVC avc: denied { perfmon } for pid=1744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.647000 audit[1744]: AVC avc: denied { bpf } for pid=1744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.647000 audit[1744]: AVC avc: denied { bpf } for pid=1744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.647000 audit: BPF prog-id=70 op=LOAD Feb 9 00:49:09.647000 audit[1744]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e22b8 items=0 ppid=1726 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:09.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264386263393032313034383034653037306638323735663338353334 Feb 9 00:49:09.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.655000 audit: BPF prog-id=71 op=LOAD Feb 9 00:49:09.656000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.656000 audit[1746]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1727 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:09.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966313933386239656662613837393864623366646365316138656539 Feb 9 00:49:09.656000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.656000 audit[1746]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1727 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:09.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966313933386239656662613837393864623366646365316138656539 Feb 9 00:49:09.656000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.656000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.656000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.656000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.656000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.656000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.656000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.656000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.656000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.656000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.656000 audit: BPF prog-id=72 op=LOAD Feb 9 00:49:09.656000 audit[1746]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00024c790 items=0 ppid=1727 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:09.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966313933386239656662613837393864623366646365316138656539 Feb 9 00:49:09.657000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.657000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.657000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.657000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.657000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.657000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.657000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.657000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.657000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.657000 audit: BPF prog-id=73 op=LOAD Feb 9 00:49:09.657000 audit[1746]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00024c7d8 items=0 ppid=1727 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:09.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966313933386239656662613837393864623366646365316138656539 Feb 9 00:49:09.657000 audit: BPF prog-id=73 op=UNLOAD Feb 9 00:49:09.657000 audit: BPF prog-id=72 op=UNLOAD Feb 9 00:49:09.657000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.657000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.657000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.657000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.657000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.657000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.657000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.657000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.657000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.657000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.657000 audit: BPF prog-id=74 op=LOAD Feb 9 00:49:09.657000 audit[1746]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00024cbe8 items=0 ppid=1727 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:09.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966313933386239656662613837393864623366646365316138656539 Feb 9 00:49:09.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.659000 audit: BPF prog-id=75 op=LOAD Feb 9 00:49:09.660000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.660000 audit[1778]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1762 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:09.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433363266633139363062333431376261366631616365333737363762 Feb 9 00:49:09.660000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.660000 audit[1778]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1762 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:09.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433363266633139363062333431376261366631616365333737363762 Feb 9 00:49:09.660000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.660000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.660000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.660000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.660000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.660000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.660000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.660000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.660000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.660000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.660000 audit: BPF prog-id=76 op=LOAD Feb 9 00:49:09.660000 audit[1778]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001a0d40 items=0 ppid=1762 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:09.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433363266633139363062333431376261366631616365333737363762 Feb 9 00:49:09.660000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.660000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.660000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.660000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.660000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.660000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.660000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.660000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.660000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.660000 audit: BPF prog-id=77 op=LOAD Feb 9 00:49:09.660000 audit[1778]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001a0d88 items=0 ppid=1762 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:09.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433363266633139363062333431376261366631616365333737363762 Feb 9 00:49:09.660000 audit: BPF prog-id=77 op=UNLOAD Feb 9 00:49:09.660000 audit: BPF prog-id=76 op=UNLOAD Feb 9 00:49:09.660000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.660000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.660000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.660000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.660000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.660000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.660000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.660000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.660000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.660000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.660000 audit: BPF prog-id=78 op=LOAD Feb 9 00:49:09.660000 audit[1778]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0001a1198 items=0 ppid=1762 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:09.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433363266633139363062333431376261366631616365333737363762 Feb 9 00:49:09.678126 env[1127]: time="2024-02-09T00:49:09.678083435Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2b0e94b38682f4e439413801d3cc54db,Namespace:kube-system,Attempt:0,} returns sandbox id \"bd8bc902104804e070f8275f385344330ec1e87e2766ac0125e63664bb7666c3\"" Feb 9 00:49:09.678933 kubelet[1677]: E0209 00:49:09.678918 1677 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:09.680257 kubelet[1677]: W0209 00:49:09.680198 1677 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.0.0.84:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.84:6443: connect: connection refused Feb 9 00:49:09.680309 kubelet[1677]: E0209 00:49:09.680267 1677 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.84:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.84:6443: connect: connection refused Feb 9 00:49:09.681269 env[1127]: time="2024-02-09T00:49:09.681244694Z" level=info msg="CreateContainer within sandbox \"bd8bc902104804e070f8275f385344330ec1e87e2766ac0125e63664bb7666c3\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 9 00:49:09.691851 env[1127]: time="2024-02-09T00:49:09.690902506Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:82d03585b4dae41d9647725cb5c0c7de,Namespace:kube-system,Attempt:0,} returns sandbox id \"9f1938b9efba8798db3fdce1a8ee9ed49212f1839372bf0481e47e34632d8251\"" Feb 9 00:49:09.691965 kubelet[1677]: E0209 00:49:09.691581 1677 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:09.693688 env[1127]: time="2024-02-09T00:49:09.693663134Z" level=info msg="CreateContainer within sandbox \"9f1938b9efba8798db3fdce1a8ee9ed49212f1839372bf0481e47e34632d8251\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 9 00:49:09.696611 env[1127]: time="2024-02-09T00:49:09.696583558Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:7709ea05d7cdf82b0d7e594b61a10331,Namespace:kube-system,Attempt:0,} returns sandbox id \"4362fc1960b3417ba6f1ace37767b613dffb2e03547031dc21b2176b0d8c8362\"" Feb 9 00:49:09.697166 kubelet[1677]: E0209 00:49:09.697152 1677 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:09.698575 env[1127]: time="2024-02-09T00:49:09.698555226Z" level=info msg="CreateContainer within sandbox \"4362fc1960b3417ba6f1ace37767b613dffb2e03547031dc21b2176b0d8c8362\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 9 00:49:09.701152 env[1127]: time="2024-02-09T00:49:09.701125307Z" level=info msg="CreateContainer within sandbox \"bd8bc902104804e070f8275f385344330ec1e87e2766ac0125e63664bb7666c3\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"8d78a0e3626c5f06976227bc823fb0eb5d1cbeca060d6544df6d130e2c659ca5\"" Feb 9 00:49:09.701689 env[1127]: time="2024-02-09T00:49:09.701638194Z" level=info msg="StartContainer for \"8d78a0e3626c5f06976227bc823fb0eb5d1cbeca060d6544df6d130e2c659ca5\"" Feb 9 00:49:09.716171 systemd[1]: Started cri-containerd-8d78a0e3626c5f06976227bc823fb0eb5d1cbeca060d6544df6d130e2c659ca5.scope. Feb 9 00:49:09.717470 kubelet[1677]: W0209 00:49:09.717209 1677 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.0.0.84:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.84:6443: connect: connection refused Feb 9 00:49:09.717470 kubelet[1677]: E0209 00:49:09.717274 1677 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.84:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.84:6443: connect: connection refused Feb 9 00:49:09.718749 env[1127]: time="2024-02-09T00:49:09.718693364Z" level=info msg="CreateContainer within sandbox \"9f1938b9efba8798db3fdce1a8ee9ed49212f1839372bf0481e47e34632d8251\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"eac2065d450d36e438cd1c912d5bf8398363e21b24324405a1dbbe2f5f71e727\"" Feb 9 00:49:09.719121 env[1127]: time="2024-02-09T00:49:09.719094137Z" level=info msg="StartContainer for \"eac2065d450d36e438cd1c912d5bf8398363e21b24324405a1dbbe2f5f71e727\"" Feb 9 00:49:09.723252 env[1127]: time="2024-02-09T00:49:09.723222929Z" level=info msg="CreateContainer within sandbox \"4362fc1960b3417ba6f1ace37767b613dffb2e03547031dc21b2176b0d8c8362\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"e33e4d1d78d7ea396f0f29cb19ec14af408d9bb242ab02c9dd2de0ef46c3fb7f\"" Feb 9 00:49:09.723816 env[1127]: time="2024-02-09T00:49:09.723776284Z" level=info msg="StartContainer for \"e33e4d1d78d7ea396f0f29cb19ec14af408d9bb242ab02c9dd2de0ef46c3fb7f\"" Feb 9 00:49:09.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit: BPF prog-id=79 op=LOAD Feb 9 00:49:09.726000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1726 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:09.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864373861306533363236633566303639373632323762633832336662 Feb 9 00:49:09.726000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1726 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:09.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864373861306533363236633566303639373632323762633832336662 Feb 9 00:49:09.726000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit: BPF prog-id=80 op=LOAD Feb 9 00:49:09.726000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00009c460 items=0 ppid=1726 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:09.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864373861306533363236633566303639373632323762633832336662 Feb 9 00:49:09.726000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit: BPF prog-id=81 op=LOAD Feb 9 00:49:09.726000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00009c4a8 items=0 ppid=1726 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:09.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864373861306533363236633566303639373632323762633832336662 Feb 9 00:49:09.726000 audit: BPF prog-id=81 op=UNLOAD Feb 9 00:49:09.726000 audit: BPF prog-id=80 op=UNLOAD Feb 9 00:49:09.726000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.726000 audit: BPF prog-id=82 op=LOAD Feb 9 00:49:09.726000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00009c8b8 items=0 ppid=1726 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:09.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864373861306533363236633566303639373632323762633832336662 Feb 9 00:49:09.736903 systemd[1]: Started cri-containerd-eac2065d450d36e438cd1c912d5bf8398363e21b24324405a1dbbe2f5f71e727.scope. Feb 9 00:49:09.741242 systemd[1]: Started cri-containerd-e33e4d1d78d7ea396f0f29cb19ec14af408d9bb242ab02c9dd2de0ef46c3fb7f.scope. Feb 9 00:49:09.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.748000 audit: BPF prog-id=83 op=LOAD Feb 9 00:49:09.749000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.749000 audit[1873]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1727 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:09.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561633230363564343530643336653433386364316339313264356266 Feb 9 00:49:09.749000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.749000 audit[1873]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1727 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:09.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561633230363564343530643336653433386364316339313264356266 Feb 9 00:49:09.749000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.749000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.749000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.749000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.749000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.749000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.749000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.749000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.749000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.749000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.749000 audit: BPF prog-id=84 op=LOAD Feb 9 00:49:09.749000 audit[1873]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003c8030 items=0 ppid=1727 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:09.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561633230363564343530643336653433386364316339313264356266 Feb 9 00:49:09.750000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.750000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.750000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.750000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.750000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.750000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.750000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.750000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.750000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.750000 audit: BPF prog-id=85 op=LOAD Feb 9 00:49:09.750000 audit[1873]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003c8078 items=0 ppid=1727 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:09.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561633230363564343530643336653433386364316339313264356266 Feb 9 00:49:09.750000 audit: BPF prog-id=85 op=UNLOAD Feb 9 00:49:09.751000 audit: BPF prog-id=84 op=UNLOAD Feb 9 00:49:09.751000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.751000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.751000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.751000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.751000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.751000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.751000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.751000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.751000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.751000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.751000 audit: BPF prog-id=86 op=LOAD Feb 9 00:49:09.751000 audit[1873]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c8488 items=0 ppid=1727 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:09.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561633230363564343530643336653433386364316339313264356266 Feb 9 00:49:09.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.755000 audit: BPF prog-id=87 op=LOAD Feb 9 00:49:09.756000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.756000 audit[1883]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1762 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:09.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533336534643164373864376561333936663066323963623139656331 Feb 9 00:49:09.756000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.756000 audit[1883]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1762 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:09.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533336534643164373864376561333936663066323963623139656331 Feb 9 00:49:09.756000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.756000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.756000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.756000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.756000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.756000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.756000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.756000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.756000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.756000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.756000 audit: BPF prog-id=88 op=LOAD Feb 9 00:49:09.756000 audit[1883]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003aa170 items=0 ppid=1762 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:09.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533336534643164373864376561333936663066323963623139656331 Feb 9 00:49:09.756000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.756000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.756000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.756000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.756000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.756000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.756000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.756000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.756000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.756000 audit: BPF prog-id=89 op=LOAD Feb 9 00:49:09.756000 audit[1883]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003aa1b8 items=0 ppid=1762 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:09.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533336534643164373864376561333936663066323963623139656331 Feb 9 00:49:09.756000 audit: BPF prog-id=89 op=UNLOAD Feb 9 00:49:09.756000 audit: BPF prog-id=88 op=UNLOAD Feb 9 00:49:09.756000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.756000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.756000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.756000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.756000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.756000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.756000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.756000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.756000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.756000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:09.756000 audit: BPF prog-id=90 op=LOAD Feb 9 00:49:09.756000 audit[1883]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003aa5c8 items=0 ppid=1762 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:09.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533336534643164373864376561333936663066323963623139656331 Feb 9 00:49:09.768806 env[1127]: time="2024-02-09T00:49:09.768749758Z" level=info msg="StartContainer for \"8d78a0e3626c5f06976227bc823fb0eb5d1cbeca060d6544df6d130e2c659ca5\" returns successfully" Feb 9 00:49:09.952381 env[1127]: time="2024-02-09T00:49:09.952272812Z" level=info msg="StartContainer for \"e33e4d1d78d7ea396f0f29cb19ec14af408d9bb242ab02c9dd2de0ef46c3fb7f\" returns successfully" Feb 9 00:49:10.047816 env[1127]: time="2024-02-09T00:49:10.047750141Z" level=info msg="StartContainer for \"eac2065d450d36e438cd1c912d5bf8398363e21b24324405a1dbbe2f5f71e727\" returns successfully" Feb 9 00:49:10.148864 kubelet[1677]: I0209 00:49:10.148559 1677 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 9 00:49:10.640000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 00:49:10.640000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a48000 a2=fc6 a3=0 items=0 ppid=1762 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 key=(null) Feb 9 00:49:10.640000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 00:49:10.641000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 00:49:10.641000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00101c000 a2=fc6 a3=0 items=0 ppid=1762 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 key=(null) Feb 9 00:49:10.641000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 00:49:10.665778 kubelet[1677]: E0209 00:49:10.665755 1677 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:10.667088 kubelet[1677]: E0209 00:49:10.667063 1677 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:10.668971 kubelet[1677]: E0209 00:49:10.668936 1677 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:10.907000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c643,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 00:49:10.907000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3e a1=c007eecd80 a2=fc6 a3=0 items=0 ppid=1727 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c643,c887 key=(null) Feb 9 00:49:10.907000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 9 00:49:10.907000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c643,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 00:49:10.907000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3e a1=c007eecde0 a2=fc6 a3=0 items=0 ppid=1727 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c643,c887 key=(null) Feb 9 00:49:10.907000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 9 00:49:10.914000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=521018 scontext=system_u:system_r:svirt_lxc_net_t:s0:c643,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 00:49:10.914000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c007eecff0 a2=fc6 a3=0 items=0 ppid=1727 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c643,c887 key=(null) Feb 9 00:49:10.914000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 9 00:49:10.915000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c643,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 00:49:10.915000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=48 a1=c0053ad840 a2=fc6 a3=0 items=0 ppid=1727 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c643,c887 key=(null) Feb 9 00:49:10.915000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 9 00:49:10.915000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c643,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 00:49:10.915000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=48 a1=c007eed1d0 a2=fc6 a3=0 items=0 ppid=1727 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c643,c887 key=(null) Feb 9 00:49:10.915000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 9 00:49:10.915000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c643,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 00:49:10.915000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=48 a1=c0014f98a0 a2=fc6 a3=0 items=0 ppid=1727 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c643,c887 key=(null) Feb 9 00:49:10.915000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 9 00:49:10.963985 kubelet[1677]: E0209 00:49:10.963956 1677 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Feb 9 00:49:11.209480 kubelet[1677]: I0209 00:49:11.209350 1677 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Feb 9 00:49:11.220695 kubelet[1677]: E0209 00:49:11.220657 1677 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 9 00:49:11.321545 kubelet[1677]: E0209 00:49:11.321494 1677 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 9 00:49:11.422050 kubelet[1677]: E0209 00:49:11.421996 1677 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 9 00:49:11.522877 kubelet[1677]: E0209 00:49:11.522758 1677 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 9 00:49:11.623456 kubelet[1677]: E0209 00:49:11.623412 1677 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 9 00:49:11.670679 kubelet[1677]: E0209 00:49:11.670636 1677 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:12.638112 kubelet[1677]: I0209 00:49:12.638072 1677 apiserver.go:52] "Watching apiserver" Feb 9 00:49:12.643029 kubelet[1677]: I0209 00:49:12.642997 1677 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 9 00:49:12.668791 kubelet[1677]: I0209 00:49:12.668741 1677 reconciler.go:41] "Reconciler: start to sync state" Feb 9 00:49:12.677431 kubelet[1677]: E0209 00:49:12.677393 1677 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:13.672719 kubelet[1677]: E0209 00:49:13.672683 1677 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:14.409361 systemd[1]: Reloading. Feb 9 00:49:14.485499 /usr/lib/systemd/system-generators/torcx-generator[1980]: time="2024-02-09T00:49:14Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 00:49:14.485524 /usr/lib/systemd/system-generators/torcx-generator[1980]: time="2024-02-09T00:49:14Z" level=info msg="torcx already run" Feb 9 00:49:14.571583 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 00:49:14.571602 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 00:49:14.591673 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 00:49:14.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.655349 kernel: kauditd_printk_skb: 583 callbacks suppressed Feb 9 00:49:14.655415 kernel: audit: type=1400 audit(1707439754.653:705): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.659246 kernel: audit: type=1400 audit(1707439754.653:706): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.659288 kernel: audit: type=1400 audit(1707439754.653:707): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.663398 kernel: audit: type=1400 audit(1707439754.653:708): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.663441 kernel: audit: type=1400 audit(1707439754.653:709): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.667676 kernel: audit: type=1400 audit(1707439754.653:710): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.667726 kernel: audit: type=1400 audit(1707439754.653:711): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.669683 kernel: audit: type=1400 audit(1707439754.653:712): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.671646 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 00:49:14.671688 kernel: audit: type=1400 audit(1707439754.653:713): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.656000 audit: BPF prog-id=91 op=LOAD Feb 9 00:49:14.656000 audit: BPF prog-id=52 op=UNLOAD Feb 9 00:49:14.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.660000 audit: BPF prog-id=92 op=LOAD Feb 9 00:49:14.660000 audit: BPF prog-id=71 op=UNLOAD Feb 9 00:49:14.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.662000 audit: BPF prog-id=93 op=LOAD Feb 9 00:49:14.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.664000 audit: BPF prog-id=94 op=LOAD Feb 9 00:49:14.664000 audit: BPF prog-id=53 op=UNLOAD Feb 9 00:49:14.664000 audit: BPF prog-id=54 op=UNLOAD Feb 9 00:49:14.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.666000 audit: BPF prog-id=95 op=LOAD Feb 9 00:49:14.666000 audit: BPF prog-id=79 op=UNLOAD Feb 9 00:49:14.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.668000 audit: BPF prog-id=96 op=LOAD Feb 9 00:49:14.668000 audit: BPF prog-id=55 op=UNLOAD Feb 9 00:49:14.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.673000 audit: BPF prog-id=97 op=LOAD Feb 9 00:49:14.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.673000 audit: BPF prog-id=98 op=LOAD Feb 9 00:49:14.673000 audit: BPF prog-id=56 op=UNLOAD Feb 9 00:49:14.673000 audit: BPF prog-id=57 op=UNLOAD Feb 9 00:49:14.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.676000 audit: BPF prog-id=99 op=LOAD Feb 9 00:49:14.676000 audit: BPF prog-id=58 op=UNLOAD Feb 9 00:49:14.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.676000 audit: BPF prog-id=100 op=LOAD Feb 9 00:49:14.676000 audit: BPF prog-id=83 op=UNLOAD Feb 9 00:49:14.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.677000 audit: BPF prog-id=101 op=LOAD Feb 9 00:49:14.677000 audit: BPF prog-id=87 op=UNLOAD Feb 9 00:49:14.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.678000 audit: BPF prog-id=102 op=LOAD Feb 9 00:49:14.678000 audit: BPF prog-id=59 op=UNLOAD Feb 9 00:49:14.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.679000 audit: BPF prog-id=103 op=LOAD Feb 9 00:49:14.679000 audit: BPF prog-id=67 op=UNLOAD Feb 9 00:49:14.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.679000 audit: BPF prog-id=104 op=LOAD Feb 9 00:49:14.679000 audit: BPF prog-id=75 op=UNLOAD Feb 9 00:49:14.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.680000 audit: BPF prog-id=105 op=LOAD Feb 9 00:49:14.680000 audit: BPF prog-id=60 op=UNLOAD Feb 9 00:49:14.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.680000 audit: BPF prog-id=106 op=LOAD Feb 9 00:49:14.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.680000 audit: BPF prog-id=107 op=LOAD Feb 9 00:49:14.680000 audit: BPF prog-id=61 op=UNLOAD Feb 9 00:49:14.680000 audit: BPF prog-id=62 op=UNLOAD Feb 9 00:49:14.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.681000 audit: BPF prog-id=108 op=LOAD Feb 9 00:49:14.681000 audit: BPF prog-id=63 op=UNLOAD Feb 9 00:49:14.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.681000 audit: BPF prog-id=109 op=LOAD Feb 9 00:49:14.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.681000 audit: BPF prog-id=110 op=LOAD Feb 9 00:49:14.681000 audit: BPF prog-id=64 op=UNLOAD Feb 9 00:49:14.681000 audit: BPF prog-id=65 op=UNLOAD Feb 9 00:49:14.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.682000 audit: BPF prog-id=111 op=LOAD Feb 9 00:49:14.682000 audit: BPF prog-id=66 op=UNLOAD Feb 9 00:49:14.692958 systemd[1]: Stopping kubelet.service... Feb 9 00:49:14.693176 kubelet[1677]: I0209 00:49:14.693026 1677 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 00:49:14.714198 systemd[1]: kubelet.service: Deactivated successfully. Feb 9 00:49:14.714375 systemd[1]: Stopped kubelet.service. Feb 9 00:49:14.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:49:14.715918 systemd[1]: Started kubelet.service. Feb 9 00:49:14.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:49:14.754144 kubelet[2019]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 00:49:14.754144 kubelet[2019]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 00:49:14.754144 kubelet[2019]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 00:49:14.754512 kubelet[2019]: I0209 00:49:14.754171 2019 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 00:49:14.757753 kubelet[2019]: I0209 00:49:14.757725 2019 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 9 00:49:14.757753 kubelet[2019]: I0209 00:49:14.757746 2019 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 00:49:14.757923 kubelet[2019]: I0209 00:49:14.757897 2019 server.go:837] "Client rotation is on, will bootstrap in background" Feb 9 00:49:14.759144 kubelet[2019]: I0209 00:49:14.759123 2019 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 9 00:49:14.759989 kubelet[2019]: I0209 00:49:14.759968 2019 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 00:49:14.766099 kubelet[2019]: I0209 00:49:14.766077 2019 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 00:49:14.766329 kubelet[2019]: I0209 00:49:14.766313 2019 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 00:49:14.766456 kubelet[2019]: I0209 00:49:14.766426 2019 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 00:49:14.766557 kubelet[2019]: I0209 00:49:14.766467 2019 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 00:49:14.766557 kubelet[2019]: I0209 00:49:14.766482 2019 container_manager_linux.go:302] "Creating device plugin manager" Feb 9 00:49:14.766557 kubelet[2019]: I0209 00:49:14.766544 2019 state_mem.go:36] "Initialized new in-memory state store" Feb 9 00:49:14.769776 kubelet[2019]: I0209 00:49:14.769763 2019 kubelet.go:405] "Attempting to sync node with API server" Feb 9 00:49:14.769860 kubelet[2019]: I0209 00:49:14.769845 2019 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 00:49:14.769953 kubelet[2019]: I0209 00:49:14.769926 2019 kubelet.go:309] "Adding apiserver pod source" Feb 9 00:49:14.770030 kubelet[2019]: I0209 00:49:14.770016 2019 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 00:49:14.770548 kubelet[2019]: I0209 00:49:14.770524 2019 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 00:49:14.771004 kubelet[2019]: I0209 00:49:14.770980 2019 server.go:1168] "Started kubelet" Feb 9 00:49:14.771670 kubelet[2019]: I0209 00:49:14.771657 2019 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 00:49:14.771000 audit[2019]: AVC avc: denied { mac_admin } for pid=2019 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.771000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 00:49:14.771000 audit[2019]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cd7bf0 a1=c0004890e0 a2=c000cd7bc0 a3=25 items=0 ppid=1 pid=2019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:14.771000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 00:49:14.772712 kubelet[2019]: I0209 00:49:14.772689 2019 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 00:49:14.772826 kubelet[2019]: I0209 00:49:14.772418 2019 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 00:49:14.771000 audit[2019]: AVC avc: denied { mac_admin } for pid=2019 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.771000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 00:49:14.771000 audit[2019]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000140e40 a1=c000135d40 a2=c000358840 a3=25 items=0 ppid=1 pid=2019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:14.771000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 00:49:14.773202 kubelet[2019]: I0209 00:49:14.773187 2019 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 00:49:14.773283 kubelet[2019]: I0209 00:49:14.773270 2019 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 00:49:14.776421 kubelet[2019]: I0209 00:49:14.773241 2019 server.go:461] "Adding debug handlers to kubelet server" Feb 9 00:49:14.777850 kubelet[2019]: E0209 00:49:14.777826 2019 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 00:49:14.777850 kubelet[2019]: E0209 00:49:14.777849 2019 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 00:49:14.778820 kubelet[2019]: I0209 00:49:14.778808 2019 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 9 00:49:14.778978 kubelet[2019]: I0209 00:49:14.778966 2019 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 9 00:49:14.806803 kubelet[2019]: I0209 00:49:14.806769 2019 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 00:49:14.807857 kubelet[2019]: I0209 00:49:14.807835 2019 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 00:49:14.807857 kubelet[2019]: I0209 00:49:14.807858 2019 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 9 00:49:14.807932 kubelet[2019]: I0209 00:49:14.807882 2019 kubelet.go:2257] "Starting kubelet main sync loop" Feb 9 00:49:14.807932 kubelet[2019]: E0209 00:49:14.807916 2019 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 00:49:14.828804 kubelet[2019]: I0209 00:49:14.828786 2019 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 00:49:14.828804 kubelet[2019]: I0209 00:49:14.828801 2019 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 00:49:14.828881 kubelet[2019]: I0209 00:49:14.828815 2019 state_mem.go:36] "Initialized new in-memory state store" Feb 9 00:49:14.828979 kubelet[2019]: I0209 00:49:14.828968 2019 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 9 00:49:14.829005 kubelet[2019]: I0209 00:49:14.828984 2019 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 9 00:49:14.829005 kubelet[2019]: I0209 00:49:14.828989 2019 policy_none.go:49] "None policy: Start" Feb 9 00:49:14.830214 kubelet[2019]: I0209 00:49:14.830193 2019 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 00:49:14.830214 kubelet[2019]: I0209 00:49:14.830209 2019 state_mem.go:35] "Initializing new in-memory state store" Feb 9 00:49:14.830320 kubelet[2019]: I0209 00:49:14.830307 2019 state_mem.go:75] "Updated machine memory state" Feb 9 00:49:14.833160 kubelet[2019]: I0209 00:49:14.833140 2019 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 00:49:14.832000 audit[2019]: AVC avc: denied { mac_admin } for pid=2019 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:14.832000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 00:49:14.832000 audit[2019]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0010ddbf0 a1=c0004890f8 a2=c0010ddbc0 a3=25 items=0 ppid=1 pid=2019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:14.832000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 00:49:14.833373 kubelet[2019]: I0209 00:49:14.833195 2019 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 00:49:14.833373 kubelet[2019]: I0209 00:49:14.833345 2019 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 00:49:14.896829 kubelet[2019]: I0209 00:49:14.896806 2019 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 9 00:49:14.902372 kubelet[2019]: I0209 00:49:14.902339 2019 kubelet_node_status.go:108] "Node was previously registered" node="localhost" Feb 9 00:49:14.902465 kubelet[2019]: I0209 00:49:14.902433 2019 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Feb 9 00:49:14.908751 kubelet[2019]: I0209 00:49:14.908716 2019 topology_manager.go:212] "Topology Admit Handler" Feb 9 00:49:14.908810 kubelet[2019]: I0209 00:49:14.908797 2019 topology_manager.go:212] "Topology Admit Handler" Feb 9 00:49:14.908853 kubelet[2019]: I0209 00:49:14.908843 2019 topology_manager.go:212] "Topology Admit Handler" Feb 9 00:49:14.917060 kubelet[2019]: E0209 00:49:14.916999 2019 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Feb 9 00:49:15.080061 kubelet[2019]: I0209 00:49:15.080005 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/82d03585b4dae41d9647725cb5c0c7de-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"82d03585b4dae41d9647725cb5c0c7de\") " pod="kube-system/kube-apiserver-localhost" Feb 9 00:49:15.080061 kubelet[2019]: I0209 00:49:15.080058 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 00:49:15.080278 kubelet[2019]: I0209 00:49:15.080128 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 00:49:15.080278 kubelet[2019]: I0209 00:49:15.080147 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 00:49:15.080278 kubelet[2019]: I0209 00:49:15.080201 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 00:49:15.080278 kubelet[2019]: I0209 00:49:15.080219 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2b0e94b38682f4e439413801d3cc54db-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2b0e94b38682f4e439413801d3cc54db\") " pod="kube-system/kube-scheduler-localhost" Feb 9 00:49:15.080278 kubelet[2019]: I0209 00:49:15.080234 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/82d03585b4dae41d9647725cb5c0c7de-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"82d03585b4dae41d9647725cb5c0c7de\") " pod="kube-system/kube-apiserver-localhost" Feb 9 00:49:15.080429 kubelet[2019]: I0209 00:49:15.080279 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/82d03585b4dae41d9647725cb5c0c7de-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"82d03585b4dae41d9647725cb5c0c7de\") " pod="kube-system/kube-apiserver-localhost" Feb 9 00:49:15.080429 kubelet[2019]: I0209 00:49:15.080326 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 00:49:15.214380 kubelet[2019]: E0209 00:49:15.214279 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:15.215016 kubelet[2019]: E0209 00:49:15.214977 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:15.218247 kubelet[2019]: E0209 00:49:15.218221 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:15.772438 kubelet[2019]: I0209 00:49:15.772382 2019 apiserver.go:52] "Watching apiserver" Feb 9 00:49:15.780114 kubelet[2019]: I0209 00:49:15.780075 2019 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 9 00:49:15.784270 kubelet[2019]: I0209 00:49:15.784240 2019 reconciler.go:41] "Reconciler: start to sync state" Feb 9 00:49:15.816589 kubelet[2019]: E0209 00:49:15.816558 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:15.817599 kubelet[2019]: E0209 00:49:15.817572 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:15.817871 kubelet[2019]: E0209 00:49:15.817853 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:15.883862 kubelet[2019]: I0209 00:49:15.883823 2019 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.883770659 podCreationTimestamp="2024-02-09 00:49:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 00:49:15.883456349 +0000 UTC m=+1.165093418" watchObservedRunningTime="2024-02-09 00:49:15.883770659 +0000 UTC m=+1.165407728" Feb 9 00:49:15.935526 kubelet[2019]: I0209 00:49:15.935485 2019 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=3.935436766 podCreationTimestamp="2024-02-09 00:49:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 00:49:15.935215293 +0000 UTC m=+1.216852362" watchObservedRunningTime="2024-02-09 00:49:15.935436766 +0000 UTC m=+1.217073835" Feb 9 00:49:15.945918 kubelet[2019]: I0209 00:49:15.945886 2019 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.945847186 podCreationTimestamp="2024-02-09 00:49:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 00:49:15.945566971 +0000 UTC m=+1.227204040" watchObservedRunningTime="2024-02-09 00:49:15.945847186 +0000 UTC m=+1.227484265" Feb 9 00:49:16.817433 kubelet[2019]: E0209 00:49:16.817401 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:17.818690 kubelet[2019]: E0209 00:49:17.818643 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:18.296537 kubelet[2019]: E0209 00:49:18.296503 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:19.653850 sudo[1258]: pam_unix(sudo:session): session closed for user root Feb 9 00:49:19.652000 audit[1258]: USER_END pid=1258 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 00:49:19.653000 audit[1258]: CRED_DISP pid=1258 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 00:49:19.655656 sshd[1255]: pam_unix(sshd:session): session closed for user core Feb 9 00:49:19.655000 audit[1255]: USER_END pid=1255 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:19.657233 kernel: kauditd_printk_skb: 258 callbacks suppressed Feb 9 00:49:19.657300 kernel: audit: type=1106 audit(1707439759.655:952): pid=1255 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:19.658059 systemd[1]: sshd@6-10.0.0.84:22-10.0.0.1:57206.service: Deactivated successfully. Feb 9 00:49:19.658782 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 00:49:19.658963 systemd[1]: session-7.scope: Consumed 3.151s CPU time. Feb 9 00:49:19.659686 systemd-logind[1111]: Session 7 logged out. Waiting for processes to exit. Feb 9 00:49:19.655000 audit[1255]: CRED_DISP pid=1255 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:19.660482 systemd-logind[1111]: Removed session 7. Feb 9 00:49:19.662571 kernel: audit: type=1104 audit(1707439759.655:953): pid=1255 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:19.662617 kernel: audit: type=1131 audit(1707439759.657:954): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.84:22-10.0.0.1:57206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:49:19.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.84:22-10.0.0.1:57206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:49:20.736864 update_engine[1112]: I0209 00:49:20.736811 1112 update_attempter.cc:509] Updating boot flags... Feb 9 00:49:24.422037 kubelet[2019]: E0209 00:49:24.421997 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:24.829445 kubelet[2019]: E0209 00:49:24.829404 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:26.828000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 00:49:26.829000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 00:49:26.834496 kernel: audit: type=1400 audit(1707439766.828:955): avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 00:49:26.834546 kernel: audit: type=1400 audit(1707439766.829:956): avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 00:49:26.834565 kernel: audit: type=1300 audit(1707439766.829:956): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f39780 a2=fc6 a3=0 items=0 ppid=1762 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 key=(null) Feb 9 00:49:26.829000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f39780 a2=fc6 a3=0 items=0 ppid=1762 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 key=(null) Feb 9 00:49:26.837720 kernel: audit: type=1327 audit(1707439766.829:956): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 00:49:26.829000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 00:49:26.840377 kernel: audit: type=1400 audit(1707439766.829:957): avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 00:49:26.829000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 00:49:26.842778 kernel: audit: type=1300 audit(1707439766.829:957): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f398c0 a2=fc6 a3=0 items=0 ppid=1762 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 key=(null) Feb 9 00:49:26.829000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f398c0 a2=fc6 a3=0 items=0 ppid=1762 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 key=(null) Feb 9 00:49:26.846039 kernel: audit: type=1327 audit(1707439766.829:957): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 00:49:26.829000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 00:49:26.848750 kernel: audit: type=1400 audit(1707439766.830:958): avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 00:49:26.830000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 00:49:26.830000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f39a00 a2=fc6 a3=0 items=0 ppid=1762 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 key=(null) Feb 9 00:49:26.854324 kernel: audit: type=1300 audit(1707439766.830:958): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f39a00 a2=fc6 a3=0 items=0 ppid=1762 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 key=(null) Feb 9 00:49:26.854363 kernel: audit: type=1327 audit(1707439766.830:958): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 00:49:26.830000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 00:49:26.828000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0011216c0 a2=fc6 a3=0 items=0 ppid=1762 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 key=(null) Feb 9 00:49:26.828000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 00:49:27.678000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521043 scontext=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 00:49:27.678000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0010f0600 a2=fc6 a3=0 items=0 ppid=1762 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 key=(null) Feb 9 00:49:27.678000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 00:49:27.776771 kubelet[2019]: E0209 00:49:27.776745 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:27.834450 kubelet[2019]: E0209 00:49:27.834412 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:28.301634 kubelet[2019]: E0209 00:49:28.301604 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:28.461296 kubelet[2019]: I0209 00:49:28.461273 2019 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 9 00:49:28.461697 env[1127]: time="2024-02-09T00:49:28.461661683Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 00:49:28.461997 kubelet[2019]: I0209 00:49:28.461841 2019 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 9 00:49:29.778880 kubelet[2019]: I0209 00:49:29.778838 2019 topology_manager.go:212] "Topology Admit Handler" Feb 9 00:49:29.785522 systemd[1]: Created slice kubepods-besteffort-pod681ff86e_e2b9_4b71_a4b5_9578d71377ab.slice. Feb 9 00:49:29.880460 kubelet[2019]: I0209 00:49:29.880394 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/681ff86e-e2b9-4b71-a4b5-9578d71377ab-kube-proxy\") pod \"kube-proxy-6fttg\" (UID: \"681ff86e-e2b9-4b71-a4b5-9578d71377ab\") " pod="kube-system/kube-proxy-6fttg" Feb 9 00:49:29.880460 kubelet[2019]: I0209 00:49:29.880448 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/681ff86e-e2b9-4b71-a4b5-9578d71377ab-xtables-lock\") pod \"kube-proxy-6fttg\" (UID: \"681ff86e-e2b9-4b71-a4b5-9578d71377ab\") " pod="kube-system/kube-proxy-6fttg" Feb 9 00:49:29.880460 kubelet[2019]: I0209 00:49:29.880472 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/681ff86e-e2b9-4b71-a4b5-9578d71377ab-lib-modules\") pod \"kube-proxy-6fttg\" (UID: \"681ff86e-e2b9-4b71-a4b5-9578d71377ab\") " pod="kube-system/kube-proxy-6fttg" Feb 9 00:49:29.880695 kubelet[2019]: I0209 00:49:29.880520 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f28f5\" (UniqueName: \"kubernetes.io/projected/681ff86e-e2b9-4b71-a4b5-9578d71377ab-kube-api-access-f28f5\") pod \"kube-proxy-6fttg\" (UID: \"681ff86e-e2b9-4b71-a4b5-9578d71377ab\") " pod="kube-system/kube-proxy-6fttg" Feb 9 00:49:29.891601 kubelet[2019]: I0209 00:49:29.891579 2019 topology_manager.go:212] "Topology Admit Handler" Feb 9 00:49:29.895757 systemd[1]: Created slice kubepods-besteffort-poda0925242_c967_4e3d_b491_65c45542197a.slice. Feb 9 00:49:29.981544 kubelet[2019]: I0209 00:49:29.981516 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qj29r\" (UniqueName: \"kubernetes.io/projected/a0925242-c967-4e3d-b491-65c45542197a-kube-api-access-qj29r\") pod \"tigera-operator-7ff8dc855-6lx9w\" (UID: \"a0925242-c967-4e3d-b491-65c45542197a\") " pod="tigera-operator/tigera-operator-7ff8dc855-6lx9w" Feb 9 00:49:29.981768 kubelet[2019]: I0209 00:49:29.981750 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/a0925242-c967-4e3d-b491-65c45542197a-var-lib-calico\") pod \"tigera-operator-7ff8dc855-6lx9w\" (UID: \"a0925242-c967-4e3d-b491-65c45542197a\") " pod="tigera-operator/tigera-operator-7ff8dc855-6lx9w" Feb 9 00:49:30.097569 kubelet[2019]: E0209 00:49:30.097540 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:30.101272 env[1127]: time="2024-02-09T00:49:30.099198716Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-6fttg,Uid:681ff86e-e2b9-4b71-a4b5-9578d71377ab,Namespace:kube-system,Attempt:0,}" Feb 9 00:49:30.112817 env[1127]: time="2024-02-09T00:49:30.112758830Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 00:49:30.112817 env[1127]: time="2024-02-09T00:49:30.112789137Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 00:49:30.112817 env[1127]: time="2024-02-09T00:49:30.112798304Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 00:49:30.113002 env[1127]: time="2024-02-09T00:49:30.112912530Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/383d2f7c80ee638cead5b04f00b117a84b6a3a4ecc059235bff2e307651c5ee3 pid=2127 runtime=io.containerd.runc.v2 Feb 9 00:49:30.122278 systemd[1]: Started cri-containerd-383d2f7c80ee638cead5b04f00b117a84b6a3a4ecc059235bff2e307651c5ee3.scope. Feb 9 00:49:30.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit: BPF prog-id=112 op=LOAD Feb 9 00:49:30.129000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[2137]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2127 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338336432663763383065653633386365616435623034663030623131 Feb 9 00:49:30.129000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[2137]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2127 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338336432663763383065653633386365616435623034663030623131 Feb 9 00:49:30.129000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit: BPF prog-id=113 op=LOAD Feb 9 00:49:30.129000 audit[2137]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000220f00 items=0 ppid=2127 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338336432663763383065653633386365616435623034663030623131 Feb 9 00:49:30.129000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit: BPF prog-id=114 op=LOAD Feb 9 00:49:30.129000 audit[2137]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000220f48 items=0 ppid=2127 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338336432663763383065653633386365616435623034663030623131 Feb 9 00:49:30.129000 audit: BPF prog-id=114 op=UNLOAD Feb 9 00:49:30.129000 audit: BPF prog-id=113 op=UNLOAD Feb 9 00:49:30.129000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.129000 audit: BPF prog-id=115 op=LOAD Feb 9 00:49:30.129000 audit[2137]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000221358 items=0 ppid=2127 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338336432663763383065653633386365616435623034663030623131 Feb 9 00:49:30.139993 env[1127]: time="2024-02-09T00:49:30.139955392Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-6fttg,Uid:681ff86e-e2b9-4b71-a4b5-9578d71377ab,Namespace:kube-system,Attempt:0,} returns sandbox id \"383d2f7c80ee638cead5b04f00b117a84b6a3a4ecc059235bff2e307651c5ee3\"" Feb 9 00:49:30.140508 kubelet[2019]: E0209 00:49:30.140482 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:30.141840 env[1127]: time="2024-02-09T00:49:30.141812047Z" level=info msg="CreateContainer within sandbox \"383d2f7c80ee638cead5b04f00b117a84b6a3a4ecc059235bff2e307651c5ee3\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 00:49:30.155781 env[1127]: time="2024-02-09T00:49:30.155743372Z" level=info msg="CreateContainer within sandbox \"383d2f7c80ee638cead5b04f00b117a84b6a3a4ecc059235bff2e307651c5ee3\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"180180e0b39d88dd7a5813f0ac499c046b52ab916b5132347a6087d0c6de675b\"" Feb 9 00:49:30.156378 env[1127]: time="2024-02-09T00:49:30.156347513Z" level=info msg="StartContainer for \"180180e0b39d88dd7a5813f0ac499c046b52ab916b5132347a6087d0c6de675b\"" Feb 9 00:49:30.173724 systemd[1]: Started cri-containerd-180180e0b39d88dd7a5813f0ac499c046b52ab916b5132347a6087d0c6de675b.scope. Feb 9 00:49:30.184000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.184000 audit[2167]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2127 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138303138306530623339643838646437613538313366306163343939 Feb 9 00:49:30.184000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.184000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.184000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.184000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.184000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.184000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.184000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.184000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.184000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.184000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.184000 audit: BPF prog-id=116 op=LOAD Feb 9 00:49:30.184000 audit[2167]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000259be0 items=0 ppid=2127 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138303138306530623339643838646437613538313366306163343939 Feb 9 00:49:30.185000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.185000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.185000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.185000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.185000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.185000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.185000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.185000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.185000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.185000 audit: BPF prog-id=117 op=LOAD Feb 9 00:49:30.185000 audit[2167]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000259c28 items=0 ppid=2127 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138303138306530623339643838646437613538313366306163343939 Feb 9 00:49:30.185000 audit: BPF prog-id=117 op=UNLOAD Feb 9 00:49:30.185000 audit: BPF prog-id=116 op=UNLOAD Feb 9 00:49:30.185000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.185000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.185000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.185000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.185000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.185000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.185000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.185000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.185000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.185000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.185000 audit: BPF prog-id=118 op=LOAD Feb 9 00:49:30.185000 audit[2167]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000259cb8 items=0 ppid=2127 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138303138306530623339643838646437613538313366306163343939 Feb 9 00:49:30.198637 env[1127]: time="2024-02-09T00:49:30.198593842Z" level=info msg="StartContainer for \"180180e0b39d88dd7a5813f0ac499c046b52ab916b5132347a6087d0c6de675b\" returns successfully" Feb 9 00:49:30.203625 env[1127]: time="2024-02-09T00:49:30.203587260Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-6lx9w,Uid:a0925242-c967-4e3d-b491-65c45542197a,Namespace:tigera-operator,Attempt:0,}" Feb 9 00:49:30.219579 env[1127]: time="2024-02-09T00:49:30.219497622Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 00:49:30.219579 env[1127]: time="2024-02-09T00:49:30.219545522Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 00:49:30.219579 env[1127]: time="2024-02-09T00:49:30.219556213Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 00:49:30.219766 env[1127]: time="2024-02-09T00:49:30.219666951Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0b7118193bc791da12ae5e2ab3d0393efb572ec520e67102ad06609ec956115f pid=2202 runtime=io.containerd.runc.v2 Feb 9 00:49:30.230564 systemd[1]: Started cri-containerd-0b7118193bc791da12ae5e2ab3d0393efb572ec520e67102ad06609ec956115f.scope. Feb 9 00:49:30.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.242000 audit: BPF prog-id=119 op=LOAD Feb 9 00:49:30.243000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.243000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2202 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062373131383139336263373931646131326165356532616233643033 Feb 9 00:49:30.243000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.243000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=2202 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062373131383139336263373931646131326165356532616233643033 Feb 9 00:49:30.243000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.243000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.243000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.243000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.243000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.243000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.243000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.243000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.243000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.243000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.243000 audit: BPF prog-id=120 op=LOAD Feb 9 00:49:30.243000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000024800 items=0 ppid=2202 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062373131383139336263373931646131326165356532616233643033 Feb 9 00:49:30.243000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.243000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.243000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.243000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.243000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.243000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.243000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.243000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.243000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.243000 audit: BPF prog-id=121 op=LOAD Feb 9 00:49:30.243000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000024848 items=0 ppid=2202 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062373131383139336263373931646131326165356532616233643033 Feb 9 00:49:30.243000 audit: BPF prog-id=121 op=UNLOAD Feb 9 00:49:30.243000 audit: BPF prog-id=120 op=UNLOAD Feb 9 00:49:30.243000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.243000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.243000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.243000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.243000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.243000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.243000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.243000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.243000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.243000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:30.243000 audit: BPF prog-id=122 op=LOAD Feb 9 00:49:30.243000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000024c58 items=0 ppid=2202 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062373131383139336263373931646131326165356532616233643033 Feb 9 00:49:30.245000 audit[2250]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:49:30.245000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffedcb79810 a2=0 a3=7ffedcb797fc items=0 ppid=2178 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.245000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 00:49:30.246000 audit[2251]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:49:30.246000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd26782550 a2=0 a3=7ffd2678253c items=0 ppid=2178 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.246000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 00:49:30.246000 audit[2252]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:49:30.246000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec9608a00 a2=0 a3=7ffec96089ec items=0 ppid=2178 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.246000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 00:49:30.247000 audit[2253]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:49:30.247000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc7314a880 a2=0 a3=7ffc7314a86c items=0 ppid=2178 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.247000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 00:49:30.248000 audit[2254]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:49:30.248000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc01e16850 a2=0 a3=7ffc01e1683c items=0 ppid=2178 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.248000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 00:49:30.248000 audit[2255]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:49:30.248000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc5b967a0 a2=0 a3=7ffcc5b9678c items=0 ppid=2178 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.248000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 00:49:30.270292 env[1127]: time="2024-02-09T00:49:30.270253768Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-6lx9w,Uid:a0925242-c967-4e3d-b491-65c45542197a,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"0b7118193bc791da12ae5e2ab3d0393efb572ec520e67102ad06609ec956115f\"" Feb 9 00:49:30.271509 env[1127]: time="2024-02-09T00:49:30.271485804Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 9 00:49:30.351000 audit[2263]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2263 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:49:30.351000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc6bd9b2b0 a2=0 a3=7ffc6bd9b29c items=0 ppid=2178 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.351000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 00:49:30.354000 audit[2265]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2265 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:49:30.354000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe933c4100 a2=0 a3=7ffe933c40ec items=0 ppid=2178 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.354000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 00:49:30.357000 audit[2268]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2268 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:49:30.357000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd42129170 a2=0 a3=7ffd4212915c items=0 ppid=2178 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.357000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 00:49:30.359000 audit[2269]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2269 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:49:30.359000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5e807250 a2=0 a3=7ffc5e80723c items=0 ppid=2178 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.359000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 00:49:30.361000 audit[2271]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2271 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:49:30.361000 audit[2271]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe61bd0150 a2=0 a3=7ffe61bd013c items=0 ppid=2178 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.361000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 00:49:30.362000 audit[2272]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2272 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:49:30.362000 audit[2272]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd7ef20340 a2=0 a3=7ffd7ef2032c items=0 ppid=2178 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.362000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 00:49:30.364000 audit[2274]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2274 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:49:30.364000 audit[2274]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff0a1cf410 a2=0 a3=7fff0a1cf3fc items=0 ppid=2178 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.364000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 00:49:30.367000 audit[2277]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2277 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:49:30.367000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc5b2b92e0 a2=0 a3=7ffc5b2b92cc items=0 ppid=2178 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.367000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 00:49:30.368000 audit[2278]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2278 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:49:30.368000 audit[2278]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff56a8ed10 a2=0 a3=7fff56a8ecfc items=0 ppid=2178 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.368000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 00:49:30.370000 audit[2280]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2280 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:49:30.370000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeb9708430 a2=0 a3=7ffeb970841c items=0 ppid=2178 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.370000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 00:49:30.371000 audit[2281]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2281 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:49:30.371000 audit[2281]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcde7fd5b0 a2=0 a3=7ffcde7fd59c items=0 ppid=2178 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.371000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 00:49:30.373000 audit[2283]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2283 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:49:30.373000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf4b0e280 a2=0 a3=7ffdf4b0e26c items=0 ppid=2178 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.373000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 00:49:30.376000 audit[2286]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2286 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:49:30.376000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc418c05b0 a2=0 a3=7ffc418c059c items=0 ppid=2178 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.376000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 00:49:30.379000 audit[2289]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2289 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:49:30.379000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc5b9bb140 a2=0 a3=7ffc5b9bb12c items=0 ppid=2178 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.379000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 00:49:30.380000 audit[2290]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2290 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:49:30.380000 audit[2290]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd51a05af0 a2=0 a3=7ffd51a05adc items=0 ppid=2178 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.380000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 00:49:30.382000 audit[2292]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2292 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:49:30.382000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffd441971d0 a2=0 a3=7ffd441971bc items=0 ppid=2178 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.382000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 00:49:30.385000 audit[2295]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2295 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:49:30.385000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff4178c8a0 a2=0 a3=7fff4178c88c items=0 ppid=2178 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.385000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 00:49:30.389000 audit[2300]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:49:30.389000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffbf47ceb0 a2=0 a3=7fffbf47ce9c items=0 ppid=2178 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.389000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 00:49:30.391000 audit[2302]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2302 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:49:30.391000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffce75b17b0 a2=0 a3=7ffce75b179c items=0 ppid=2178 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.391000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 00:49:30.401000 audit[2304]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:49:30.401000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffcc382dba0 a2=0 a3=7ffcc382db8c items=0 ppid=2178 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.401000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:49:30.411000 audit[2304]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:49:30.411000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffcc382dba0 a2=0 a3=7ffcc382db8c items=0 ppid=2178 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.411000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:49:30.412000 audit[2310]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:49:30.412000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe15437300 a2=0 a3=7ffe154372ec items=0 ppid=2178 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.412000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 00:49:30.414000 audit[2312]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:49:30.414000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdc91cf670 a2=0 a3=7ffdc91cf65c items=0 ppid=2178 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.414000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 00:49:30.417000 audit[2315]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:49:30.417000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd9c13ba40 a2=0 a3=7ffd9c13ba2c items=0 ppid=2178 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.417000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 00:49:30.418000 audit[2316]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:49:30.418000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff02894290 a2=0 a3=7fff0289427c items=0 ppid=2178 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.418000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 00:49:30.420000 audit[2318]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2318 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:49:30.420000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd2820c1f0 a2=0 a3=7ffd2820c1dc items=0 ppid=2178 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.420000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 00:49:30.421000 audit[2319]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2319 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:49:30.421000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff59af18c0 a2=0 a3=7fff59af18ac items=0 ppid=2178 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.421000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 00:49:30.422000 audit[2321]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2321 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:49:30.422000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff3bd509f0 a2=0 a3=7fff3bd509dc items=0 ppid=2178 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.422000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 00:49:30.425000 audit[2324]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:49:30.425000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff7a4ebd60 a2=0 a3=7fff7a4ebd4c items=0 ppid=2178 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.425000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 00:49:30.426000 audit[2325]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2325 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:49:30.426000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca0478b10 a2=0 a3=7ffca0478afc items=0 ppid=2178 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.426000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 00:49:30.428000 audit[2327]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:49:30.428000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffa1e54660 a2=0 a3=7fffa1e5464c items=0 ppid=2178 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.428000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 00:49:30.428000 audit[2328]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2328 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:49:30.428000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff0503f8a0 a2=0 a3=7fff0503f88c items=0 ppid=2178 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.428000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 00:49:30.430000 audit[2330]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:49:30.430000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe6536ce30 a2=0 a3=7ffe6536ce1c items=0 ppid=2178 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.430000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 00:49:30.433000 audit[2333]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2333 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:49:30.433000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe60793fb0 a2=0 a3=7ffe60793f9c items=0 ppid=2178 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.433000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 00:49:30.436000 audit[2336]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2336 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:49:30.436000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd916382a0 a2=0 a3=7ffd9163828c items=0 ppid=2178 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.436000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 00:49:30.436000 audit[2337]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2337 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:49:30.436000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffee8336670 a2=0 a3=7ffee833665c items=0 ppid=2178 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.436000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 00:49:30.438000 audit[2339]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:49:30.438000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffecc071430 a2=0 a3=7ffecc07141c items=0 ppid=2178 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.438000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 00:49:30.440000 audit[2342]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2342 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:49:30.440000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff4ebe6650 a2=0 a3=7fff4ebe663c items=0 ppid=2178 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.440000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 00:49:30.441000 audit[2343]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:49:30.441000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb338db20 a2=0 a3=7ffeb338db0c items=0 ppid=2178 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.441000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 00:49:30.443000 audit[2345]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=2345 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:49:30.443000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffebbf176c0 a2=0 a3=7ffebbf176ac items=0 ppid=2178 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.443000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 00:49:30.445000 audit[2348]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_rule pid=2348 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:49:30.445000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffddab246d0 a2=0 a3=7ffddab246bc items=0 ppid=2178 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.445000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 00:49:30.446000 audit[2349]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2349 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:49:30.446000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd533e790 a2=0 a3=7ffdd533e77c items=0 ppid=2178 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.446000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 00:49:30.448000 audit[2351]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2351 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:49:30.448000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd0aa2fc90 a2=0 a3=7ffd0aa2fc7c items=0 ppid=2178 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.448000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 00:49:30.450000 audit[2353]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2353 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 00:49:30.450000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffd19d58fc0 a2=0 a3=7ffd19d58fac items=0 ppid=2178 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.450000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:49:30.450000 audit[2353]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 00:49:30.450000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffd19d58fc0 a2=0 a3=7ffd19d58fac items=0 ppid=2178 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:30.450000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:49:30.840365 kubelet[2019]: E0209 00:49:30.840347 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:33.200237 env[1127]: time="2024-02-09T00:49:33.200192502Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:33.204342 env[1127]: time="2024-02-09T00:49:33.204287093Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:33.206095 env[1127]: time="2024-02-09T00:49:33.206074023Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:33.207720 env[1127]: time="2024-02-09T00:49:33.207685802Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:33.208245 env[1127]: time="2024-02-09T00:49:33.208214780Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 9 00:49:33.210058 env[1127]: time="2024-02-09T00:49:33.209986170Z" level=info msg="CreateContainer within sandbox \"0b7118193bc791da12ae5e2ab3d0393efb572ec520e67102ad06609ec956115f\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 9 00:49:33.222954 env[1127]: time="2024-02-09T00:49:33.222903762Z" level=info msg="CreateContainer within sandbox \"0b7118193bc791da12ae5e2ab3d0393efb572ec520e67102ad06609ec956115f\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"6f08146ad284afe2d09414828a96bb0f0b73a613b1ad15cefc36737278dcb2d0\"" Feb 9 00:49:33.223399 env[1127]: time="2024-02-09T00:49:33.223371904Z" level=info msg="StartContainer for \"6f08146ad284afe2d09414828a96bb0f0b73a613b1ad15cefc36737278dcb2d0\"" Feb 9 00:49:33.237657 systemd[1]: Started cri-containerd-6f08146ad284afe2d09414828a96bb0f0b73a613b1ad15cefc36737278dcb2d0.scope. Feb 9 00:49:33.251540 kernel: kauditd_printk_skb: 315 callbacks suppressed Feb 9 00:49:33.251635 kernel: audit: type=1400 audit(1707439773.247:1053): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.251657 kernel: audit: type=1400 audit(1707439773.247:1054): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.256315 kernel: audit: type=1400 audit(1707439773.247:1055): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.256369 kernel: audit: type=1400 audit(1707439773.247:1056): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.258801 kernel: audit: type=1400 audit(1707439773.247:1057): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.263268 kernel: audit: type=1400 audit(1707439773.247:1058): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.263308 kernel: audit: type=1400 audit(1707439773.247:1059): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.267506 kernel: audit: type=1400 audit(1707439773.247:1060): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.267546 kernel: audit: type=1400 audit(1707439773.247:1061): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.272651 kernel: audit: type=1400 audit(1707439773.250:1062): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.250000 audit: BPF prog-id=123 op=LOAD Feb 9 00:49:33.250000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.250000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2202 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:33.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666303831343661643238346166653264303934313438323861393662 Feb 9 00:49:33.250000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.250000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2202 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:33.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666303831343661643238346166653264303934313438323861393662 Feb 9 00:49:33.250000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.250000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.250000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.250000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.250000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.250000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.250000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.250000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.250000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.250000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.250000 audit: BPF prog-id=124 op=LOAD Feb 9 00:49:33.250000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000333090 items=0 ppid=2202 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:33.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666303831343661643238346166653264303934313438323861393662 Feb 9 00:49:33.253000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.253000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.253000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.253000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.253000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.253000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.253000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.253000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.253000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.253000 audit: BPF prog-id=125 op=LOAD Feb 9 00:49:33.253000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003330d8 items=0 ppid=2202 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:33.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666303831343661643238346166653264303934313438323861393662 Feb 9 00:49:33.255000 audit: BPF prog-id=125 op=UNLOAD Feb 9 00:49:33.255000 audit: BPF prog-id=124 op=UNLOAD Feb 9 00:49:33.255000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.255000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.255000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.255000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.255000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.255000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.255000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.255000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.255000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.255000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:33.255000 audit: BPF prog-id=126 op=LOAD Feb 9 00:49:33.255000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003334e8 items=0 ppid=2202 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:33.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666303831343661643238346166653264303934313438323861393662 Feb 9 00:49:33.282058 env[1127]: time="2024-02-09T00:49:33.282010168Z" level=info msg="StartContainer for \"6f08146ad284afe2d09414828a96bb0f0b73a613b1ad15cefc36737278dcb2d0\" returns successfully" Feb 9 00:49:33.853412 kubelet[2019]: I0209 00:49:33.853377 2019 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-6fttg" podStartSLOduration=4.853328723 podCreationTimestamp="2024-02-09 00:49:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 00:49:30.8468268 +0000 UTC m=+16.128463869" watchObservedRunningTime="2024-02-09 00:49:33.853328723 +0000 UTC m=+19.134965792" Feb 9 00:49:33.853767 kubelet[2019]: I0209 00:49:33.853472 2019 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7ff8dc855-6lx9w" podStartSLOduration=1.916076741 podCreationTimestamp="2024-02-09 00:49:29 +0000 UTC" firstStartedPulling="2024-02-09 00:49:30.271164839 +0000 UTC m=+15.552801908" lastFinishedPulling="2024-02-09 00:49:33.208537879 +0000 UTC m=+18.490174948" observedRunningTime="2024-02-09 00:49:33.853213026 +0000 UTC m=+19.134850125" watchObservedRunningTime="2024-02-09 00:49:33.853449781 +0000 UTC m=+19.135086850" Feb 9 00:49:34.935000 audit[2395]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2395 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:49:34.935000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffc9c230a70 a2=0 a3=7ffc9c230a5c items=0 ppid=2178 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:34.935000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:49:34.935000 audit[2395]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2395 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:49:34.935000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffc9c230a70 a2=0 a3=31030 items=0 ppid=2178 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:34.935000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:49:34.943000 audit[2397]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2397 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:49:34.943000 audit[2397]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffe978a3f40 a2=0 a3=7ffe978a3f2c items=0 ppid=2178 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:34.943000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:49:34.945000 audit[2397]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2397 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:49:34.945000 audit[2397]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffe978a3f40 a2=0 a3=31030 items=0 ppid=2178 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:34.945000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:49:35.056628 kubelet[2019]: I0209 00:49:35.056579 2019 topology_manager.go:212] "Topology Admit Handler" Feb 9 00:49:35.064588 systemd[1]: Created slice kubepods-besteffort-podf5b9211c_fea9_4dcf_b9dc_90a4853a210b.slice. Feb 9 00:49:35.086714 kubelet[2019]: I0209 00:49:35.086687 2019 topology_manager.go:212] "Topology Admit Handler" Feb 9 00:49:35.091264 systemd[1]: Created slice kubepods-besteffort-pod79b3cd94_0b09_45d0_9cc8_469911ef4253.slice. Feb 9 00:49:35.114861 kubelet[2019]: I0209 00:49:35.114822 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f5b9211c-fea9-4dcf-b9dc-90a4853a210b-tigera-ca-bundle\") pod \"calico-typha-7876cb7976-77cxq\" (UID: \"f5b9211c-fea9-4dcf-b9dc-90a4853a210b\") " pod="calico-system/calico-typha-7876cb7976-77cxq" Feb 9 00:49:35.114861 kubelet[2019]: I0209 00:49:35.114860 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/f5b9211c-fea9-4dcf-b9dc-90a4853a210b-typha-certs\") pod \"calico-typha-7876cb7976-77cxq\" (UID: \"f5b9211c-fea9-4dcf-b9dc-90a4853a210b\") " pod="calico-system/calico-typha-7876cb7976-77cxq" Feb 9 00:49:35.115030 kubelet[2019]: I0209 00:49:35.114878 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/79b3cd94-0b09-45d0-9cc8-469911ef4253-var-run-calico\") pod \"calico-node-h8sch\" (UID: \"79b3cd94-0b09-45d0-9cc8-469911ef4253\") " pod="calico-system/calico-node-h8sch" Feb 9 00:49:35.115030 kubelet[2019]: I0209 00:49:35.114923 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/79b3cd94-0b09-45d0-9cc8-469911ef4253-lib-modules\") pod \"calico-node-h8sch\" (UID: \"79b3cd94-0b09-45d0-9cc8-469911ef4253\") " pod="calico-system/calico-node-h8sch" Feb 9 00:49:35.115030 kubelet[2019]: I0209 00:49:35.114989 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/79b3cd94-0b09-45d0-9cc8-469911ef4253-var-lib-calico\") pod \"calico-node-h8sch\" (UID: \"79b3cd94-0b09-45d0-9cc8-469911ef4253\") " pod="calico-system/calico-node-h8sch" Feb 9 00:49:35.115030 kubelet[2019]: I0209 00:49:35.115025 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/79b3cd94-0b09-45d0-9cc8-469911ef4253-cni-bin-dir\") pod \"calico-node-h8sch\" (UID: \"79b3cd94-0b09-45d0-9cc8-469911ef4253\") " pod="calico-system/calico-node-h8sch" Feb 9 00:49:35.115123 kubelet[2019]: I0209 00:49:35.115044 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hcshr\" (UniqueName: \"kubernetes.io/projected/f5b9211c-fea9-4dcf-b9dc-90a4853a210b-kube-api-access-hcshr\") pod \"calico-typha-7876cb7976-77cxq\" (UID: \"f5b9211c-fea9-4dcf-b9dc-90a4853a210b\") " pod="calico-system/calico-typha-7876cb7976-77cxq" Feb 9 00:49:35.115123 kubelet[2019]: I0209 00:49:35.115063 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/79b3cd94-0b09-45d0-9cc8-469911ef4253-cni-net-dir\") pod \"calico-node-h8sch\" (UID: \"79b3cd94-0b09-45d0-9cc8-469911ef4253\") " pod="calico-system/calico-node-h8sch" Feb 9 00:49:35.115123 kubelet[2019]: I0209 00:49:35.115095 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/79b3cd94-0b09-45d0-9cc8-469911ef4253-cni-log-dir\") pod \"calico-node-h8sch\" (UID: \"79b3cd94-0b09-45d0-9cc8-469911ef4253\") " pod="calico-system/calico-node-h8sch" Feb 9 00:49:35.115123 kubelet[2019]: I0209 00:49:35.115120 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/79b3cd94-0b09-45d0-9cc8-469911ef4253-xtables-lock\") pod \"calico-node-h8sch\" (UID: \"79b3cd94-0b09-45d0-9cc8-469911ef4253\") " pod="calico-system/calico-node-h8sch" Feb 9 00:49:35.115215 kubelet[2019]: I0209 00:49:35.115154 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/79b3cd94-0b09-45d0-9cc8-469911ef4253-policysync\") pod \"calico-node-h8sch\" (UID: \"79b3cd94-0b09-45d0-9cc8-469911ef4253\") " pod="calico-system/calico-node-h8sch" Feb 9 00:49:35.115215 kubelet[2019]: I0209 00:49:35.115177 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/79b3cd94-0b09-45d0-9cc8-469911ef4253-tigera-ca-bundle\") pod \"calico-node-h8sch\" (UID: \"79b3cd94-0b09-45d0-9cc8-469911ef4253\") " pod="calico-system/calico-node-h8sch" Feb 9 00:49:35.115258 kubelet[2019]: I0209 00:49:35.115216 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/79b3cd94-0b09-45d0-9cc8-469911ef4253-flexvol-driver-host\") pod \"calico-node-h8sch\" (UID: \"79b3cd94-0b09-45d0-9cc8-469911ef4253\") " pod="calico-system/calico-node-h8sch" Feb 9 00:49:35.115258 kubelet[2019]: I0209 00:49:35.115256 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9mz6j\" (UniqueName: \"kubernetes.io/projected/79b3cd94-0b09-45d0-9cc8-469911ef4253-kube-api-access-9mz6j\") pod \"calico-node-h8sch\" (UID: \"79b3cd94-0b09-45d0-9cc8-469911ef4253\") " pod="calico-system/calico-node-h8sch" Feb 9 00:49:35.115308 kubelet[2019]: I0209 00:49:35.115287 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/79b3cd94-0b09-45d0-9cc8-469911ef4253-node-certs\") pod \"calico-node-h8sch\" (UID: \"79b3cd94-0b09-45d0-9cc8-469911ef4253\") " pod="calico-system/calico-node-h8sch" Feb 9 00:49:35.197193 kubelet[2019]: I0209 00:49:35.197073 2019 topology_manager.go:212] "Topology Admit Handler" Feb 9 00:49:35.197366 kubelet[2019]: E0209 00:49:35.197337 2019 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h9gqp" podUID=83b2cfd5-6e1c-47b1-936c-f1d68fb2b441 Feb 9 00:49:35.215707 kubelet[2019]: I0209 00:49:35.215666 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/83b2cfd5-6e1c-47b1-936c-f1d68fb2b441-varrun\") pod \"csi-node-driver-h9gqp\" (UID: \"83b2cfd5-6e1c-47b1-936c-f1d68fb2b441\") " pod="calico-system/csi-node-driver-h9gqp" Feb 9 00:49:35.215861 kubelet[2019]: I0209 00:49:35.215721 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pptfg\" (UniqueName: \"kubernetes.io/projected/83b2cfd5-6e1c-47b1-936c-f1d68fb2b441-kube-api-access-pptfg\") pod \"csi-node-driver-h9gqp\" (UID: \"83b2cfd5-6e1c-47b1-936c-f1d68fb2b441\") " pod="calico-system/csi-node-driver-h9gqp" Feb 9 00:49:35.216018 kubelet[2019]: I0209 00:49:35.215998 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/83b2cfd5-6e1c-47b1-936c-f1d68fb2b441-socket-dir\") pod \"csi-node-driver-h9gqp\" (UID: \"83b2cfd5-6e1c-47b1-936c-f1d68fb2b441\") " pod="calico-system/csi-node-driver-h9gqp" Feb 9 00:49:35.216183 kubelet[2019]: I0209 00:49:35.216158 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/83b2cfd5-6e1c-47b1-936c-f1d68fb2b441-kubelet-dir\") pod \"csi-node-driver-h9gqp\" (UID: \"83b2cfd5-6e1c-47b1-936c-f1d68fb2b441\") " pod="calico-system/csi-node-driver-h9gqp" Feb 9 00:49:35.216183 kubelet[2019]: I0209 00:49:35.216185 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/83b2cfd5-6e1c-47b1-936c-f1d68fb2b441-registration-dir\") pod \"csi-node-driver-h9gqp\" (UID: \"83b2cfd5-6e1c-47b1-936c-f1d68fb2b441\") " pod="calico-system/csi-node-driver-h9gqp" Feb 9 00:49:35.218080 kubelet[2019]: E0209 00:49:35.218048 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:35.218080 kubelet[2019]: W0209 00:49:35.218075 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:35.218160 kubelet[2019]: E0209 00:49:35.218105 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:35.223647 kubelet[2019]: E0209 00:49:35.219131 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:35.223647 kubelet[2019]: W0209 00:49:35.219143 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:35.223647 kubelet[2019]: E0209 00:49:35.219159 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:35.223647 kubelet[2019]: E0209 00:49:35.219285 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:35.223647 kubelet[2019]: W0209 00:49:35.219291 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:35.223647 kubelet[2019]: E0209 00:49:35.219300 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:35.229363 kubelet[2019]: E0209 00:49:35.229328 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:35.229363 kubelet[2019]: W0209 00:49:35.229347 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:35.229363 kubelet[2019]: E0209 00:49:35.229367 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:35.230470 kubelet[2019]: E0209 00:49:35.230440 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:35.230470 kubelet[2019]: W0209 00:49:35.230452 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:35.230470 kubelet[2019]: E0209 00:49:35.230462 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:35.316788 kubelet[2019]: E0209 00:49:35.316764 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:35.316788 kubelet[2019]: W0209 00:49:35.316781 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:35.316788 kubelet[2019]: E0209 00:49:35.316801 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:35.317060 kubelet[2019]: E0209 00:49:35.317032 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:35.317060 kubelet[2019]: W0209 00:49:35.317053 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:35.317141 kubelet[2019]: E0209 00:49:35.317068 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:35.317263 kubelet[2019]: E0209 00:49:35.317239 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:35.317263 kubelet[2019]: W0209 00:49:35.317247 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:35.317263 kubelet[2019]: E0209 00:49:35.317261 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:35.317608 kubelet[2019]: E0209 00:49:35.317592 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:35.317608 kubelet[2019]: W0209 00:49:35.317602 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:35.317696 kubelet[2019]: E0209 00:49:35.317617 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:35.317787 kubelet[2019]: E0209 00:49:35.317772 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:35.317787 kubelet[2019]: W0209 00:49:35.317782 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:35.317787 kubelet[2019]: E0209 00:49:35.317794 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:35.317954 kubelet[2019]: E0209 00:49:35.317926 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:35.317954 kubelet[2019]: W0209 00:49:35.317949 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:35.318036 kubelet[2019]: E0209 00:49:35.317965 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:35.320493 kubelet[2019]: E0209 00:49:35.320477 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:35.320493 kubelet[2019]: W0209 00:49:35.320487 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:35.320493 kubelet[2019]: E0209 00:49:35.320501 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:35.320728 kubelet[2019]: E0209 00:49:35.320662 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:35.320728 kubelet[2019]: W0209 00:49:35.320668 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:35.320728 kubelet[2019]: E0209 00:49:35.320722 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:35.320839 kubelet[2019]: E0209 00:49:35.320815 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:35.320839 kubelet[2019]: W0209 00:49:35.320830 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:35.320919 kubelet[2019]: E0209 00:49:35.320880 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:35.321070 kubelet[2019]: E0209 00:49:35.321045 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:35.321122 kubelet[2019]: W0209 00:49:35.321070 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:35.321204 kubelet[2019]: E0209 00:49:35.321181 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:35.321365 kubelet[2019]: E0209 00:49:35.321307 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:35.321365 kubelet[2019]: W0209 00:49:35.321328 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:35.321365 kubelet[2019]: E0209 00:49:35.321365 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:35.321562 kubelet[2019]: E0209 00:49:35.321537 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:35.321562 kubelet[2019]: W0209 00:49:35.321553 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:35.321671 kubelet[2019]: E0209 00:49:35.321641 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:35.321749 kubelet[2019]: E0209 00:49:35.321729 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:35.321749 kubelet[2019]: W0209 00:49:35.321742 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:35.321823 kubelet[2019]: E0209 00:49:35.321756 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:35.322101 kubelet[2019]: E0209 00:49:35.322080 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:35.322101 kubelet[2019]: W0209 00:49:35.322093 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:35.322101 kubelet[2019]: E0209 00:49:35.322105 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:35.322304 kubelet[2019]: E0209 00:49:35.322280 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:35.322304 kubelet[2019]: W0209 00:49:35.322293 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:35.322304 kubelet[2019]: E0209 00:49:35.322314 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:35.322721 kubelet[2019]: E0209 00:49:35.322712 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:35.322721 kubelet[2019]: W0209 00:49:35.322719 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:35.323070 kubelet[2019]: E0209 00:49:35.322769 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:35.323070 kubelet[2019]: E0209 00:49:35.322849 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:35.323070 kubelet[2019]: W0209 00:49:35.322854 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:35.323070 kubelet[2019]: E0209 00:49:35.322899 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:35.323070 kubelet[2019]: E0209 00:49:35.322996 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:35.323070 kubelet[2019]: W0209 00:49:35.323002 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:35.323070 kubelet[2019]: E0209 00:49:35.323044 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:35.323266 kubelet[2019]: E0209 00:49:35.323106 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:35.323266 kubelet[2019]: W0209 00:49:35.323111 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:35.323266 kubelet[2019]: E0209 00:49:35.323157 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:35.323348 kubelet[2019]: E0209 00:49:35.323273 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:35.323348 kubelet[2019]: W0209 00:49:35.323279 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:35.323348 kubelet[2019]: E0209 00:49:35.323287 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:35.323481 kubelet[2019]: E0209 00:49:35.323441 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:35.323481 kubelet[2019]: W0209 00:49:35.323452 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:35.323481 kubelet[2019]: E0209 00:49:35.323461 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:35.323664 kubelet[2019]: E0209 00:49:35.323627 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:35.323664 kubelet[2019]: W0209 00:49:35.323642 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:35.323664 kubelet[2019]: E0209 00:49:35.323662 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:35.326658 kubelet[2019]: E0209 00:49:35.326637 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:35.326658 kubelet[2019]: W0209 00:49:35.326651 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:35.326658 kubelet[2019]: E0209 00:49:35.326663 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:35.326836 kubelet[2019]: E0209 00:49:35.326818 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:35.326836 kubelet[2019]: W0209 00:49:35.326829 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:35.326836 kubelet[2019]: E0209 00:49:35.326838 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:35.327010 kubelet[2019]: E0209 00:49:35.326998 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:35.327010 kubelet[2019]: W0209 00:49:35.327006 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:35.327078 kubelet[2019]: E0209 00:49:35.327016 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:35.329980 kubelet[2019]: E0209 00:49:35.329099 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:35.329980 kubelet[2019]: W0209 00:49:35.329108 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:35.329980 kubelet[2019]: E0209 00:49:35.329118 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:35.367716 kubelet[2019]: E0209 00:49:35.367687 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:35.368335 env[1127]: time="2024-02-09T00:49:35.368294362Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7876cb7976-77cxq,Uid:f5b9211c-fea9-4dcf-b9dc-90a4853a210b,Namespace:calico-system,Attempt:0,}" Feb 9 00:49:35.383474 env[1127]: time="2024-02-09T00:49:35.383381043Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 00:49:35.383474 env[1127]: time="2024-02-09T00:49:35.383437209Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 00:49:35.383474 env[1127]: time="2024-02-09T00:49:35.383448551Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 00:49:35.383672 env[1127]: time="2024-02-09T00:49:35.383645702Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8874502445205e7735bbb39b03543ae2a6499b56d62b17ebe9059f6a22c3ea9c pid=2441 runtime=io.containerd.runc.v2 Feb 9 00:49:35.393735 kubelet[2019]: E0209 00:49:35.393701 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:35.394083 env[1127]: time="2024-02-09T00:49:35.394053255Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-h8sch,Uid:79b3cd94-0b09-45d0-9cc8-469911ef4253,Namespace:calico-system,Attempt:0,}" Feb 9 00:49:35.397689 systemd[1]: Started cri-containerd-8874502445205e7735bbb39b03543ae2a6499b56d62b17ebe9059f6a22c3ea9c.scope. Feb 9 00:49:35.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.409000 audit: BPF prog-id=127 op=LOAD Feb 9 00:49:35.410000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.410000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2441 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:35.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838373435303234343532303565373733356262623339623033353433 Feb 9 00:49:35.410000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.410000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2441 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:35.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838373435303234343532303565373733356262623339623033353433 Feb 9 00:49:35.410000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.410000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.410000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.410000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.410000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.410000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.410000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.410000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.410000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.410000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.410000 audit: BPF prog-id=128 op=LOAD Feb 9 00:49:35.410000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a0550 items=0 ppid=2441 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:35.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838373435303234343532303565373733356262623339623033353433 Feb 9 00:49:35.410000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.410000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.410000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.410000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.410000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.410000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.410000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.410000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.410000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.410000 audit: BPF prog-id=129 op=LOAD Feb 9 00:49:35.410000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a0598 items=0 ppid=2441 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:35.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838373435303234343532303565373733356262623339623033353433 Feb 9 00:49:35.410000 audit: BPF prog-id=129 op=UNLOAD Feb 9 00:49:35.410000 audit: BPF prog-id=128 op=UNLOAD Feb 9 00:49:35.410000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.410000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.410000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.410000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.410000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.410000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.410000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.410000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.410000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.410000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.410000 audit: BPF prog-id=130 op=LOAD Feb 9 00:49:35.410000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a09a8 items=0 ppid=2441 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:35.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838373435303234343532303565373733356262623339623033353433 Feb 9 00:49:35.451467 kubelet[2019]: E0209 00:49:35.435979 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:35.451533 env[1127]: time="2024-02-09T00:49:35.435332138Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7876cb7976-77cxq,Uid:f5b9211c-fea9-4dcf-b9dc-90a4853a210b,Namespace:calico-system,Attempt:0,} returns sandbox id \"8874502445205e7735bbb39b03543ae2a6499b56d62b17ebe9059f6a22c3ea9c\"" Feb 9 00:49:35.451533 env[1127]: time="2024-02-09T00:49:35.443700258Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 9 00:49:35.643582 env[1127]: time="2024-02-09T00:49:35.643504959Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 00:49:35.643848 env[1127]: time="2024-02-09T00:49:35.643820243Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 00:49:35.643978 env[1127]: time="2024-02-09T00:49:35.643936843Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 00:49:35.644361 env[1127]: time="2024-02-09T00:49:35.644296229Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/47f70be0595daef42e11cf3320af604821e9fb725979b29e88c932dfbd988886 pid=2481 runtime=io.containerd.runc.v2 Feb 9 00:49:35.654685 systemd[1]: Started cri-containerd-47f70be0595daef42e11cf3320af604821e9fb725979b29e88c932dfbd988886.scope. Feb 9 00:49:35.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.666000 audit: BPF prog-id=131 op=LOAD Feb 9 00:49:35.666000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.666000 audit[2491]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2481 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:35.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437663730626530353935646165663432653131636633333230616636 Feb 9 00:49:35.666000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.666000 audit[2491]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2481 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:35.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437663730626530353935646165663432653131636633333230616636 Feb 9 00:49:35.666000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.666000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.666000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.666000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.666000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.666000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.666000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.666000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.666000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.666000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.666000 audit: BPF prog-id=132 op=LOAD Feb 9 00:49:35.666000 audit[2491]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000287150 items=0 ppid=2481 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:35.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437663730626530353935646165663432653131636633333230616636 Feb 9 00:49:35.666000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.666000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.666000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.666000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.666000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.666000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.666000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.666000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.666000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.666000 audit: BPF prog-id=133 op=LOAD Feb 9 00:49:35.666000 audit[2491]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000287198 items=0 ppid=2481 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:35.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437663730626530353935646165663432653131636633333230616636 Feb 9 00:49:35.666000 audit: BPF prog-id=133 op=UNLOAD Feb 9 00:49:35.666000 audit: BPF prog-id=132 op=UNLOAD Feb 9 00:49:35.667000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.667000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.667000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.667000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.667000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.667000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.667000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.667000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.667000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.667000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:35.667000 audit: BPF prog-id=134 op=LOAD Feb 9 00:49:35.667000 audit[2491]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002875a8 items=0 ppid=2481 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:35.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437663730626530353935646165663432653131636633333230616636 Feb 9 00:49:35.682596 env[1127]: time="2024-02-09T00:49:35.682546865Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-h8sch,Uid:79b3cd94-0b09-45d0-9cc8-469911ef4253,Namespace:calico-system,Attempt:0,} returns sandbox id \"47f70be0595daef42e11cf3320af604821e9fb725979b29e88c932dfbd988886\"" Feb 9 00:49:35.683303 kubelet[2019]: E0209 00:49:35.683283 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:35.954000 audit[2516]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2516 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:49:35.954000 audit[2516]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffdc72302f0 a2=0 a3=7ffdc72302dc items=0 ppid=2178 pid=2516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:35.954000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:49:35.955000 audit[2516]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2516 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:49:35.955000 audit[2516]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffdc72302f0 a2=0 a3=31030 items=0 ppid=2178 pid=2516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:35.955000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:49:36.808275 kubelet[2019]: E0209 00:49:36.808236 2019 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h9gqp" podUID=83b2cfd5-6e1c-47b1-936c-f1d68fb2b441 Feb 9 00:49:37.138166 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2921903280.mount: Deactivated successfully. Feb 9 00:49:38.809068 kubelet[2019]: E0209 00:49:38.809022 2019 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h9gqp" podUID=83b2cfd5-6e1c-47b1-936c-f1d68fb2b441 Feb 9 00:49:39.334885 env[1127]: time="2024-02-09T00:49:39.334833410Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:39.336337 env[1127]: time="2024-02-09T00:49:39.336299590Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:39.337905 env[1127]: time="2024-02-09T00:49:39.337876308Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:39.339368 env[1127]: time="2024-02-09T00:49:39.339349551Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:39.340078 env[1127]: time="2024-02-09T00:49:39.340039189Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 9 00:49:39.341004 env[1127]: time="2024-02-09T00:49:39.340973468Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 00:49:39.349719 env[1127]: time="2024-02-09T00:49:39.349690868Z" level=info msg="CreateContainer within sandbox \"8874502445205e7735bbb39b03543ae2a6499b56d62b17ebe9059f6a22c3ea9c\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 9 00:49:39.359026 env[1127]: time="2024-02-09T00:49:39.358990673Z" level=info msg="CreateContainer within sandbox \"8874502445205e7735bbb39b03543ae2a6499b56d62b17ebe9059f6a22c3ea9c\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"4a95203473e155593f5cc7294618cd7666efc8a6402b65032df65ac543b93f13\"" Feb 9 00:49:39.359460 env[1127]: time="2024-02-09T00:49:39.359412397Z" level=info msg="StartContainer for \"4a95203473e155593f5cc7294618cd7666efc8a6402b65032df65ac543b93f13\"" Feb 9 00:49:39.377559 systemd[1]: Started cri-containerd-4a95203473e155593f5cc7294618cd7666efc8a6402b65032df65ac543b93f13.scope. Feb 9 00:49:39.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.387343 kernel: kauditd_printk_skb: 179 callbacks suppressed Feb 9 00:49:39.387386 kernel: audit: type=1400 audit(1707439779.385:1113): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.391217 kernel: audit: type=1400 audit(1707439779.385:1114): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.391267 kernel: audit: type=1400 audit(1707439779.385:1115): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.393147 kernel: audit: type=1400 audit(1707439779.385:1116): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.397257 kernel: audit: type=1400 audit(1707439779.385:1117): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.399318 kernel: audit: type=1400 audit(1707439779.385:1118): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.399359 kernel: audit: type=1400 audit(1707439779.385:1119): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.403269 kernel: audit: type=1400 audit(1707439779.385:1120): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.403308 kernel: audit: type=1400 audit(1707439779.385:1121): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.407132 kernel: audit: type=1400 audit(1707439779.388:1122): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.388000 audit: BPF prog-id=135 op=LOAD Feb 9 00:49:39.389000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.389000 audit[2526]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2441 pid=2526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:39.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461393532303334373365313535353933663563633732393436313863 Feb 9 00:49:39.389000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.389000 audit[2526]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2441 pid=2526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:39.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461393532303334373365313535353933663563633732393436313863 Feb 9 00:49:39.389000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.389000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.389000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.389000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.389000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.389000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.389000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.389000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.389000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.389000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.389000 audit: BPF prog-id=136 op=LOAD Feb 9 00:49:39.389000 audit[2526]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00034c530 items=0 ppid=2441 pid=2526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:39.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461393532303334373365313535353933663563633732393436313863 Feb 9 00:49:39.390000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.390000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.390000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.390000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.390000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.390000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.390000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.390000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.390000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.390000 audit: BPF prog-id=137 op=LOAD Feb 9 00:49:39.390000 audit[2526]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00034c578 items=0 ppid=2441 pid=2526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:39.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461393532303334373365313535353933663563633732393436313863 Feb 9 00:49:39.392000 audit: BPF prog-id=137 op=UNLOAD Feb 9 00:49:39.392000 audit: BPF prog-id=136 op=UNLOAD Feb 9 00:49:39.392000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.392000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.392000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.392000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.392000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.392000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.392000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.392000 audit[2526]: AVC avc: denied { perfmon } for pid=2526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.392000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.392000 audit[2526]: AVC avc: denied { bpf } for pid=2526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:39.392000 audit: BPF prog-id=138 op=LOAD Feb 9 00:49:39.392000 audit[2526]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00034c988 items=0 ppid=2441 pid=2526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:39.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461393532303334373365313535353933663563633732393436313863 Feb 9 00:49:39.428966 env[1127]: time="2024-02-09T00:49:39.428907423Z" level=info msg="StartContainer for \"4a95203473e155593f5cc7294618cd7666efc8a6402b65032df65ac543b93f13\" returns successfully" Feb 9 00:49:39.857081 kubelet[2019]: E0209 00:49:39.857053 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:39.882470 kubelet[2019]: I0209 00:49:39.882232 2019 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-7876cb7976-77cxq" podStartSLOduration=0.98530533 podCreationTimestamp="2024-02-09 00:49:35 +0000 UTC" firstStartedPulling="2024-02-09 00:49:35.443442913 +0000 UTC m=+20.725079982" lastFinishedPulling="2024-02-09 00:49:39.340332211 +0000 UTC m=+24.621969270" observedRunningTime="2024-02-09 00:49:39.881715265 +0000 UTC m=+25.163352334" watchObservedRunningTime="2024-02-09 00:49:39.882194618 +0000 UTC m=+25.163831687" Feb 9 00:49:39.943936 kubelet[2019]: E0209 00:49:39.943902 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:39.943936 kubelet[2019]: W0209 00:49:39.943922 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:39.944030 kubelet[2019]: E0209 00:49:39.943961 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:39.944122 kubelet[2019]: E0209 00:49:39.944103 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:39.944122 kubelet[2019]: W0209 00:49:39.944113 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:39.944122 kubelet[2019]: E0209 00:49:39.944122 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:39.944287 kubelet[2019]: E0209 00:49:39.944266 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:39.944287 kubelet[2019]: W0209 00:49:39.944276 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:39.944287 kubelet[2019]: E0209 00:49:39.944285 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:39.944470 kubelet[2019]: E0209 00:49:39.944451 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:39.944470 kubelet[2019]: W0209 00:49:39.944461 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:39.944470 kubelet[2019]: E0209 00:49:39.944469 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:39.944654 kubelet[2019]: E0209 00:49:39.944637 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:39.944654 kubelet[2019]: W0209 00:49:39.944647 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:39.944654 kubelet[2019]: E0209 00:49:39.944655 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:39.944788 kubelet[2019]: E0209 00:49:39.944778 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:39.944788 kubelet[2019]: W0209 00:49:39.944786 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:39.944841 kubelet[2019]: E0209 00:49:39.944794 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:39.944960 kubelet[2019]: E0209 00:49:39.944935 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:39.944960 kubelet[2019]: W0209 00:49:39.944957 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:39.945054 kubelet[2019]: E0209 00:49:39.944966 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:39.945104 kubelet[2019]: E0209 00:49:39.945093 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:39.945104 kubelet[2019]: W0209 00:49:39.945102 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:39.945160 kubelet[2019]: E0209 00:49:39.945110 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:39.945222 kubelet[2019]: E0209 00:49:39.945210 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:39.945222 kubelet[2019]: W0209 00:49:39.945219 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:39.945282 kubelet[2019]: E0209 00:49:39.945227 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:39.945364 kubelet[2019]: E0209 00:49:39.945352 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:39.945364 kubelet[2019]: W0209 00:49:39.945363 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:39.945412 kubelet[2019]: E0209 00:49:39.945371 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:39.945504 kubelet[2019]: E0209 00:49:39.945493 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:39.945504 kubelet[2019]: W0209 00:49:39.945501 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:39.945552 kubelet[2019]: E0209 00:49:39.945509 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:39.945624 kubelet[2019]: E0209 00:49:39.945613 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:39.945624 kubelet[2019]: W0209 00:49:39.945621 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:39.945673 kubelet[2019]: E0209 00:49:39.945631 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:39.949891 kubelet[2019]: E0209 00:49:39.949868 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:39.949891 kubelet[2019]: W0209 00:49:39.949880 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:39.949891 kubelet[2019]: E0209 00:49:39.949891 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:39.950058 kubelet[2019]: E0209 00:49:39.950038 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:39.950058 kubelet[2019]: W0209 00:49:39.950049 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:39.950250 kubelet[2019]: E0209 00:49:39.950063 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:39.950278 kubelet[2019]: E0209 00:49:39.950255 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:39.950278 kubelet[2019]: W0209 00:49:39.950261 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:39.950278 kubelet[2019]: E0209 00:49:39.950273 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:39.950512 kubelet[2019]: E0209 00:49:39.950487 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:39.950539 kubelet[2019]: W0209 00:49:39.950512 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:39.950564 kubelet[2019]: E0209 00:49:39.950539 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:39.950717 kubelet[2019]: E0209 00:49:39.950696 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:39.950717 kubelet[2019]: W0209 00:49:39.950706 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:39.950789 kubelet[2019]: E0209 00:49:39.950722 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:39.950867 kubelet[2019]: E0209 00:49:39.950854 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:39.950867 kubelet[2019]: W0209 00:49:39.950863 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:39.950915 kubelet[2019]: E0209 00:49:39.950875 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:39.951042 kubelet[2019]: E0209 00:49:39.951023 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:39.951042 kubelet[2019]: W0209 00:49:39.951035 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:39.951099 kubelet[2019]: E0209 00:49:39.951050 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:39.951190 kubelet[2019]: E0209 00:49:39.951179 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:39.951190 kubelet[2019]: W0209 00:49:39.951188 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:39.951245 kubelet[2019]: E0209 00:49:39.951199 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:39.951338 kubelet[2019]: E0209 00:49:39.951326 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:39.951338 kubelet[2019]: W0209 00:49:39.951335 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:39.951388 kubelet[2019]: E0209 00:49:39.951347 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:39.951502 kubelet[2019]: E0209 00:49:39.951489 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:39.951502 kubelet[2019]: W0209 00:49:39.951499 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:39.951548 kubelet[2019]: E0209 00:49:39.951513 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:39.951656 kubelet[2019]: E0209 00:49:39.951644 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:39.951656 kubelet[2019]: W0209 00:49:39.951653 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:39.951706 kubelet[2019]: E0209 00:49:39.951666 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:39.951821 kubelet[2019]: E0209 00:49:39.951806 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:39.951845 kubelet[2019]: W0209 00:49:39.951820 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:39.951845 kubelet[2019]: E0209 00:49:39.951837 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:39.951984 kubelet[2019]: E0209 00:49:39.951973 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:39.951984 kubelet[2019]: W0209 00:49:39.951982 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:39.952035 kubelet[2019]: E0209 00:49:39.952002 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:39.952207 kubelet[2019]: E0209 00:49:39.952194 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:39.952207 kubelet[2019]: W0209 00:49:39.952205 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:39.952263 kubelet[2019]: E0209 00:49:39.952219 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:39.954956 kubelet[2019]: E0209 00:49:39.952504 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:39.954956 kubelet[2019]: W0209 00:49:39.952518 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:39.954956 kubelet[2019]: E0209 00:49:39.952532 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:39.954956 kubelet[2019]: E0209 00:49:39.952774 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:39.954956 kubelet[2019]: W0209 00:49:39.952786 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:39.954956 kubelet[2019]: E0209 00:49:39.952796 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:39.954956 kubelet[2019]: E0209 00:49:39.952911 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:39.954956 kubelet[2019]: W0209 00:49:39.952917 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:39.954956 kubelet[2019]: E0209 00:49:39.952926 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:39.955708 kubelet[2019]: E0209 00:49:39.955691 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:39.955708 kubelet[2019]: W0209 00:49:39.955704 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:39.955777 kubelet[2019]: E0209 00:49:39.955719 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:40.809266 kubelet[2019]: E0209 00:49:40.809201 2019 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h9gqp" podUID=83b2cfd5-6e1c-47b1-936c-f1d68fb2b441 Feb 9 00:49:40.858683 kubelet[2019]: I0209 00:49:40.858649 2019 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 00:49:40.859179 kubelet[2019]: E0209 00:49:40.859153 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:40.953678 kubelet[2019]: E0209 00:49:40.953643 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:40.953678 kubelet[2019]: W0209 00:49:40.953665 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:40.953678 kubelet[2019]: E0209 00:49:40.953689 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:40.953902 kubelet[2019]: E0209 00:49:40.953832 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:40.953902 kubelet[2019]: W0209 00:49:40.953839 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:40.953902 kubelet[2019]: E0209 00:49:40.953850 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:40.954033 kubelet[2019]: E0209 00:49:40.953998 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:40.954033 kubelet[2019]: W0209 00:49:40.954006 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:40.954033 kubelet[2019]: E0209 00:49:40.954016 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:40.954174 kubelet[2019]: E0209 00:49:40.954157 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:40.954174 kubelet[2019]: W0209 00:49:40.954167 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:40.954269 kubelet[2019]: E0209 00:49:40.954178 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:40.954306 kubelet[2019]: E0209 00:49:40.954300 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:40.954339 kubelet[2019]: W0209 00:49:40.954307 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:40.954339 kubelet[2019]: E0209 00:49:40.954318 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:40.954431 kubelet[2019]: E0209 00:49:40.954421 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:40.954431 kubelet[2019]: W0209 00:49:40.954429 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:40.954503 kubelet[2019]: E0209 00:49:40.954439 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:40.954605 kubelet[2019]: E0209 00:49:40.954589 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:40.954605 kubelet[2019]: W0209 00:49:40.954598 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:40.954676 kubelet[2019]: E0209 00:49:40.954609 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:40.954728 kubelet[2019]: E0209 00:49:40.954718 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:40.954728 kubelet[2019]: W0209 00:49:40.954726 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:40.954797 kubelet[2019]: E0209 00:49:40.954736 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:40.954850 kubelet[2019]: E0209 00:49:40.954841 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:40.954850 kubelet[2019]: W0209 00:49:40.954848 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:40.954915 kubelet[2019]: E0209 00:49:40.954859 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:40.955000 kubelet[2019]: E0209 00:49:40.954990 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:40.955000 kubelet[2019]: W0209 00:49:40.954999 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:40.955076 kubelet[2019]: E0209 00:49:40.955010 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:40.955123 kubelet[2019]: E0209 00:49:40.955113 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:40.955123 kubelet[2019]: W0209 00:49:40.955121 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:40.955243 kubelet[2019]: E0209 00:49:40.955133 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:40.955243 kubelet[2019]: E0209 00:49:40.955242 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:40.955315 kubelet[2019]: W0209 00:49:40.955250 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:40.955315 kubelet[2019]: E0209 00:49:40.955262 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:40.958489 kubelet[2019]: E0209 00:49:40.958471 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:40.958489 kubelet[2019]: W0209 00:49:40.958481 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:40.958489 kubelet[2019]: E0209 00:49:40.958490 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:40.958679 kubelet[2019]: E0209 00:49:40.958662 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:40.958679 kubelet[2019]: W0209 00:49:40.958672 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:40.958747 kubelet[2019]: E0209 00:49:40.958687 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:40.958846 kubelet[2019]: E0209 00:49:40.958830 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:40.958846 kubelet[2019]: W0209 00:49:40.958841 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:40.958893 kubelet[2019]: E0209 00:49:40.958859 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:40.959050 kubelet[2019]: E0209 00:49:40.959032 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:40.959050 kubelet[2019]: W0209 00:49:40.959042 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:40.959111 kubelet[2019]: E0209 00:49:40.959056 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:40.959192 kubelet[2019]: E0209 00:49:40.959180 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:40.959192 kubelet[2019]: W0209 00:49:40.959188 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:40.959269 kubelet[2019]: E0209 00:49:40.959203 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:40.959366 kubelet[2019]: E0209 00:49:40.959357 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:40.959393 kubelet[2019]: W0209 00:49:40.959365 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:40.959393 kubelet[2019]: E0209 00:49:40.959381 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:40.959579 kubelet[2019]: E0209 00:49:40.959566 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:40.959579 kubelet[2019]: W0209 00:49:40.959578 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:40.959658 kubelet[2019]: E0209 00:49:40.959594 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:40.959795 kubelet[2019]: E0209 00:49:40.959783 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:40.959819 kubelet[2019]: W0209 00:49:40.959796 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:40.959819 kubelet[2019]: E0209 00:49:40.959812 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:40.959994 kubelet[2019]: E0209 00:49:40.959981 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:40.959994 kubelet[2019]: W0209 00:49:40.959990 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:40.960072 kubelet[2019]: E0209 00:49:40.960027 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:40.960134 kubelet[2019]: E0209 00:49:40.960123 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:40.960158 kubelet[2019]: W0209 00:49:40.960132 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:40.960179 kubelet[2019]: E0209 00:49:40.960160 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:40.960287 kubelet[2019]: E0209 00:49:40.960278 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:40.960310 kubelet[2019]: W0209 00:49:40.960288 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:40.960310 kubelet[2019]: E0209 00:49:40.960303 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:40.960448 kubelet[2019]: E0209 00:49:40.960439 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:40.960474 kubelet[2019]: W0209 00:49:40.960448 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:40.960474 kubelet[2019]: E0209 00:49:40.960462 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:40.960616 kubelet[2019]: E0209 00:49:40.960607 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:40.960639 kubelet[2019]: W0209 00:49:40.960616 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:40.960639 kubelet[2019]: E0209 00:49:40.960632 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:40.960842 kubelet[2019]: E0209 00:49:40.960831 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:40.960888 kubelet[2019]: W0209 00:49:40.960844 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:40.960888 kubelet[2019]: E0209 00:49:40.960860 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:40.961029 kubelet[2019]: E0209 00:49:40.961015 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:40.961029 kubelet[2019]: W0209 00:49:40.961025 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:40.961097 kubelet[2019]: E0209 00:49:40.961041 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:40.961209 kubelet[2019]: E0209 00:49:40.961198 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:40.961242 kubelet[2019]: W0209 00:49:40.961208 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:40.961242 kubelet[2019]: E0209 00:49:40.961228 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:40.961428 kubelet[2019]: E0209 00:49:40.961418 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:40.961452 kubelet[2019]: W0209 00:49:40.961429 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:40.961452 kubelet[2019]: E0209 00:49:40.961442 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:40.961691 kubelet[2019]: E0209 00:49:40.961677 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:40.961691 kubelet[2019]: W0209 00:49:40.961688 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:40.961737 kubelet[2019]: E0209 00:49:40.961699 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:41.347000 audit[2619]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=2619 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:49:41.347000 audit[2619]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffcec9fe680 a2=0 a3=7ffcec9fe66c items=0 ppid=2178 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:41.347000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:49:41.348000 audit[2619]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2619 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:49:41.348000 audit[2619]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffcec9fe680 a2=0 a3=7ffcec9fe66c items=0 ppid=2178 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:41.348000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:49:41.859993 kubelet[2019]: E0209 00:49:41.859964 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:41.860479 kubelet[2019]: E0209 00:49:41.860459 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:41.860479 kubelet[2019]: W0209 00:49:41.860471 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:41.860549 kubelet[2019]: E0209 00:49:41.860486 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:41.860652 kubelet[2019]: E0209 00:49:41.860634 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:41.860652 kubelet[2019]: W0209 00:49:41.860643 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:41.860652 kubelet[2019]: E0209 00:49:41.860651 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:41.860768 kubelet[2019]: E0209 00:49:41.860754 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:41.860768 kubelet[2019]: W0209 00:49:41.860762 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:41.860768 kubelet[2019]: E0209 00:49:41.860770 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:41.860892 kubelet[2019]: E0209 00:49:41.860878 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:41.860892 kubelet[2019]: W0209 00:49:41.860887 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:41.860892 kubelet[2019]: E0209 00:49:41.860894 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:41.861039 kubelet[2019]: E0209 00:49:41.861021 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:41.861039 kubelet[2019]: W0209 00:49:41.861034 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:41.861106 kubelet[2019]: E0209 00:49:41.861045 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:41.861214 kubelet[2019]: E0209 00:49:41.861189 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:41.861214 kubelet[2019]: W0209 00:49:41.861211 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:41.861276 kubelet[2019]: E0209 00:49:41.861227 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:41.861424 kubelet[2019]: E0209 00:49:41.861410 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:41.861424 kubelet[2019]: W0209 00:49:41.861419 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:41.861424 kubelet[2019]: E0209 00:49:41.861428 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:41.861577 kubelet[2019]: E0209 00:49:41.861564 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:41.861577 kubelet[2019]: W0209 00:49:41.861574 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:41.861624 kubelet[2019]: E0209 00:49:41.861583 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:41.861739 kubelet[2019]: E0209 00:49:41.861714 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:41.861739 kubelet[2019]: W0209 00:49:41.861723 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:41.861739 kubelet[2019]: E0209 00:49:41.861731 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:41.861911 kubelet[2019]: E0209 00:49:41.861834 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:41.861911 kubelet[2019]: W0209 00:49:41.861839 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:41.861911 kubelet[2019]: E0209 00:49:41.861846 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:41.862000 kubelet[2019]: E0209 00:49:41.861946 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:41.862000 kubelet[2019]: W0209 00:49:41.861953 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:41.862000 kubelet[2019]: E0209 00:49:41.861968 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:41.862087 kubelet[2019]: E0209 00:49:41.862064 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:41.862087 kubelet[2019]: W0209 00:49:41.862071 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:41.862087 kubelet[2019]: E0209 00:49:41.862078 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:41.865797 kubelet[2019]: E0209 00:49:41.865784 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:41.865797 kubelet[2019]: W0209 00:49:41.865793 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:41.865871 kubelet[2019]: E0209 00:49:41.865804 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:41.865982 kubelet[2019]: E0209 00:49:41.865970 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:41.865982 kubelet[2019]: W0209 00:49:41.865977 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:41.866058 kubelet[2019]: E0209 00:49:41.865989 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:41.866133 kubelet[2019]: E0209 00:49:41.866123 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:41.866133 kubelet[2019]: W0209 00:49:41.866131 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:41.866199 kubelet[2019]: E0209 00:49:41.866147 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:41.866301 kubelet[2019]: E0209 00:49:41.866287 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:41.866301 kubelet[2019]: W0209 00:49:41.866295 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:41.866351 kubelet[2019]: E0209 00:49:41.866308 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:41.866452 kubelet[2019]: E0209 00:49:41.866441 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:41.866452 kubelet[2019]: W0209 00:49:41.866448 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:41.866498 kubelet[2019]: E0209 00:49:41.866460 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:41.866575 kubelet[2019]: E0209 00:49:41.866568 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:41.866598 kubelet[2019]: W0209 00:49:41.866575 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:41.866598 kubelet[2019]: E0209 00:49:41.866586 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:41.866788 kubelet[2019]: E0209 00:49:41.866767 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:41.866788 kubelet[2019]: W0209 00:49:41.866785 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:41.866837 kubelet[2019]: E0209 00:49:41.866809 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:41.866974 kubelet[2019]: E0209 00:49:41.866959 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:41.866974 kubelet[2019]: W0209 00:49:41.866968 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:41.867050 kubelet[2019]: E0209 00:49:41.866981 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:41.867127 kubelet[2019]: E0209 00:49:41.867114 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:41.867127 kubelet[2019]: W0209 00:49:41.867123 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:41.867220 kubelet[2019]: E0209 00:49:41.867135 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:41.867287 kubelet[2019]: E0209 00:49:41.867278 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:41.867310 kubelet[2019]: W0209 00:49:41.867287 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:41.867310 kubelet[2019]: E0209 00:49:41.867302 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:41.867438 kubelet[2019]: E0209 00:49:41.867427 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:41.867438 kubelet[2019]: W0209 00:49:41.867434 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:41.867502 kubelet[2019]: E0209 00:49:41.867444 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:41.867564 kubelet[2019]: E0209 00:49:41.867554 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:41.867564 kubelet[2019]: W0209 00:49:41.867561 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:41.867612 kubelet[2019]: E0209 00:49:41.867573 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:41.867724 kubelet[2019]: E0209 00:49:41.867714 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:41.867724 kubelet[2019]: W0209 00:49:41.867720 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:41.867785 kubelet[2019]: E0209 00:49:41.867739 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:41.867860 kubelet[2019]: E0209 00:49:41.867849 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:41.867860 kubelet[2019]: W0209 00:49:41.867856 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:41.867930 kubelet[2019]: E0209 00:49:41.867874 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:41.867995 kubelet[2019]: E0209 00:49:41.867984 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:41.867995 kubelet[2019]: W0209 00:49:41.867991 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:41.868068 kubelet[2019]: E0209 00:49:41.868002 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:41.868134 kubelet[2019]: E0209 00:49:41.868123 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:41.868134 kubelet[2019]: W0209 00:49:41.868131 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:41.868180 kubelet[2019]: E0209 00:49:41.868144 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:41.868291 kubelet[2019]: E0209 00:49:41.868283 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:41.868318 kubelet[2019]: W0209 00:49:41.868290 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:41.868318 kubelet[2019]: E0209 00:49:41.868299 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:41.868497 kubelet[2019]: E0209 00:49:41.868484 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:49:41.868497 kubelet[2019]: W0209 00:49:41.868492 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:49:41.868562 kubelet[2019]: E0209 00:49:41.868502 2019 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:49:42.439764 env[1127]: time="2024-02-09T00:49:42.439716722Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:42.441741 env[1127]: time="2024-02-09T00:49:42.441685666Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:42.443476 env[1127]: time="2024-02-09T00:49:42.443447711Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:42.445485 env[1127]: time="2024-02-09T00:49:42.445454876Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:42.446256 env[1127]: time="2024-02-09T00:49:42.446214444Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 9 00:49:42.448006 env[1127]: time="2024-02-09T00:49:42.447964467Z" level=info msg="CreateContainer within sandbox \"47f70be0595daef42e11cf3320af604821e9fb725979b29e88c932dfbd988886\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 00:49:42.459204 env[1127]: time="2024-02-09T00:49:42.459155247Z" level=info msg="CreateContainer within sandbox \"47f70be0595daef42e11cf3320af604821e9fb725979b29e88c932dfbd988886\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"cabe34b0d43df1be960566b45d250c9f245b88933b8575ce0fd8ce99751ec701\"" Feb 9 00:49:42.459628 env[1127]: time="2024-02-09T00:49:42.459601617Z" level=info msg="StartContainer for \"cabe34b0d43df1be960566b45d250c9f245b88933b8575ce0fd8ce99751ec701\"" Feb 9 00:49:42.479386 systemd[1]: Started cri-containerd-cabe34b0d43df1be960566b45d250c9f245b88933b8575ce0fd8ce99751ec701.scope. Feb 9 00:49:42.489000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:42.489000 audit[2657]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2481 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:42.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361626533346230643433646631626539363035363662343564323530 Feb 9 00:49:42.489000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:42.489000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:42.489000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:42.489000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:42.489000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:42.489000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:42.489000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:42.489000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:42.489000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:42.489000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:42.489000 audit: BPF prog-id=139 op=LOAD Feb 9 00:49:42.489000 audit[2657]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00027e8b0 items=0 ppid=2481 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:42.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361626533346230643433646631626539363035363662343564323530 Feb 9 00:49:42.489000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:42.489000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:42.489000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:42.489000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:42.489000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:42.489000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:42.489000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:42.489000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:42.489000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:42.489000 audit: BPF prog-id=140 op=LOAD Feb 9 00:49:42.489000 audit[2657]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00027e8f8 items=0 ppid=2481 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:42.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361626533346230643433646631626539363035363662343564323530 Feb 9 00:49:42.489000 audit: BPF prog-id=140 op=UNLOAD Feb 9 00:49:42.489000 audit: BPF prog-id=139 op=UNLOAD Feb 9 00:49:42.489000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:42.489000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:42.489000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:42.489000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:42.489000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:42.489000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:42.489000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:42.489000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:42.489000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:42.489000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:42.489000 audit: BPF prog-id=141 op=LOAD Feb 9 00:49:42.489000 audit[2657]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00027e988 items=0 ppid=2481 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:42.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361626533346230643433646631626539363035363662343564323530 Feb 9 00:49:42.502457 env[1127]: time="2024-02-09T00:49:42.502405544Z" level=info msg="StartContainer for \"cabe34b0d43df1be960566b45d250c9f245b88933b8575ce0fd8ce99751ec701\" returns successfully" Feb 9 00:49:42.508737 systemd[1]: cri-containerd-cabe34b0d43df1be960566b45d250c9f245b88933b8575ce0fd8ce99751ec701.scope: Deactivated successfully. Feb 9 00:49:42.512000 audit: BPF prog-id=141 op=UNLOAD Feb 9 00:49:42.526730 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-cabe34b0d43df1be960566b45d250c9f245b88933b8575ce0fd8ce99751ec701-rootfs.mount: Deactivated successfully. Feb 9 00:49:42.561861 env[1127]: time="2024-02-09T00:49:42.561812453Z" level=info msg="shim disconnected" id=cabe34b0d43df1be960566b45d250c9f245b88933b8575ce0fd8ce99751ec701 Feb 9 00:49:42.561861 env[1127]: time="2024-02-09T00:49:42.561858600Z" level=warning msg="cleaning up after shim disconnected" id=cabe34b0d43df1be960566b45d250c9f245b88933b8575ce0fd8ce99751ec701 namespace=k8s.io Feb 9 00:49:42.562028 env[1127]: time="2024-02-09T00:49:42.561869430Z" level=info msg="cleaning up dead shim" Feb 9 00:49:42.568325 env[1127]: time="2024-02-09T00:49:42.568281251Z" level=warning msg="cleanup warnings time=\"2024-02-09T00:49:42Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2696 runtime=io.containerd.runc.v2\n" Feb 9 00:49:42.808527 kubelet[2019]: E0209 00:49:42.808424 2019 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h9gqp" podUID=83b2cfd5-6e1c-47b1-936c-f1d68fb2b441 Feb 9 00:49:42.863486 kubelet[2019]: E0209 00:49:42.862638 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:42.863486 kubelet[2019]: E0209 00:49:42.862793 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:42.863800 env[1127]: time="2024-02-09T00:49:42.863285938Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 00:49:44.798386 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1288613793.mount: Deactivated successfully. Feb 9 00:49:44.809311 kubelet[2019]: E0209 00:49:44.809265 2019 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h9gqp" podUID=83b2cfd5-6e1c-47b1-936c-f1d68fb2b441 Feb 9 00:49:46.808993 kubelet[2019]: E0209 00:49:46.808935 2019 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h9gqp" podUID=83b2cfd5-6e1c-47b1-936c-f1d68fb2b441 Feb 9 00:49:47.101058 systemd[1]: Started sshd@7-10.0.0.84:22-10.0.0.1:35022.service. Feb 9 00:49:47.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.84:22-10.0.0.1:35022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:49:47.105022 kernel: kauditd_printk_skb: 97 callbacks suppressed Feb 9 00:49:47.105132 kernel: audit: type=1130 audit(1707439787.100:1140): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.84:22-10.0.0.1:35022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:49:47.139000 audit[2714]: USER_ACCT pid=2714 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:47.141134 sshd[2714]: Accepted publickey for core from 10.0.0.1 port 35022 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:49:47.142000 audit[2714]: CRED_ACQ pid=2714 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:47.144265 sshd[2714]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:49:47.146838 kernel: audit: type=1101 audit(1707439787.139:1141): pid=2714 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:47.146901 kernel: audit: type=1103 audit(1707439787.142:1142): pid=2714 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:47.148961 kernel: audit: type=1006 audit(1707439787.142:1143): pid=2714 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Feb 9 00:49:47.142000 audit[2714]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff05cdc330 a2=3 a3=0 items=0 ppid=1 pid=2714 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:47.149267 systemd-logind[1111]: New session 8 of user core. Feb 9 00:49:47.149626 systemd[1]: Started session-8.scope. Feb 9 00:49:47.154065 kernel: audit: type=1300 audit(1707439787.142:1143): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff05cdc330 a2=3 a3=0 items=0 ppid=1 pid=2714 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:47.154122 kernel: audit: type=1327 audit(1707439787.142:1143): proctitle=737368643A20636F7265205B707269765D Feb 9 00:49:47.142000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 00:49:47.154000 audit[2714]: USER_START pid=2714 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:47.157000 audit[2716]: CRED_ACQ pid=2716 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:47.160905 kernel: audit: type=1105 audit(1707439787.154:1144): pid=2714 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:47.160978 kernel: audit: type=1103 audit(1707439787.157:1145): pid=2716 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:47.301875 sshd[2714]: pam_unix(sshd:session): session closed for user core Feb 9 00:49:47.310601 kernel: audit: type=1106 audit(1707439787.302:1146): pid=2714 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:47.310679 kernel: audit: type=1104 audit(1707439787.302:1147): pid=2714 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:47.302000 audit[2714]: USER_END pid=2714 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:47.302000 audit[2714]: CRED_DISP pid=2714 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:47.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.84:22-10.0.0.1:35022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:49:47.304546 systemd[1]: sshd@7-10.0.0.84:22-10.0.0.1:35022.service: Deactivated successfully. Feb 9 00:49:47.305375 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 00:49:47.306003 systemd-logind[1111]: Session 8 logged out. Waiting for processes to exit. Feb 9 00:49:47.306772 systemd-logind[1111]: Removed session 8. Feb 9 00:49:48.490959 env[1127]: time="2024-02-09T00:49:48.490901488Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:48.492608 env[1127]: time="2024-02-09T00:49:48.492580633Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:48.494495 env[1127]: time="2024-02-09T00:49:48.494445007Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:48.496265 env[1127]: time="2024-02-09T00:49:48.496220833Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:49:48.496810 env[1127]: time="2024-02-09T00:49:48.496770165Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 9 00:49:48.498290 env[1127]: time="2024-02-09T00:49:48.498263342Z" level=info msg="CreateContainer within sandbox \"47f70be0595daef42e11cf3320af604821e9fb725979b29e88c932dfbd988886\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 00:49:48.511109 env[1127]: time="2024-02-09T00:49:48.511057353Z" level=info msg="CreateContainer within sandbox \"47f70be0595daef42e11cf3320af604821e9fb725979b29e88c932dfbd988886\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"0c04069c36592c14fae5870aab4cea48e564c4bc006239ff78b52d7b3c573d39\"" Feb 9 00:49:48.511547 env[1127]: time="2024-02-09T00:49:48.511490577Z" level=info msg="StartContainer for \"0c04069c36592c14fae5870aab4cea48e564c4bc006239ff78b52d7b3c573d39\"" Feb 9 00:49:48.528048 systemd[1]: Started cri-containerd-0c04069c36592c14fae5870aab4cea48e564c4bc006239ff78b52d7b3c573d39.scope. Feb 9 00:49:48.538000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:48.538000 audit[2734]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2481 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:48.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063303430363963333635393263313466616535383730616162346365 Feb 9 00:49:48.538000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:48.538000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:48.538000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:48.538000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:48.538000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:48.538000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:48.538000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:48.538000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:48.538000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:48.538000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:48.538000 audit: BPF prog-id=142 op=LOAD Feb 9 00:49:48.538000 audit[2734]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000e9dd0 items=0 ppid=2481 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:48.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063303430363963333635393263313466616535383730616162346365 Feb 9 00:49:48.538000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:48.538000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:48.538000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:48.538000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:48.538000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:48.538000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:48.538000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:48.538000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:48.538000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:48.538000 audit: BPF prog-id=143 op=LOAD Feb 9 00:49:48.538000 audit[2734]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000e9e18 items=0 ppid=2481 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:48.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063303430363963333635393263313466616535383730616162346365 Feb 9 00:49:48.538000 audit: BPF prog-id=143 op=UNLOAD Feb 9 00:49:48.538000 audit: BPF prog-id=142 op=UNLOAD Feb 9 00:49:48.538000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:48.538000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:48.538000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:48.538000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:48.538000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:48.538000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:48.538000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:48.538000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:48.538000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:48.538000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:49:48.538000 audit: BPF prog-id=144 op=LOAD Feb 9 00:49:48.538000 audit[2734]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000e9ea8 items=0 ppid=2481 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:48.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063303430363963333635393263313466616535383730616162346365 Feb 9 00:49:48.553064 env[1127]: time="2024-02-09T00:49:48.553022501Z" level=info msg="StartContainer for \"0c04069c36592c14fae5870aab4cea48e564c4bc006239ff78b52d7b3c573d39\" returns successfully" Feb 9 00:49:48.808825 kubelet[2019]: E0209 00:49:48.808716 2019 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-h9gqp" podUID=83b2cfd5-6e1c-47b1-936c-f1d68fb2b441 Feb 9 00:49:48.872555 kubelet[2019]: E0209 00:49:48.872522 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:49.714960 env[1127]: time="2024-02-09T00:49:49.714866646Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: failed to load CNI config list file /etc/cni/net.d/10-calico.conflist: error parsing configuration list: unexpected end of JSON input: invalid cni config: failed to load cni config" Feb 9 00:49:49.717330 systemd[1]: cri-containerd-0c04069c36592c14fae5870aab4cea48e564c4bc006239ff78b52d7b3c573d39.scope: Deactivated successfully. Feb 9 00:49:49.722000 audit: BPF prog-id=144 op=UNLOAD Feb 9 00:49:49.734871 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0c04069c36592c14fae5870aab4cea48e564c4bc006239ff78b52d7b3c573d39-rootfs.mount: Deactivated successfully. Feb 9 00:49:49.759417 kubelet[2019]: I0209 00:49:49.758614 2019 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 00:49:49.874397 kubelet[2019]: E0209 00:49:49.874368 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:50.123543 kubelet[2019]: I0209 00:49:50.123501 2019 topology_manager.go:212] "Topology Admit Handler" Feb 9 00:49:50.127077 kubelet[2019]: I0209 00:49:50.127047 2019 topology_manager.go:212] "Topology Admit Handler" Feb 9 00:49:50.129061 kubelet[2019]: I0209 00:49:50.128589 2019 topology_manager.go:212] "Topology Admit Handler" Feb 9 00:49:50.130630 systemd[1]: Created slice kubepods-burstable-pod96b676bf_04bb_4866_aa59_8b21202275e7.slice. Feb 9 00:49:50.134430 systemd[1]: Created slice kubepods-burstable-pod2536b126_e3ee_4a37_873f_9284c092f8da.slice. Feb 9 00:49:50.137239 systemd[1]: Created slice kubepods-besteffort-pod9649c383_e4cb_4dd0_8777_7860935dfc41.slice. Feb 9 00:49:50.322068 kubelet[2019]: I0209 00:49:50.322014 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9649c383-e4cb-4dd0-8777-7860935dfc41-tigera-ca-bundle\") pod \"calico-kube-controllers-785cff5fd-dmbq4\" (UID: \"9649c383-e4cb-4dd0-8777-7860935dfc41\") " pod="calico-system/calico-kube-controllers-785cff5fd-dmbq4" Feb 9 00:49:50.322068 kubelet[2019]: I0209 00:49:50.322066 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/2536b126-e3ee-4a37-873f-9284c092f8da-config-volume\") pod \"coredns-5d78c9869d-b874j\" (UID: \"2536b126-e3ee-4a37-873f-9284c092f8da\") " pod="kube-system/coredns-5d78c9869d-b874j" Feb 9 00:49:50.322253 kubelet[2019]: I0209 00:49:50.322089 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dwhn2\" (UniqueName: \"kubernetes.io/projected/2536b126-e3ee-4a37-873f-9284c092f8da-kube-api-access-dwhn2\") pod \"coredns-5d78c9869d-b874j\" (UID: \"2536b126-e3ee-4a37-873f-9284c092f8da\") " pod="kube-system/coredns-5d78c9869d-b874j" Feb 9 00:49:50.322253 kubelet[2019]: I0209 00:49:50.322110 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/96b676bf-04bb-4866-aa59-8b21202275e7-config-volume\") pod \"coredns-5d78c9869d-qmz9r\" (UID: \"96b676bf-04bb-4866-aa59-8b21202275e7\") " pod="kube-system/coredns-5d78c9869d-qmz9r" Feb 9 00:49:50.322253 kubelet[2019]: I0209 00:49:50.322225 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qwk9p\" (UniqueName: \"kubernetes.io/projected/96b676bf-04bb-4866-aa59-8b21202275e7-kube-api-access-qwk9p\") pod \"coredns-5d78c9869d-qmz9r\" (UID: \"96b676bf-04bb-4866-aa59-8b21202275e7\") " pod="kube-system/coredns-5d78c9869d-qmz9r" Feb 9 00:49:50.322378 kubelet[2019]: I0209 00:49:50.322339 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mcbpb\" (UniqueName: \"kubernetes.io/projected/9649c383-e4cb-4dd0-8777-7860935dfc41-kube-api-access-mcbpb\") pod \"calico-kube-controllers-785cff5fd-dmbq4\" (UID: \"9649c383-e4cb-4dd0-8777-7860935dfc41\") " pod="calico-system/calico-kube-controllers-785cff5fd-dmbq4" Feb 9 00:49:50.401179 env[1127]: time="2024-02-09T00:49:50.401048505Z" level=info msg="shim disconnected" id=0c04069c36592c14fae5870aab4cea48e564c4bc006239ff78b52d7b3c573d39 Feb 9 00:49:50.401179 env[1127]: time="2024-02-09T00:49:50.401114378Z" level=warning msg="cleaning up after shim disconnected" id=0c04069c36592c14fae5870aab4cea48e564c4bc006239ff78b52d7b3c573d39 namespace=k8s.io Feb 9 00:49:50.401179 env[1127]: time="2024-02-09T00:49:50.401127152Z" level=info msg="cleaning up dead shim" Feb 9 00:49:50.408720 env[1127]: time="2024-02-09T00:49:50.408688447Z" level=warning msg="cleanup warnings time=\"2024-02-09T00:49:50Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2782 runtime=io.containerd.runc.v2\n" Feb 9 00:49:50.733630 kubelet[2019]: E0209 00:49:50.733509 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:50.734452 env[1127]: time="2024-02-09T00:49:50.734094964Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-qmz9r,Uid:96b676bf-04bb-4866-aa59-8b21202275e7,Namespace:kube-system,Attempt:0,}" Feb 9 00:49:50.736638 kubelet[2019]: E0209 00:49:50.736588 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:50.737109 env[1127]: time="2024-02-09T00:49:50.737065124Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-b874j,Uid:2536b126-e3ee-4a37-873f-9284c092f8da,Namespace:kube-system,Attempt:0,}" Feb 9 00:49:50.739090 env[1127]: time="2024-02-09T00:49:50.739048590Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-785cff5fd-dmbq4,Uid:9649c383-e4cb-4dd0-8777-7860935dfc41,Namespace:calico-system,Attempt:0,}" Feb 9 00:49:50.810251 env[1127]: time="2024-02-09T00:49:50.808428298Z" level=error msg="Failed to destroy network for sandbox \"c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:49:50.811803 env[1127]: time="2024-02-09T00:49:50.811764145Z" level=error msg="encountered an error cleaning up failed sandbox \"c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:49:50.811975 env[1127]: time="2024-02-09T00:49:50.811926360Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-qmz9r,Uid:96b676bf-04bb-4866-aa59-8b21202275e7,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:49:50.813439 kubelet[2019]: E0209 00:49:50.812185 2019 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:49:50.813439 kubelet[2019]: E0209 00:49:50.812232 2019 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-qmz9r" Feb 9 00:49:50.813439 kubelet[2019]: E0209 00:49:50.812257 2019 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-qmz9r" Feb 9 00:49:50.813057 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954-shm.mount: Deactivated successfully. Feb 9 00:49:50.813794 kubelet[2019]: E0209 00:49:50.812309 2019 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-qmz9r_kube-system(96b676bf-04bb-4866-aa59-8b21202275e7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-qmz9r_kube-system(96b676bf-04bb-4866-aa59-8b21202275e7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-qmz9r" podUID=96b676bf-04bb-4866-aa59-8b21202275e7 Feb 9 00:49:50.815813 env[1127]: time="2024-02-09T00:49:50.815680742Z" level=error msg="Failed to destroy network for sandbox \"24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:49:50.816514 env[1127]: time="2024-02-09T00:49:50.816037323Z" level=error msg="encountered an error cleaning up failed sandbox \"24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:49:50.816514 env[1127]: time="2024-02-09T00:49:50.816096133Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-b874j,Uid:2536b126-e3ee-4a37-873f-9284c092f8da,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:49:50.816617 kubelet[2019]: E0209 00:49:50.816245 2019 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:49:50.816617 kubelet[2019]: E0209 00:49:50.816280 2019 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-b874j" Feb 9 00:49:50.816617 kubelet[2019]: E0209 00:49:50.816303 2019 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-b874j" Feb 9 00:49:50.816719 kubelet[2019]: E0209 00:49:50.816353 2019 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-b874j_kube-system(2536b126-e3ee-4a37-873f-9284c092f8da)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-b874j_kube-system(2536b126-e3ee-4a37-873f-9284c092f8da)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-b874j" podUID=2536b126-e3ee-4a37-873f-9284c092f8da Feb 9 00:49:50.818302 systemd[1]: Created slice kubepods-besteffort-pod83b2cfd5_6e1c_47b1_936c_f1d68fb2b441.slice. Feb 9 00:49:50.820421 env[1127]: time="2024-02-09T00:49:50.820380652Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-h9gqp,Uid:83b2cfd5-6e1c-47b1-936c-f1d68fb2b441,Namespace:calico-system,Attempt:0,}" Feb 9 00:49:50.828716 env[1127]: time="2024-02-09T00:49:50.828666739Z" level=error msg="Failed to destroy network for sandbox \"f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:49:50.829032 env[1127]: time="2024-02-09T00:49:50.828994014Z" level=error msg="encountered an error cleaning up failed sandbox \"f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:49:50.829089 env[1127]: time="2024-02-09T00:49:50.829053836Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-785cff5fd-dmbq4,Uid:9649c383-e4cb-4dd0-8777-7860935dfc41,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:49:50.829299 kubelet[2019]: E0209 00:49:50.829271 2019 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:49:50.829442 kubelet[2019]: E0209 00:49:50.829317 2019 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-785cff5fd-dmbq4" Feb 9 00:49:50.829442 kubelet[2019]: E0209 00:49:50.829341 2019 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-785cff5fd-dmbq4" Feb 9 00:49:50.829442 kubelet[2019]: E0209 00:49:50.829405 2019 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-785cff5fd-dmbq4_calico-system(9649c383-e4cb-4dd0-8777-7860935dfc41)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-785cff5fd-dmbq4_calico-system(9649c383-e4cb-4dd0-8777-7860935dfc41)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-785cff5fd-dmbq4" podUID=9649c383-e4cb-4dd0-8777-7860935dfc41 Feb 9 00:49:50.872785 env[1127]: time="2024-02-09T00:49:50.872719357Z" level=error msg="Failed to destroy network for sandbox \"7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:49:50.873139 env[1127]: time="2024-02-09T00:49:50.873101305Z" level=error msg="encountered an error cleaning up failed sandbox \"7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:49:50.873203 env[1127]: time="2024-02-09T00:49:50.873146339Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-h9gqp,Uid:83b2cfd5-6e1c-47b1-936c-f1d68fb2b441,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:49:50.873456 kubelet[2019]: E0209 00:49:50.873429 2019 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:49:50.873544 kubelet[2019]: E0209 00:49:50.873494 2019 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-h9gqp" Feb 9 00:49:50.873544 kubelet[2019]: E0209 00:49:50.873519 2019 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-h9gqp" Feb 9 00:49:50.873624 kubelet[2019]: E0209 00:49:50.873580 2019 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-h9gqp_calico-system(83b2cfd5-6e1c-47b1-936c-f1d68fb2b441)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-h9gqp_calico-system(83b2cfd5-6e1c-47b1-936c-f1d68fb2b441)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-h9gqp" podUID=83b2cfd5-6e1c-47b1-936c-f1d68fb2b441 Feb 9 00:49:50.876702 kubelet[2019]: I0209 00:49:50.876669 2019 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" Feb 9 00:49:50.877354 env[1127]: time="2024-02-09T00:49:50.877303479Z" level=info msg="StopPodSandbox for \"7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4\"" Feb 9 00:49:50.879395 kubelet[2019]: E0209 00:49:50.879361 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:49:50.879901 kubelet[2019]: I0209 00:49:50.879879 2019 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" Feb 9 00:49:50.880331 env[1127]: time="2024-02-09T00:49:50.880290721Z" level=info msg="StopPodSandbox for \"c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954\"" Feb 9 00:49:50.880806 env[1127]: time="2024-02-09T00:49:50.880762106Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 00:49:50.886802 kubelet[2019]: I0209 00:49:50.886438 2019 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" Feb 9 00:49:50.887156 env[1127]: time="2024-02-09T00:49:50.887110403Z" level=info msg="StopPodSandbox for \"24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873\"" Feb 9 00:49:50.890553 kubelet[2019]: I0209 00:49:50.890519 2019 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" Feb 9 00:49:50.891358 env[1127]: time="2024-02-09T00:49:50.891308038Z" level=info msg="StopPodSandbox for \"f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954\"" Feb 9 00:49:50.920529 env[1127]: time="2024-02-09T00:49:50.920455365Z" level=error msg="StopPodSandbox for \"7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4\" failed" error="failed to destroy network for sandbox \"7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:49:50.921244 kubelet[2019]: E0209 00:49:50.921039 2019 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" Feb 9 00:49:50.921244 kubelet[2019]: E0209 00:49:50.921104 2019 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4} Feb 9 00:49:50.921244 kubelet[2019]: E0209 00:49:50.921163 2019 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"83b2cfd5-6e1c-47b1-936c-f1d68fb2b441\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 00:49:50.921244 kubelet[2019]: E0209 00:49:50.921201 2019 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"83b2cfd5-6e1c-47b1-936c-f1d68fb2b441\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-h9gqp" podUID=83b2cfd5-6e1c-47b1-936c-f1d68fb2b441 Feb 9 00:49:50.923778 env[1127]: time="2024-02-09T00:49:50.923700231Z" level=error msg="StopPodSandbox for \"24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873\" failed" error="failed to destroy network for sandbox \"24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:49:50.924218 kubelet[2019]: E0209 00:49:50.924060 2019 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" Feb 9 00:49:50.924218 kubelet[2019]: E0209 00:49:50.924112 2019 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873} Feb 9 00:49:50.924218 kubelet[2019]: E0209 00:49:50.924157 2019 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2536b126-e3ee-4a37-873f-9284c092f8da\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 00:49:50.924218 kubelet[2019]: E0209 00:49:50.924196 2019 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2536b126-e3ee-4a37-873f-9284c092f8da\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-b874j" podUID=2536b126-e3ee-4a37-873f-9284c092f8da Feb 9 00:49:50.933482 env[1127]: time="2024-02-09T00:49:50.933419720Z" level=error msg="StopPodSandbox for \"c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954\" failed" error="failed to destroy network for sandbox \"c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:49:50.933666 kubelet[2019]: E0209 00:49:50.933655 2019 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" Feb 9 00:49:50.933724 kubelet[2019]: E0209 00:49:50.933688 2019 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954} Feb 9 00:49:50.933724 kubelet[2019]: E0209 00:49:50.933718 2019 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"96b676bf-04bb-4866-aa59-8b21202275e7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 00:49:50.933832 kubelet[2019]: E0209 00:49:50.933742 2019 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"96b676bf-04bb-4866-aa59-8b21202275e7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-qmz9r" podUID=96b676bf-04bb-4866-aa59-8b21202275e7 Feb 9 00:49:50.934040 env[1127]: time="2024-02-09T00:49:50.933980073Z" level=error msg="StopPodSandbox for \"f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954\" failed" error="failed to destroy network for sandbox \"f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:49:50.934185 kubelet[2019]: E0209 00:49:50.934168 2019 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" Feb 9 00:49:50.934185 kubelet[2019]: E0209 00:49:50.934188 2019 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954} Feb 9 00:49:50.934284 kubelet[2019]: E0209 00:49:50.934217 2019 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9649c383-e4cb-4dd0-8777-7860935dfc41\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 00:49:50.934284 kubelet[2019]: E0209 00:49:50.934239 2019 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9649c383-e4cb-4dd0-8777-7860935dfc41\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-785cff5fd-dmbq4" podUID=9649c383-e4cb-4dd0-8777-7860935dfc41 Feb 9 00:49:51.752104 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954-shm.mount: Deactivated successfully. Feb 9 00:49:51.752198 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873-shm.mount: Deactivated successfully. Feb 9 00:49:52.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.84:22-10.0.0.1:35038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:49:52.305825 systemd[1]: Started sshd@8-10.0.0.84:22-10.0.0.1:35038.service. Feb 9 00:49:52.310126 kernel: kauditd_printk_skb: 45 callbacks suppressed Feb 9 00:49:52.310311 kernel: audit: type=1130 audit(1707439792.305:1156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.84:22-10.0.0.1:35038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:49:52.355981 kernel: audit: type=1101 audit(1707439792.342:1157): pid=3046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:52.356083 kernel: audit: type=1103 audit(1707439792.345:1158): pid=3046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:52.356107 kernel: audit: type=1006 audit(1707439792.345:1159): pid=3046 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Feb 9 00:49:52.356121 kernel: audit: type=1300 audit(1707439792.345:1159): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc32a9b8c0 a2=3 a3=0 items=0 ppid=1 pid=3046 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:52.356170 kernel: audit: type=1327 audit(1707439792.345:1159): proctitle=737368643A20636F7265205B707269765D Feb 9 00:49:52.342000 audit[3046]: USER_ACCT pid=3046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:52.345000 audit[3046]: CRED_ACQ pid=3046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:52.345000 audit[3046]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc32a9b8c0 a2=3 a3=0 items=0 ppid=1 pid=3046 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:52.345000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 00:49:52.347346 sshd[3046]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:49:52.356561 sshd[3046]: Accepted publickey for core from 10.0.0.1 port 35038 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:49:52.359786 systemd[1]: Started session-9.scope. Feb 9 00:49:52.361674 systemd-logind[1111]: New session 9 of user core. Feb 9 00:49:52.366000 audit[3046]: USER_START pid=3046 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:52.367000 audit[3048]: CRED_ACQ pid=3048 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:52.373876 kernel: audit: type=1105 audit(1707439792.366:1160): pid=3046 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:52.373921 kernel: audit: type=1103 audit(1707439792.367:1161): pid=3048 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:52.473253 sshd[3046]: pam_unix(sshd:session): session closed for user core Feb 9 00:49:52.473000 audit[3046]: USER_END pid=3046 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:52.475123 systemd[1]: sshd@8-10.0.0.84:22-10.0.0.1:35038.service: Deactivated successfully. Feb 9 00:49:52.475725 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 00:49:52.476318 systemd-logind[1111]: Session 9 logged out. Waiting for processes to exit. Feb 9 00:49:52.476977 systemd-logind[1111]: Removed session 9. Feb 9 00:49:52.473000 audit[3046]: CRED_DISP pid=3046 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:52.479577 kernel: audit: type=1106 audit(1707439792.473:1162): pid=3046 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:52.479637 kernel: audit: type=1104 audit(1707439792.473:1163): pid=3046 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:52.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.84:22-10.0.0.1:35038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:49:57.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.84:22-10.0.0.1:41022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:49:57.477887 systemd[1]: Started sshd@9-10.0.0.84:22-10.0.0.1:41022.service. Feb 9 00:49:57.483777 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 00:49:57.483846 kernel: audit: type=1130 audit(1707439797.477:1165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.84:22-10.0.0.1:41022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:49:57.516000 audit[3064]: USER_ACCT pid=3064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:57.517507 sshd[3064]: Accepted publickey for core from 10.0.0.1 port 41022 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:49:57.521208 kernel: audit: type=1101 audit(1707439797.516:1166): pid=3064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:57.521275 kernel: audit: type=1103 audit(1707439797.520:1167): pid=3064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:57.520000 audit[3064]: CRED_ACQ pid=3064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:57.521413 sshd[3064]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:49:57.530619 kernel: audit: type=1006 audit(1707439797.520:1168): pid=3064 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 9 00:49:57.530702 kernel: audit: type=1300 audit(1707439797.520:1168): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd11e51370 a2=3 a3=0 items=0 ppid=1 pid=3064 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:57.530731 kernel: audit: type=1327 audit(1707439797.520:1168): proctitle=737368643A20636F7265205B707269765D Feb 9 00:49:57.520000 audit[3064]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd11e51370 a2=3 a3=0 items=0 ppid=1 pid=3064 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:49:57.520000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 00:49:57.533811 systemd-logind[1111]: New session 10 of user core. Feb 9 00:49:57.534552 systemd[1]: Started session-10.scope. Feb 9 00:49:57.537000 audit[3064]: USER_START pid=3064 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:57.539000 audit[3066]: CRED_ACQ pid=3066 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:57.545521 kernel: audit: type=1105 audit(1707439797.537:1169): pid=3064 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:57.545602 kernel: audit: type=1103 audit(1707439797.539:1170): pid=3066 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:57.645083 sshd[3064]: pam_unix(sshd:session): session closed for user core Feb 9 00:49:57.652727 kernel: audit: type=1106 audit(1707439797.645:1171): pid=3064 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:57.652827 kernel: audit: type=1104 audit(1707439797.645:1172): pid=3064 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:57.645000 audit[3064]: USER_END pid=3064 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:57.645000 audit[3064]: CRED_DISP pid=3064 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:49:57.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.84:22-10.0.0.1:41022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:49:57.647356 systemd[1]: sshd@9-10.0.0.84:22-10.0.0.1:41022.service: Deactivated successfully. Feb 9 00:49:57.647980 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 00:49:57.653829 systemd-logind[1111]: Session 10 logged out. Waiting for processes to exit. Feb 9 00:49:57.654515 systemd-logind[1111]: Removed session 10. Feb 9 00:50:00.305255 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3858180758.mount: Deactivated successfully. Feb 9 00:50:01.612299 env[1127]: time="2024-02-09T00:50:01.612245014Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:50:01.613794 env[1127]: time="2024-02-09T00:50:01.613747764Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:50:01.615016 env[1127]: time="2024-02-09T00:50:01.614987441Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:50:01.616295 env[1127]: time="2024-02-09T00:50:01.616276531Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:50:01.616703 env[1127]: time="2024-02-09T00:50:01.616671030Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 9 00:50:01.626409 env[1127]: time="2024-02-09T00:50:01.626374242Z" level=info msg="CreateContainer within sandbox \"47f70be0595daef42e11cf3320af604821e9fb725979b29e88c932dfbd988886\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 00:50:01.639714 env[1127]: time="2024-02-09T00:50:01.639656028Z" level=info msg="CreateContainer within sandbox \"47f70be0595daef42e11cf3320af604821e9fb725979b29e88c932dfbd988886\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"921de37ca3feba8736af888d78fd2804923a3324e7239cc11e8f146d334b826a\"" Feb 9 00:50:01.640215 env[1127]: time="2024-02-09T00:50:01.640191533Z" level=info msg="StartContainer for \"921de37ca3feba8736af888d78fd2804923a3324e7239cc11e8f146d334b826a\"" Feb 9 00:50:01.653311 systemd[1]: Started cri-containerd-921de37ca3feba8736af888d78fd2804923a3324e7239cc11e8f146d334b826a.scope. Feb 9 00:50:01.669000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:01.669000 audit[3089]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2481 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:01.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932316465333763613366656261383733366166383838643738666432 Feb 9 00:50:01.669000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:01.669000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:01.669000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:01.669000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:01.669000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:01.669000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:01.669000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:01.669000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:01.669000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:01.669000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:01.669000 audit: BPF prog-id=145 op=LOAD Feb 9 00:50:01.669000 audit[3089]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003d4070 items=0 ppid=2481 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:01.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932316465333763613366656261383733366166383838643738666432 Feb 9 00:50:01.669000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:01.669000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:01.669000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:01.669000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:01.669000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:01.669000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:01.669000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:01.669000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:01.669000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:01.669000 audit: BPF prog-id=146 op=LOAD Feb 9 00:50:01.669000 audit[3089]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003d40b8 items=0 ppid=2481 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:01.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932316465333763613366656261383733366166383838643738666432 Feb 9 00:50:01.669000 audit: BPF prog-id=146 op=UNLOAD Feb 9 00:50:01.669000 audit: BPF prog-id=145 op=UNLOAD Feb 9 00:50:01.669000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:01.669000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:01.669000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:01.669000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:01.669000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:01.669000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:01.669000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:01.669000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:01.669000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:01.669000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:01.669000 audit: BPF prog-id=147 op=LOAD Feb 9 00:50:01.669000 audit[3089]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003d4148 items=0 ppid=2481 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:01.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932316465333763613366656261383733366166383838643738666432 Feb 9 00:50:01.684263 env[1127]: time="2024-02-09T00:50:01.684219705Z" level=info msg="StartContainer for \"921de37ca3feba8736af888d78fd2804923a3324e7239cc11e8f146d334b826a\" returns successfully" Feb 9 00:50:01.744424 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 00:50:01.744584 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 00:50:01.912370 kubelet[2019]: E0209 00:50:01.912269 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:50:02.649447 systemd[1]: Started sshd@10-10.0.0.84:22-10.0.0.1:41036.service. Feb 9 00:50:02.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.84:22-10.0.0.1:41036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:02.650488 kernel: kauditd_printk_skb: 44 callbacks suppressed Feb 9 00:50:02.650587 kernel: audit: type=1130 audit(1707439802.648:1180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.84:22-10.0.0.1:41036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:02.685000 audit[3171]: USER_ACCT pid=3171 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:02.686533 sshd[3171]: Accepted publickey for core from 10.0.0.1 port 41036 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:50:02.688455 sshd[3171]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:50:02.687000 audit[3171]: CRED_ACQ pid=3171 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:02.691965 systemd-logind[1111]: New session 11 of user core. Feb 9 00:50:02.692567 kernel: audit: type=1101 audit(1707439802.685:1181): pid=3171 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:02.692597 kernel: audit: type=1103 audit(1707439802.687:1182): pid=3171 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:02.692616 kernel: audit: type=1006 audit(1707439802.687:1183): pid=3171 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 9 00:50:02.692995 systemd[1]: Started session-11.scope. Feb 9 00:50:02.687000 audit[3171]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe877e4b60 a2=3 a3=0 items=0 ppid=1 pid=3171 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:02.697841 kernel: audit: type=1300 audit(1707439802.687:1183): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe877e4b60 a2=3 a3=0 items=0 ppid=1 pid=3171 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:02.697897 kernel: audit: type=1327 audit(1707439802.687:1183): proctitle=737368643A20636F7265205B707269765D Feb 9 00:50:02.687000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 00:50:02.695000 audit[3171]: USER_START pid=3171 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:02.701879 kernel: audit: type=1105 audit(1707439802.695:1184): pid=3171 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:02.701955 kernel: audit: type=1103 audit(1707439802.696:1185): pid=3173 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:02.696000 audit[3173]: CRED_ACQ pid=3173 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:02.797020 sshd[3171]: pam_unix(sshd:session): session closed for user core Feb 9 00:50:02.797000 audit[3171]: USER_END pid=3171 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:02.797000 audit[3171]: CRED_DISP pid=3171 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:02.799375 systemd[1]: sshd@10-10.0.0.84:22-10.0.0.1:41036.service: Deactivated successfully. Feb 9 00:50:02.800206 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 00:50:02.800719 systemd-logind[1111]: Session 11 logged out. Waiting for processes to exit. Feb 9 00:50:02.801353 systemd-logind[1111]: Removed session 11. Feb 9 00:50:02.803551 kernel: audit: type=1106 audit(1707439802.797:1186): pid=3171 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:02.803605 kernel: audit: type=1104 audit(1707439802.797:1187): pid=3171 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:02.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.84:22-10.0.0.1:41036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:02.914176 kubelet[2019]: E0209 00:50:02.914074 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:50:03.498000 audit[3271]: AVC avc: denied { write } for pid=3271 comm="tee" name="fd" dev="proc" ino=23409 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 00:50:03.498000 audit[3271]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcb7e0f993 a2=241 a3=1b6 items=1 ppid=3222 pid=3271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:03.498000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 00:50:03.498000 audit: PATH item=0 name="/dev/fd/63" inode=24995 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:50:03.498000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 00:50:03.500000 audit[3262]: AVC avc: denied { write } for pid=3262 comm="tee" name="fd" dev="proc" ino=23413 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 00:50:03.500000 audit[3262]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffce0ca8983 a2=241 a3=1b6 items=1 ppid=3217 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:03.500000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 00:50:03.500000 audit: PATH item=0 name="/dev/fd/63" inode=24992 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:50:03.500000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 00:50:03.504000 audit[3273]: AVC avc: denied { write } for pid=3273 comm="tee" name="fd" dev="proc" ino=23421 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 00:50:03.504000 audit[3273]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff67198994 a2=241 a3=1b6 items=1 ppid=3223 pid=3273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:03.504000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 00:50:03.504000 audit: PATH item=0 name="/dev/fd/63" inode=25601 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:50:03.504000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 00:50:03.507000 audit[3283]: AVC avc: denied { write } for pid=3283 comm="tee" name="fd" dev="proc" ino=23425 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 00:50:03.507000 audit[3283]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcb1be9995 a2=241 a3=1b6 items=1 ppid=3216 pid=3283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:03.507000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 00:50:03.507000 audit: PATH item=0 name="/dev/fd/63" inode=23417 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:50:03.507000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 00:50:03.508000 audit[3285]: AVC avc: denied { write } for pid=3285 comm="tee" name="fd" dev="proc" ino=23429 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 00:50:03.508000 audit[3285]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcb7a0f993 a2=241 a3=1b6 items=1 ppid=3218 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:03.508000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 00:50:03.508000 audit: PATH item=0 name="/dev/fd/63" inode=23418 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:50:03.508000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 00:50:03.522000 audit[3294]: AVC avc: denied { write } for pid=3294 comm="tee" name="fd" dev="proc" ino=25612 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 00:50:03.522000 audit[3294]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffeaf8a993 a2=241 a3=1b6 items=1 ppid=3225 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:03.522000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 00:50:03.522000 audit: PATH item=0 name="/dev/fd/63" inode=23435 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:50:03.522000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 00:50:03.535000 audit[3296]: AVC avc: denied { write } for pid=3296 comm="tee" name="fd" dev="proc" ino=25009 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 00:50:03.535000 audit[3296]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd65687984 a2=241 a3=1b6 items=1 ppid=3232 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:03.535000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 00:50:03.535000 audit: PATH item=0 name="/dev/fd/63" inode=25609 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:50:03.535000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 00:50:03.737000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.737000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.737000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.737000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.737000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.737000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.737000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.737000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.737000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.737000 audit: BPF prog-id=148 op=LOAD Feb 9 00:50:03.737000 audit[3363]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcbc846380 a2=70 a3=7fce610e7000 items=0 ppid=3228 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:03.737000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 00:50:03.738000 audit: BPF prog-id=148 op=UNLOAD Feb 9 00:50:03.738000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.738000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.738000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.738000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.738000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.738000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.738000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.738000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.738000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.738000 audit: BPF prog-id=149 op=LOAD Feb 9 00:50:03.738000 audit[3363]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcbc846380 a2=70 a3=6e items=0 ppid=3228 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:03.738000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 00:50:03.738000 audit: BPF prog-id=149 op=UNLOAD Feb 9 00:50:03.738000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.738000 audit[3363]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcbc846330 a2=70 a3=7ffcbc846380 items=0 ppid=3228 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:03.738000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 00:50:03.738000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.738000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.738000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.738000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.738000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.738000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.738000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.738000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.738000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.738000 audit: BPF prog-id=150 op=LOAD Feb 9 00:50:03.738000 audit[3363]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffcbc846310 a2=70 a3=7ffcbc846380 items=0 ppid=3228 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:03.738000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 00:50:03.738000 audit: BPF prog-id=150 op=UNLOAD Feb 9 00:50:03.738000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.738000 audit[3363]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbc8463f0 a2=70 a3=0 items=0 ppid=3228 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:03.738000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 00:50:03.738000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.738000 audit[3363]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbc8463e0 a2=70 a3=0 items=0 ppid=3228 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:03.738000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 00:50:03.738000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.738000 audit[3363]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffcbc846420 a2=70 a3=0 items=0 ppid=3228 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:03.738000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 00:50:03.739000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.739000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.739000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.739000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.739000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.739000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.739000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.739000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.739000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.739000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.739000 audit: BPF prog-id=151 op=LOAD Feb 9 00:50:03.739000 audit[3363]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffcbc846340 a2=70 a3=ffffffff items=0 ppid=3228 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:03.739000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 00:50:03.742000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.742000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe543269b0 a2=70 a3=208 items=0 ppid=3228 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:03.742000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 00:50:03.742000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:03.742000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe54326880 a2=70 a3=3 items=0 ppid=3228 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:03.742000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 00:50:03.754000 audit: BPF prog-id=151 op=UNLOAD Feb 9 00:50:03.787000 audit[3395]: NETFILTER_CFG table=mangle:97 family=2 entries=19 op=nft_register_chain pid=3395 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 00:50:03.788000 audit[3394]: NETFILTER_CFG table=nat:98 family=2 entries=16 op=nft_register_chain pid=3394 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 00:50:03.788000 audit[3394]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffd90da6ef0 a2=0 a3=5643140b9000 items=0 ppid=3228 pid=3394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:03.788000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 00:50:03.788000 audit[3393]: NETFILTER_CFG table=raw:99 family=2 entries=19 op=nft_register_chain pid=3393 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 00:50:03.788000 audit[3393]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffe9260b3c0 a2=0 a3=560fa370d000 items=0 ppid=3228 pid=3393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:03.788000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 00:50:03.787000 audit[3395]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7fff33e014e0 a2=0 a3=7fff33e014cc items=0 ppid=3228 pid=3395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:03.787000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 00:50:03.791000 audit[3399]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=3399 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 00:50:03.791000 audit[3399]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7fff3e400870 a2=0 a3=55c4d2de2000 items=0 ppid=3228 pid=3399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:03.791000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 00:50:03.809668 env[1127]: time="2024-02-09T00:50:03.809627916Z" level=info msg="StopPodSandbox for \"7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4\"" Feb 9 00:50:03.810035 env[1127]: time="2024-02-09T00:50:03.809688610Z" level=info msg="StopPodSandbox for \"c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954\"" Feb 9 00:50:03.810035 env[1127]: time="2024-02-09T00:50:03.809627926Z" level=info msg="StopPodSandbox for \"f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954\"" Feb 9 00:50:04.116475 kubelet[2019]: I0209 00:50:04.115754 2019 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-h8sch" podStartSLOduration=3.182955696 podCreationTimestamp="2024-02-09 00:49:35 +0000 UTC" firstStartedPulling="2024-02-09 00:49:35.684136811 +0000 UTC m=+20.965773900" lastFinishedPulling="2024-02-09 00:50:01.61689442 +0000 UTC m=+46.898531479" observedRunningTime="2024-02-09 00:50:02.091319142 +0000 UTC m=+47.372956201" watchObservedRunningTime="2024-02-09 00:50:04.115713275 +0000 UTC m=+49.397350344" Feb 9 00:50:04.413543 env[1127]: 2024-02-09 00:50:04.114 [INFO][3448] k8s.go 578: Cleaning up netns ContainerID="7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" Feb 9 00:50:04.413543 env[1127]: 2024-02-09 00:50:04.115 [INFO][3448] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" iface="eth0" netns="/var/run/netns/cni-5ef3838f-78fa-dcc3-2e44-0afe46812840" Feb 9 00:50:04.413543 env[1127]: 2024-02-09 00:50:04.116 [INFO][3448] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" iface="eth0" netns="/var/run/netns/cni-5ef3838f-78fa-dcc3-2e44-0afe46812840" Feb 9 00:50:04.413543 env[1127]: 2024-02-09 00:50:04.116 [INFO][3448] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" iface="eth0" netns="/var/run/netns/cni-5ef3838f-78fa-dcc3-2e44-0afe46812840" Feb 9 00:50:04.413543 env[1127]: 2024-02-09 00:50:04.116 [INFO][3448] k8s.go 585: Releasing IP address(es) ContainerID="7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" Feb 9 00:50:04.413543 env[1127]: 2024-02-09 00:50:04.116 [INFO][3448] utils.go 188: Calico CNI releasing IP address ContainerID="7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" Feb 9 00:50:04.413543 env[1127]: 2024-02-09 00:50:04.150 [INFO][3475] ipam_plugin.go 415: Releasing address using handleID ContainerID="7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" HandleID="k8s-pod-network.7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" Workload="localhost-k8s-csi--node--driver--h9gqp-eth0" Feb 9 00:50:04.413543 env[1127]: 2024-02-09 00:50:04.150 [INFO][3475] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:50:04.413543 env[1127]: 2024-02-09 00:50:04.151 [INFO][3475] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:50:04.413543 env[1127]: 2024-02-09 00:50:04.408 [WARNING][3475] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" HandleID="k8s-pod-network.7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" Workload="localhost-k8s-csi--node--driver--h9gqp-eth0" Feb 9 00:50:04.413543 env[1127]: 2024-02-09 00:50:04.408 [INFO][3475] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" HandleID="k8s-pod-network.7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" Workload="localhost-k8s-csi--node--driver--h9gqp-eth0" Feb 9 00:50:04.413543 env[1127]: 2024-02-09 00:50:04.409 [INFO][3475] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:50:04.413543 env[1127]: 2024-02-09 00:50:04.410 [INFO][3448] k8s.go 591: Teardown processing complete. ContainerID="7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" Feb 9 00:50:04.413372 systemd[1]: run-netns-cni\x2d5ef3838f\x2d78fa\x2ddcc3\x2d2e44\x2d0afe46812840.mount: Deactivated successfully. Feb 9 00:50:04.414224 env[1127]: time="2024-02-09T00:50:04.414010581Z" level=info msg="TearDown network for sandbox \"7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4\" successfully" Feb 9 00:50:04.414224 env[1127]: time="2024-02-09T00:50:04.414068469Z" level=info msg="StopPodSandbox for \"7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4\" returns successfully" Feb 9 00:50:04.415188 env[1127]: time="2024-02-09T00:50:04.415142685Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-h9gqp,Uid:83b2cfd5-6e1c-47b1-936c-f1d68fb2b441,Namespace:calico-system,Attempt:1,}" Feb 9 00:50:04.420202 env[1127]: 2024-02-09 00:50:04.114 [INFO][3449] k8s.go 578: Cleaning up netns ContainerID="c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" Feb 9 00:50:04.420202 env[1127]: 2024-02-09 00:50:04.116 [INFO][3449] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" iface="eth0" netns="/var/run/netns/cni-5671aaf1-f098-3cca-ea08-67c8c30cc9f7" Feb 9 00:50:04.420202 env[1127]: 2024-02-09 00:50:04.117 [INFO][3449] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" iface="eth0" netns="/var/run/netns/cni-5671aaf1-f098-3cca-ea08-67c8c30cc9f7" Feb 9 00:50:04.420202 env[1127]: 2024-02-09 00:50:04.117 [INFO][3449] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" iface="eth0" netns="/var/run/netns/cni-5671aaf1-f098-3cca-ea08-67c8c30cc9f7" Feb 9 00:50:04.420202 env[1127]: 2024-02-09 00:50:04.117 [INFO][3449] k8s.go 585: Releasing IP address(es) ContainerID="c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" Feb 9 00:50:04.420202 env[1127]: 2024-02-09 00:50:04.117 [INFO][3449] utils.go 188: Calico CNI releasing IP address ContainerID="c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" Feb 9 00:50:04.420202 env[1127]: 2024-02-09 00:50:04.151 [INFO][3476] ipam_plugin.go 415: Releasing address using handleID ContainerID="c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" HandleID="k8s-pod-network.c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" Workload="localhost-k8s-coredns--5d78c9869d--qmz9r-eth0" Feb 9 00:50:04.420202 env[1127]: 2024-02-09 00:50:04.151 [INFO][3476] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:50:04.420202 env[1127]: 2024-02-09 00:50:04.409 [INFO][3476] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:50:04.420202 env[1127]: 2024-02-09 00:50:04.415 [WARNING][3476] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" HandleID="k8s-pod-network.c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" Workload="localhost-k8s-coredns--5d78c9869d--qmz9r-eth0" Feb 9 00:50:04.420202 env[1127]: 2024-02-09 00:50:04.415 [INFO][3476] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" HandleID="k8s-pod-network.c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" Workload="localhost-k8s-coredns--5d78c9869d--qmz9r-eth0" Feb 9 00:50:04.420202 env[1127]: 2024-02-09 00:50:04.416 [INFO][3476] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:50:04.420202 env[1127]: 2024-02-09 00:50:04.418 [INFO][3449] k8s.go 591: Teardown processing complete. ContainerID="c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" Feb 9 00:50:04.420202 env[1127]: time="2024-02-09T00:50:04.419605970Z" level=info msg="TearDown network for sandbox \"c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954\" successfully" Feb 9 00:50:04.420202 env[1127]: time="2024-02-09T00:50:04.419644362Z" level=info msg="StopPodSandbox for \"c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954\" returns successfully" Feb 9 00:50:04.420713 kubelet[2019]: E0209 00:50:04.419930 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:50:04.421082 systemd[1]: run-netns-cni\x2d5671aaf1\x2df098\x2d3cca\x2dea08\x2d67c8c30cc9f7.mount: Deactivated successfully. Feb 9 00:50:04.421418 env[1127]: time="2024-02-09T00:50:04.421387783Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-qmz9r,Uid:96b676bf-04bb-4866-aa59-8b21202275e7,Namespace:kube-system,Attempt:1,}" Feb 9 00:50:04.453599 env[1127]: 2024-02-09 00:50:04.114 [INFO][3454] k8s.go 578: Cleaning up netns ContainerID="f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" Feb 9 00:50:04.453599 env[1127]: 2024-02-09 00:50:04.114 [INFO][3454] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" iface="eth0" netns="/var/run/netns/cni-cff2a79f-b45f-359a-b9ef-4332a9eca177" Feb 9 00:50:04.453599 env[1127]: 2024-02-09 00:50:04.114 [INFO][3454] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" iface="eth0" netns="/var/run/netns/cni-cff2a79f-b45f-359a-b9ef-4332a9eca177" Feb 9 00:50:04.453599 env[1127]: 2024-02-09 00:50:04.115 [INFO][3454] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" iface="eth0" netns="/var/run/netns/cni-cff2a79f-b45f-359a-b9ef-4332a9eca177" Feb 9 00:50:04.453599 env[1127]: 2024-02-09 00:50:04.115 [INFO][3454] k8s.go 585: Releasing IP address(es) ContainerID="f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" Feb 9 00:50:04.453599 env[1127]: 2024-02-09 00:50:04.115 [INFO][3454] utils.go 188: Calico CNI releasing IP address ContainerID="f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" Feb 9 00:50:04.453599 env[1127]: 2024-02-09 00:50:04.151 [INFO][3474] ipam_plugin.go 415: Releasing address using handleID ContainerID="f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" HandleID="k8s-pod-network.f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" Workload="localhost-k8s-calico--kube--controllers--785cff5fd--dmbq4-eth0" Feb 9 00:50:04.453599 env[1127]: 2024-02-09 00:50:04.152 [INFO][3474] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:50:04.453599 env[1127]: 2024-02-09 00:50:04.416 [INFO][3474] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:50:04.453599 env[1127]: 2024-02-09 00:50:04.423 [WARNING][3474] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" HandleID="k8s-pod-network.f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" Workload="localhost-k8s-calico--kube--controllers--785cff5fd--dmbq4-eth0" Feb 9 00:50:04.453599 env[1127]: 2024-02-09 00:50:04.423 [INFO][3474] ipam_plugin.go 443: Releasing address using workloadID ContainerID="f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" HandleID="k8s-pod-network.f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" Workload="localhost-k8s-calico--kube--controllers--785cff5fd--dmbq4-eth0" Feb 9 00:50:04.453599 env[1127]: 2024-02-09 00:50:04.449 [INFO][3474] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:50:04.453599 env[1127]: 2024-02-09 00:50:04.451 [INFO][3454] k8s.go 591: Teardown processing complete. ContainerID="f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" Feb 9 00:50:04.454220 env[1127]: time="2024-02-09T00:50:04.453799343Z" level=info msg="TearDown network for sandbox \"f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954\" successfully" Feb 9 00:50:04.454220 env[1127]: time="2024-02-09T00:50:04.453839308Z" level=info msg="StopPodSandbox for \"f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954\" returns successfully" Feb 9 00:50:04.454636 env[1127]: time="2024-02-09T00:50:04.454602239Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-785cff5fd-dmbq4,Uid:9649c383-e4cb-4dd0-8777-7860935dfc41,Namespace:calico-system,Attempt:1,}" Feb 9 00:50:04.455574 systemd[1]: run-netns-cni\x2dcff2a79f\x2db45f\x2d359a\x2db9ef\x2d4332a9eca177.mount: Deactivated successfully. Feb 9 00:50:04.687297 systemd-networkd[1023]: vxlan.calico: Link UP Feb 9 00:50:04.687304 systemd-networkd[1023]: vxlan.calico: Gained carrier Feb 9 00:50:05.240430 systemd-networkd[1023]: cali4a6435fed60: Link UP Feb 9 00:50:05.243354 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 00:50:05.243494 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4a6435fed60: link becomes ready Feb 9 00:50:05.243679 systemd-networkd[1023]: cali4a6435fed60: Gained carrier Feb 9 00:50:05.262258 env[1127]: 2024-02-09 00:50:05.144 [INFO][3502] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--h9gqp-eth0 csi-node-driver- calico-system 83b2cfd5-6e1c-47b1-936c-f1d68fb2b441 783 0 2024-02-09 00:49:35 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:86b88cf7c9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s localhost csi-node-driver-h9gqp eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali4a6435fed60 [] []}} ContainerID="dc800238c510b1e612f264f867b05dcdf076d868ed9efa3dfc9fd7598bf11f87" Namespace="calico-system" Pod="csi-node-driver-h9gqp" WorkloadEndpoint="localhost-k8s-csi--node--driver--h9gqp-" Feb 9 00:50:05.262258 env[1127]: 2024-02-09 00:50:05.144 [INFO][3502] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="dc800238c510b1e612f264f867b05dcdf076d868ed9efa3dfc9fd7598bf11f87" Namespace="calico-system" Pod="csi-node-driver-h9gqp" WorkloadEndpoint="localhost-k8s-csi--node--driver--h9gqp-eth0" Feb 9 00:50:05.262258 env[1127]: 2024-02-09 00:50:05.179 [INFO][3545] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dc800238c510b1e612f264f867b05dcdf076d868ed9efa3dfc9fd7598bf11f87" HandleID="k8s-pod-network.dc800238c510b1e612f264f867b05dcdf076d868ed9efa3dfc9fd7598bf11f87" Workload="localhost-k8s-csi--node--driver--h9gqp-eth0" Feb 9 00:50:05.262258 env[1127]: 2024-02-09 00:50:05.195 [INFO][3545] ipam_plugin.go 268: Auto assigning IP ContainerID="dc800238c510b1e612f264f867b05dcdf076d868ed9efa3dfc9fd7598bf11f87" HandleID="k8s-pod-network.dc800238c510b1e612f264f867b05dcdf076d868ed9efa3dfc9fd7598bf11f87" Workload="localhost-k8s-csi--node--driver--h9gqp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002b4d30), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-h9gqp", "timestamp":"2024-02-09 00:50:05.17995275 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 00:50:05.262258 env[1127]: 2024-02-09 00:50:05.195 [INFO][3545] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:50:05.262258 env[1127]: 2024-02-09 00:50:05.195 [INFO][3545] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:50:05.262258 env[1127]: 2024-02-09 00:50:05.195 [INFO][3545] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 9 00:50:05.262258 env[1127]: 2024-02-09 00:50:05.198 [INFO][3545] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.dc800238c510b1e612f264f867b05dcdf076d868ed9efa3dfc9fd7598bf11f87" host="localhost" Feb 9 00:50:05.262258 env[1127]: 2024-02-09 00:50:05.205 [INFO][3545] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 9 00:50:05.262258 env[1127]: 2024-02-09 00:50:05.213 [INFO][3545] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 9 00:50:05.262258 env[1127]: 2024-02-09 00:50:05.216 [INFO][3545] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 9 00:50:05.262258 env[1127]: 2024-02-09 00:50:05.219 [INFO][3545] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 9 00:50:05.262258 env[1127]: 2024-02-09 00:50:05.219 [INFO][3545] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.dc800238c510b1e612f264f867b05dcdf076d868ed9efa3dfc9fd7598bf11f87" host="localhost" Feb 9 00:50:05.262258 env[1127]: 2024-02-09 00:50:05.220 [INFO][3545] ipam.go 1682: Creating new handle: k8s-pod-network.dc800238c510b1e612f264f867b05dcdf076d868ed9efa3dfc9fd7598bf11f87 Feb 9 00:50:05.262258 env[1127]: 2024-02-09 00:50:05.224 [INFO][3545] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.dc800238c510b1e612f264f867b05dcdf076d868ed9efa3dfc9fd7598bf11f87" host="localhost" Feb 9 00:50:05.262258 env[1127]: 2024-02-09 00:50:05.230 [INFO][3545] ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.dc800238c510b1e612f264f867b05dcdf076d868ed9efa3dfc9fd7598bf11f87" host="localhost" Feb 9 00:50:05.262258 env[1127]: 2024-02-09 00:50:05.231 [INFO][3545] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.dc800238c510b1e612f264f867b05dcdf076d868ed9efa3dfc9fd7598bf11f87" host="localhost" Feb 9 00:50:05.262258 env[1127]: 2024-02-09 00:50:05.231 [INFO][3545] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:50:05.262258 env[1127]: 2024-02-09 00:50:05.231 [INFO][3545] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="dc800238c510b1e612f264f867b05dcdf076d868ed9efa3dfc9fd7598bf11f87" HandleID="k8s-pod-network.dc800238c510b1e612f264f867b05dcdf076d868ed9efa3dfc9fd7598bf11f87" Workload="localhost-k8s-csi--node--driver--h9gqp-eth0" Feb 9 00:50:05.263243 env[1127]: 2024-02-09 00:50:05.233 [INFO][3502] k8s.go 385: Populated endpoint ContainerID="dc800238c510b1e612f264f867b05dcdf076d868ed9efa3dfc9fd7598bf11f87" Namespace="calico-system" Pod="csi-node-driver-h9gqp" WorkloadEndpoint="localhost-k8s-csi--node--driver--h9gqp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--h9gqp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"83b2cfd5-6e1c-47b1-936c-f1d68fb2b441", ResourceVersion:"783", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 49, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-h9gqp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali4a6435fed60", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:50:05.263243 env[1127]: 2024-02-09 00:50:05.233 [INFO][3502] k8s.go 386: Calico CNI using IPs: [192.168.88.129/32] ContainerID="dc800238c510b1e612f264f867b05dcdf076d868ed9efa3dfc9fd7598bf11f87" Namespace="calico-system" Pod="csi-node-driver-h9gqp" WorkloadEndpoint="localhost-k8s-csi--node--driver--h9gqp-eth0" Feb 9 00:50:05.263243 env[1127]: 2024-02-09 00:50:05.233 [INFO][3502] dataplane_linux.go 68: Setting the host side veth name to cali4a6435fed60 ContainerID="dc800238c510b1e612f264f867b05dcdf076d868ed9efa3dfc9fd7598bf11f87" Namespace="calico-system" Pod="csi-node-driver-h9gqp" WorkloadEndpoint="localhost-k8s-csi--node--driver--h9gqp-eth0" Feb 9 00:50:05.263243 env[1127]: 2024-02-09 00:50:05.241 [INFO][3502] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="dc800238c510b1e612f264f867b05dcdf076d868ed9efa3dfc9fd7598bf11f87" Namespace="calico-system" Pod="csi-node-driver-h9gqp" WorkloadEndpoint="localhost-k8s-csi--node--driver--h9gqp-eth0" Feb 9 00:50:05.263243 env[1127]: 2024-02-09 00:50:05.248 [INFO][3502] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="dc800238c510b1e612f264f867b05dcdf076d868ed9efa3dfc9fd7598bf11f87" Namespace="calico-system" Pod="csi-node-driver-h9gqp" WorkloadEndpoint="localhost-k8s-csi--node--driver--h9gqp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--h9gqp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"83b2cfd5-6e1c-47b1-936c-f1d68fb2b441", ResourceVersion:"783", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 49, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"dc800238c510b1e612f264f867b05dcdf076d868ed9efa3dfc9fd7598bf11f87", Pod:"csi-node-driver-h9gqp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali4a6435fed60", MAC:"7a:69:53:f1:7a:80", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:50:05.263243 env[1127]: 2024-02-09 00:50:05.258 [INFO][3502] k8s.go 491: Wrote updated endpoint to datastore ContainerID="dc800238c510b1e612f264f867b05dcdf076d868ed9efa3dfc9fd7598bf11f87" Namespace="calico-system" Pod="csi-node-driver-h9gqp" WorkloadEndpoint="localhost-k8s-csi--node--driver--h9gqp-eth0" Feb 9 00:50:05.283019 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali857f8599cfc: link becomes ready Feb 9 00:50:05.278890 systemd-networkd[1023]: cali857f8599cfc: Link UP Feb 9 00:50:05.280524 systemd-networkd[1023]: cali857f8599cfc: Gained carrier Feb 9 00:50:05.284145 env[1127]: time="2024-02-09T00:50:05.284081605Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 00:50:05.284215 env[1127]: time="2024-02-09T00:50:05.284151136Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 00:50:05.286460 env[1127]: time="2024-02-09T00:50:05.286419672Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 00:50:05.286634 env[1127]: time="2024-02-09T00:50:05.286595352Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dc800238c510b1e612f264f867b05dcdf076d868ed9efa3dfc9fd7598bf11f87 pid=3597 runtime=io.containerd.runc.v2 Feb 9 00:50:05.291000 audit[3605]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=3605 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 00:50:05.291000 audit[3605]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffdf4bb8c50 a2=0 a3=7ffdf4bb8c3c items=0 ppid=3228 pid=3605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:05.291000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 00:50:05.296506 env[1127]: 2024-02-09 00:50:05.162 [INFO][3513] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5d78c9869d--qmz9r-eth0 coredns-5d78c9869d- kube-system 96b676bf-04bb-4866-aa59-8b21202275e7 782 0 2024-02-09 00:49:29 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5d78c9869d-qmz9r eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali857f8599cfc [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="a5bc70d916b17fdea347bfc1d50519ac264b97fc1f4db80100d4a8e6289871a1" Namespace="kube-system" Pod="coredns-5d78c9869d-qmz9r" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--qmz9r-" Feb 9 00:50:05.296506 env[1127]: 2024-02-09 00:50:05.162 [INFO][3513] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="a5bc70d916b17fdea347bfc1d50519ac264b97fc1f4db80100d4a8e6289871a1" Namespace="kube-system" Pod="coredns-5d78c9869d-qmz9r" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--qmz9r-eth0" Feb 9 00:50:05.296506 env[1127]: 2024-02-09 00:50:05.193 [INFO][3557] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a5bc70d916b17fdea347bfc1d50519ac264b97fc1f4db80100d4a8e6289871a1" HandleID="k8s-pod-network.a5bc70d916b17fdea347bfc1d50519ac264b97fc1f4db80100d4a8e6289871a1" Workload="localhost-k8s-coredns--5d78c9869d--qmz9r-eth0" Feb 9 00:50:05.296506 env[1127]: 2024-02-09 00:50:05.207 [INFO][3557] ipam_plugin.go 268: Auto assigning IP ContainerID="a5bc70d916b17fdea347bfc1d50519ac264b97fc1f4db80100d4a8e6289871a1" HandleID="k8s-pod-network.a5bc70d916b17fdea347bfc1d50519ac264b97fc1f4db80100d4a8e6289871a1" Workload="localhost-k8s-coredns--5d78c9869d--qmz9r-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029e830), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5d78c9869d-qmz9r", "timestamp":"2024-02-09 00:50:05.193521991 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 00:50:05.296506 env[1127]: 2024-02-09 00:50:05.208 [INFO][3557] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:50:05.296506 env[1127]: 2024-02-09 00:50:05.231 [INFO][3557] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:50:05.296506 env[1127]: 2024-02-09 00:50:05.231 [INFO][3557] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 9 00:50:05.296506 env[1127]: 2024-02-09 00:50:05.233 [INFO][3557] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a5bc70d916b17fdea347bfc1d50519ac264b97fc1f4db80100d4a8e6289871a1" host="localhost" Feb 9 00:50:05.296506 env[1127]: 2024-02-09 00:50:05.244 [INFO][3557] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 9 00:50:05.296506 env[1127]: 2024-02-09 00:50:05.249 [INFO][3557] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 9 00:50:05.296506 env[1127]: 2024-02-09 00:50:05.251 [INFO][3557] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 9 00:50:05.296506 env[1127]: 2024-02-09 00:50:05.254 [INFO][3557] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 9 00:50:05.296506 env[1127]: 2024-02-09 00:50:05.254 [INFO][3557] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.a5bc70d916b17fdea347bfc1d50519ac264b97fc1f4db80100d4a8e6289871a1" host="localhost" Feb 9 00:50:05.296506 env[1127]: 2024-02-09 00:50:05.257 [INFO][3557] ipam.go 1682: Creating new handle: k8s-pod-network.a5bc70d916b17fdea347bfc1d50519ac264b97fc1f4db80100d4a8e6289871a1 Feb 9 00:50:05.296506 env[1127]: 2024-02-09 00:50:05.265 [INFO][3557] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.a5bc70d916b17fdea347bfc1d50519ac264b97fc1f4db80100d4a8e6289871a1" host="localhost" Feb 9 00:50:05.296506 env[1127]: 2024-02-09 00:50:05.273 [INFO][3557] ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.a5bc70d916b17fdea347bfc1d50519ac264b97fc1f4db80100d4a8e6289871a1" host="localhost" Feb 9 00:50:05.296506 env[1127]: 2024-02-09 00:50:05.274 [INFO][3557] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.a5bc70d916b17fdea347bfc1d50519ac264b97fc1f4db80100d4a8e6289871a1" host="localhost" Feb 9 00:50:05.296506 env[1127]: 2024-02-09 00:50:05.274 [INFO][3557] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:50:05.296506 env[1127]: 2024-02-09 00:50:05.274 [INFO][3557] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="a5bc70d916b17fdea347bfc1d50519ac264b97fc1f4db80100d4a8e6289871a1" HandleID="k8s-pod-network.a5bc70d916b17fdea347bfc1d50519ac264b97fc1f4db80100d4a8e6289871a1" Workload="localhost-k8s-coredns--5d78c9869d--qmz9r-eth0" Feb 9 00:50:05.297289 env[1127]: 2024-02-09 00:50:05.276 [INFO][3513] k8s.go 385: Populated endpoint ContainerID="a5bc70d916b17fdea347bfc1d50519ac264b97fc1f4db80100d4a8e6289871a1" Namespace="kube-system" Pod="coredns-5d78c9869d-qmz9r" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--qmz9r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--qmz9r-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"96b676bf-04bb-4866-aa59-8b21202275e7", ResourceVersion:"782", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 49, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5d78c9869d-qmz9r", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali857f8599cfc", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:50:05.297289 env[1127]: 2024-02-09 00:50:05.276 [INFO][3513] k8s.go 386: Calico CNI using IPs: [192.168.88.130/32] ContainerID="a5bc70d916b17fdea347bfc1d50519ac264b97fc1f4db80100d4a8e6289871a1" Namespace="kube-system" Pod="coredns-5d78c9869d-qmz9r" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--qmz9r-eth0" Feb 9 00:50:05.297289 env[1127]: 2024-02-09 00:50:05.276 [INFO][3513] dataplane_linux.go 68: Setting the host side veth name to cali857f8599cfc ContainerID="a5bc70d916b17fdea347bfc1d50519ac264b97fc1f4db80100d4a8e6289871a1" Namespace="kube-system" Pod="coredns-5d78c9869d-qmz9r" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--qmz9r-eth0" Feb 9 00:50:05.297289 env[1127]: 2024-02-09 00:50:05.281 [INFO][3513] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="a5bc70d916b17fdea347bfc1d50519ac264b97fc1f4db80100d4a8e6289871a1" Namespace="kube-system" Pod="coredns-5d78c9869d-qmz9r" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--qmz9r-eth0" Feb 9 00:50:05.297289 env[1127]: 2024-02-09 00:50:05.282 [INFO][3513] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="a5bc70d916b17fdea347bfc1d50519ac264b97fc1f4db80100d4a8e6289871a1" Namespace="kube-system" Pod="coredns-5d78c9869d-qmz9r" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--qmz9r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--qmz9r-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"96b676bf-04bb-4866-aa59-8b21202275e7", ResourceVersion:"782", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 49, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a5bc70d916b17fdea347bfc1d50519ac264b97fc1f4db80100d4a8e6289871a1", Pod:"coredns-5d78c9869d-qmz9r", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali857f8599cfc", MAC:"fa:22:c9:3e:d5:40", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:50:05.297289 env[1127]: 2024-02-09 00:50:05.294 [INFO][3513] k8s.go 491: Wrote updated endpoint to datastore ContainerID="a5bc70d916b17fdea347bfc1d50519ac264b97fc1f4db80100d4a8e6289871a1" Namespace="kube-system" Pod="coredns-5d78c9869d-qmz9r" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--qmz9r-eth0" Feb 9 00:50:05.304297 systemd[1]: Started cri-containerd-dc800238c510b1e612f264f867b05dcdf076d868ed9efa3dfc9fd7598bf11f87.scope. Feb 9 00:50:05.324000 audit[3633]: NETFILTER_CFG table=filter:102 family=2 entries=40 op=nft_register_chain pid=3633 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 00:50:05.324000 audit[3633]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7ffe2d1f49a0 a2=0 a3=7ffe2d1f498c items=0 ppid=3228 pid=3633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:05.324000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 00:50:05.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.333000 audit: BPF prog-id=152 op=LOAD Feb 9 00:50:05.334000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.334000 audit[3606]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3597 pid=3606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:05.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463383030323338633531306231653631326632363466383637623035 Feb 9 00:50:05.334000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.334000 audit[3606]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3597 pid=3606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:05.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463383030323338633531306231653631326632363466383637623035 Feb 9 00:50:05.334000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.334000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.334000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.334000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.334000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.334000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.334000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.334000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.334000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.334000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.334000 audit: BPF prog-id=153 op=LOAD Feb 9 00:50:05.334000 audit[3606]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003344c0 items=0 ppid=3597 pid=3606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:05.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463383030323338633531306231653631326632363466383637623035 Feb 9 00:50:05.334000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.334000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.334000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.334000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.334000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.334000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.334000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.334000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.334000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.334000 audit: BPF prog-id=154 op=LOAD Feb 9 00:50:05.334000 audit[3606]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000334508 items=0 ppid=3597 pid=3606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:05.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463383030323338633531306231653631326632363466383637623035 Feb 9 00:50:05.334000 audit: BPF prog-id=154 op=UNLOAD Feb 9 00:50:05.334000 audit: BPF prog-id=153 op=UNLOAD Feb 9 00:50:05.334000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.334000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.334000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.334000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.334000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.334000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.334000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.334000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.334000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.334000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.334000 audit: BPF prog-id=155 op=LOAD Feb 9 00:50:05.334000 audit[3606]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000334918 items=0 ppid=3597 pid=3606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:05.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463383030323338633531306231653631326632363466383637623035 Feb 9 00:50:05.336642 systemd-resolved[1072]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 00:50:05.346907 env[1127]: time="2024-02-09T00:50:05.344490555Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 00:50:05.346907 env[1127]: time="2024-02-09T00:50:05.344524258Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 00:50:05.346907 env[1127]: time="2024-02-09T00:50:05.344534037Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 00:50:05.346907 env[1127]: time="2024-02-09T00:50:05.344621430Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a5bc70d916b17fdea347bfc1d50519ac264b97fc1f4db80100d4a8e6289871a1 pid=3651 runtime=io.containerd.runc.v2 Feb 9 00:50:05.351998 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1f0acb0236e: link becomes ready Feb 9 00:50:05.357270 systemd-networkd[1023]: cali1f0acb0236e: Link UP Feb 9 00:50:05.357541 systemd-networkd[1023]: cali1f0acb0236e: Gained carrier Feb 9 00:50:05.368312 env[1127]: time="2024-02-09T00:50:05.368257972Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-h9gqp,Uid:83b2cfd5-6e1c-47b1-936c-f1d68fb2b441,Namespace:calico-system,Attempt:1,} returns sandbox id \"dc800238c510b1e612f264f867b05dcdf076d868ed9efa3dfc9fd7598bf11f87\"" Feb 9 00:50:05.370324 env[1127]: time="2024-02-09T00:50:05.370301757Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 00:50:05.373377 env[1127]: 2024-02-09 00:50:05.162 [INFO][3524] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--785cff5fd--dmbq4-eth0 calico-kube-controllers-785cff5fd- calico-system 9649c383-e4cb-4dd0-8777-7860935dfc41 781 0 2024-02-09 00:49:35 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:785cff5fd projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-785cff5fd-dmbq4 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali1f0acb0236e [] []}} ContainerID="5d80bfe526d404377c7740a1c883b740011846c31a6e53eb8c23a3f0d6f8a4d4" Namespace="calico-system" Pod="calico-kube-controllers-785cff5fd-dmbq4" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--785cff5fd--dmbq4-" Feb 9 00:50:05.373377 env[1127]: 2024-02-09 00:50:05.162 [INFO][3524] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="5d80bfe526d404377c7740a1c883b740011846c31a6e53eb8c23a3f0d6f8a4d4" Namespace="calico-system" Pod="calico-kube-controllers-785cff5fd-dmbq4" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--785cff5fd--dmbq4-eth0" Feb 9 00:50:05.373377 env[1127]: 2024-02-09 00:50:05.200 [INFO][3553] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5d80bfe526d404377c7740a1c883b740011846c31a6e53eb8c23a3f0d6f8a4d4" HandleID="k8s-pod-network.5d80bfe526d404377c7740a1c883b740011846c31a6e53eb8c23a3f0d6f8a4d4" Workload="localhost-k8s-calico--kube--controllers--785cff5fd--dmbq4-eth0" Feb 9 00:50:05.373377 env[1127]: 2024-02-09 00:50:05.212 [INFO][3553] ipam_plugin.go 268: Auto assigning IP ContainerID="5d80bfe526d404377c7740a1c883b740011846c31a6e53eb8c23a3f0d6f8a4d4" HandleID="k8s-pod-network.5d80bfe526d404377c7740a1c883b740011846c31a6e53eb8c23a3f0d6f8a4d4" Workload="localhost-k8s-calico--kube--controllers--785cff5fd--dmbq4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000519f0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-785cff5fd-dmbq4", "timestamp":"2024-02-09 00:50:05.200280292 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 00:50:05.373377 env[1127]: 2024-02-09 00:50:05.212 [INFO][3553] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:50:05.373377 env[1127]: 2024-02-09 00:50:05.274 [INFO][3553] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:50:05.373377 env[1127]: 2024-02-09 00:50:05.274 [INFO][3553] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 9 00:50:05.373377 env[1127]: 2024-02-09 00:50:05.279 [INFO][3553] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5d80bfe526d404377c7740a1c883b740011846c31a6e53eb8c23a3f0d6f8a4d4" host="localhost" Feb 9 00:50:05.373377 env[1127]: 2024-02-09 00:50:05.288 [INFO][3553] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 9 00:50:05.373377 env[1127]: 2024-02-09 00:50:05.300 [INFO][3553] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 9 00:50:05.373377 env[1127]: 2024-02-09 00:50:05.303 [INFO][3553] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 9 00:50:05.373377 env[1127]: 2024-02-09 00:50:05.319 [INFO][3553] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 9 00:50:05.373377 env[1127]: 2024-02-09 00:50:05.319 [INFO][3553] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.5d80bfe526d404377c7740a1c883b740011846c31a6e53eb8c23a3f0d6f8a4d4" host="localhost" Feb 9 00:50:05.373377 env[1127]: 2024-02-09 00:50:05.322 [INFO][3553] ipam.go 1682: Creating new handle: k8s-pod-network.5d80bfe526d404377c7740a1c883b740011846c31a6e53eb8c23a3f0d6f8a4d4 Feb 9 00:50:05.373377 env[1127]: 2024-02-09 00:50:05.328 [INFO][3553] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.5d80bfe526d404377c7740a1c883b740011846c31a6e53eb8c23a3f0d6f8a4d4" host="localhost" Feb 9 00:50:05.373377 env[1127]: 2024-02-09 00:50:05.334 [INFO][3553] ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.5d80bfe526d404377c7740a1c883b740011846c31a6e53eb8c23a3f0d6f8a4d4" host="localhost" Feb 9 00:50:05.373377 env[1127]: 2024-02-09 00:50:05.335 [INFO][3553] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.5d80bfe526d404377c7740a1c883b740011846c31a6e53eb8c23a3f0d6f8a4d4" host="localhost" Feb 9 00:50:05.373377 env[1127]: 2024-02-09 00:50:05.335 [INFO][3553] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:50:05.373377 env[1127]: 2024-02-09 00:50:05.336 [INFO][3553] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="5d80bfe526d404377c7740a1c883b740011846c31a6e53eb8c23a3f0d6f8a4d4" HandleID="k8s-pod-network.5d80bfe526d404377c7740a1c883b740011846c31a6e53eb8c23a3f0d6f8a4d4" Workload="localhost-k8s-calico--kube--controllers--785cff5fd--dmbq4-eth0" Feb 9 00:50:05.374067 env[1127]: 2024-02-09 00:50:05.338 [INFO][3524] k8s.go 385: Populated endpoint ContainerID="5d80bfe526d404377c7740a1c883b740011846c31a6e53eb8c23a3f0d6f8a4d4" Namespace="calico-system" Pod="calico-kube-controllers-785cff5fd-dmbq4" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--785cff5fd--dmbq4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--785cff5fd--dmbq4-eth0", GenerateName:"calico-kube-controllers-785cff5fd-", Namespace:"calico-system", SelfLink:"", UID:"9649c383-e4cb-4dd0-8777-7860935dfc41", ResourceVersion:"781", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 49, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"785cff5fd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-785cff5fd-dmbq4", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali1f0acb0236e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:50:05.374067 env[1127]: 2024-02-09 00:50:05.338 [INFO][3524] k8s.go 386: Calico CNI using IPs: [192.168.88.131/32] ContainerID="5d80bfe526d404377c7740a1c883b740011846c31a6e53eb8c23a3f0d6f8a4d4" Namespace="calico-system" Pod="calico-kube-controllers-785cff5fd-dmbq4" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--785cff5fd--dmbq4-eth0" Feb 9 00:50:05.374067 env[1127]: 2024-02-09 00:50:05.338 [INFO][3524] dataplane_linux.go 68: Setting the host side veth name to cali1f0acb0236e ContainerID="5d80bfe526d404377c7740a1c883b740011846c31a6e53eb8c23a3f0d6f8a4d4" Namespace="calico-system" Pod="calico-kube-controllers-785cff5fd-dmbq4" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--785cff5fd--dmbq4-eth0" Feb 9 00:50:05.374067 env[1127]: 2024-02-09 00:50:05.351 [INFO][3524] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5d80bfe526d404377c7740a1c883b740011846c31a6e53eb8c23a3f0d6f8a4d4" Namespace="calico-system" Pod="calico-kube-controllers-785cff5fd-dmbq4" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--785cff5fd--dmbq4-eth0" Feb 9 00:50:05.374067 env[1127]: 2024-02-09 00:50:05.352 [INFO][3524] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="5d80bfe526d404377c7740a1c883b740011846c31a6e53eb8c23a3f0d6f8a4d4" Namespace="calico-system" Pod="calico-kube-controllers-785cff5fd-dmbq4" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--785cff5fd--dmbq4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--785cff5fd--dmbq4-eth0", GenerateName:"calico-kube-controllers-785cff5fd-", Namespace:"calico-system", SelfLink:"", UID:"9649c383-e4cb-4dd0-8777-7860935dfc41", ResourceVersion:"781", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 49, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"785cff5fd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5d80bfe526d404377c7740a1c883b740011846c31a6e53eb8c23a3f0d6f8a4d4", Pod:"calico-kube-controllers-785cff5fd-dmbq4", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali1f0acb0236e", MAC:"be:4d:7f:62:96:8d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:50:05.374067 env[1127]: 2024-02-09 00:50:05.364 [INFO][3524] k8s.go 491: Wrote updated endpoint to datastore ContainerID="5d80bfe526d404377c7740a1c883b740011846c31a6e53eb8c23a3f0d6f8a4d4" Namespace="calico-system" Pod="calico-kube-controllers-785cff5fd-dmbq4" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--785cff5fd--dmbq4-eth0" Feb 9 00:50:05.380823 systemd[1]: Started cri-containerd-a5bc70d916b17fdea347bfc1d50519ac264b97fc1f4db80100d4a8e6289871a1.scope. Feb 9 00:50:05.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.393000 audit: BPF prog-id=156 op=LOAD Feb 9 00:50:05.394000 audit[3671]: AVC avc: denied { bpf } for pid=3671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.394000 audit[3671]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3651 pid=3671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:05.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135626337306439313662313766646561333437626663316435303531 Feb 9 00:50:05.394000 audit[3671]: AVC avc: denied { perfmon } for pid=3671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.394000 audit[3671]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3651 pid=3671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:05.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135626337306439313662313766646561333437626663316435303531 Feb 9 00:50:05.394000 audit[3671]: AVC avc: denied { bpf } for pid=3671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.394000 audit[3671]: AVC avc: denied { bpf } for pid=3671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.394000 audit[3671]: AVC avc: denied { bpf } for pid=3671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.394000 audit[3671]: AVC avc: denied { perfmon } for pid=3671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.394000 audit[3671]: AVC avc: denied { perfmon } for pid=3671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.394000 audit[3671]: AVC avc: denied { perfmon } for pid=3671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.394000 audit[3671]: AVC avc: denied { perfmon } for pid=3671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.394000 audit[3671]: AVC avc: denied { perfmon } for pid=3671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.394000 audit[3671]: AVC avc: denied { bpf } for pid=3671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.394000 audit[3671]: AVC avc: denied { bpf } for pid=3671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.394000 audit: BPF prog-id=157 op=LOAD Feb 9 00:50:05.394000 audit[3671]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003d4370 items=0 ppid=3651 pid=3671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:05.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135626337306439313662313766646561333437626663316435303531 Feb 9 00:50:05.394000 audit[3671]: AVC avc: denied { bpf } for pid=3671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.394000 audit[3671]: AVC avc: denied { bpf } for pid=3671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.394000 audit[3671]: AVC avc: denied { perfmon } for pid=3671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.394000 audit[3671]: AVC avc: denied { perfmon } for pid=3671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.394000 audit[3671]: AVC avc: denied { perfmon } for pid=3671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.394000 audit[3671]: AVC avc: denied { perfmon } for pid=3671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.394000 audit[3671]: AVC avc: denied { perfmon } for pid=3671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.394000 audit[3671]: AVC avc: denied { bpf } for pid=3671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.394000 audit[3671]: AVC avc: denied { bpf } for pid=3671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.394000 audit: BPF prog-id=158 op=LOAD Feb 9 00:50:05.394000 audit[3671]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003d43b8 items=0 ppid=3651 pid=3671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:05.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135626337306439313662313766646561333437626663316435303531 Feb 9 00:50:05.394000 audit: BPF prog-id=158 op=UNLOAD Feb 9 00:50:05.394000 audit: BPF prog-id=157 op=UNLOAD Feb 9 00:50:05.394000 audit[3671]: AVC avc: denied { bpf } for pid=3671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.394000 audit[3671]: AVC avc: denied { bpf } for pid=3671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.394000 audit[3671]: AVC avc: denied { bpf } for pid=3671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.394000 audit[3671]: AVC avc: denied { perfmon } for pid=3671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.394000 audit[3671]: AVC avc: denied { perfmon } for pid=3671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.394000 audit[3671]: AVC avc: denied { perfmon } for pid=3671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.394000 audit[3671]: AVC avc: denied { perfmon } for pid=3671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.394000 audit[3671]: AVC avc: denied { perfmon } for pid=3671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.394000 audit[3671]: AVC avc: denied { bpf } for pid=3671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.394000 audit[3671]: AVC avc: denied { bpf } for pid=3671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.394000 audit: BPF prog-id=159 op=LOAD Feb 9 00:50:05.394000 audit[3671]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003d47c8 items=0 ppid=3651 pid=3671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:05.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135626337306439313662313766646561333437626663316435303531 Feb 9 00:50:05.396927 systemd-resolved[1072]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 00:50:05.413515 env[1127]: time="2024-02-09T00:50:05.413444248Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 00:50:05.413737 env[1127]: time="2024-02-09T00:50:05.413710017Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 00:50:05.413874 env[1127]: time="2024-02-09T00:50:05.413848938Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 00:50:05.414113 env[1127]: time="2024-02-09T00:50:05.414086022Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5d80bfe526d404377c7740a1c883b740011846c31a6e53eb8c23a3f0d6f8a4d4 pid=3711 runtime=io.containerd.runc.v2 Feb 9 00:50:05.420000 audit[3706]: NETFILTER_CFG table=filter:103 family=2 entries=38 op=nft_register_chain pid=3706 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 00:50:05.420000 audit[3706]: SYSCALL arch=c000003e syscall=46 success=yes exit=19508 a0=3 a1=7ffcf25d51e0 a2=0 a3=7ffcf25d51cc items=0 ppid=3228 pid=3706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:05.420000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 00:50:05.436053 systemd[1]: Started cri-containerd-5d80bfe526d404377c7740a1c883b740011846c31a6e53eb8c23a3f0d6f8a4d4.scope. Feb 9 00:50:05.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit: BPF prog-id=160 op=LOAD Feb 9 00:50:05.450000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit[3718]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3711 pid=3718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:05.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564383062666535323664343034333737633737343061316338383362 Feb 9 00:50:05.450000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit[3718]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3711 pid=3718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:05.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564383062666535323664343034333737633737343061316338383362 Feb 9 00:50:05.450000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit: BPF prog-id=161 op=LOAD Feb 9 00:50:05.450000 audit[3718]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002fcf10 items=0 ppid=3711 pid=3718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:05.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564383062666535323664343034333737633737343061316338383362 Feb 9 00:50:05.450000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit: BPF prog-id=162 op=LOAD Feb 9 00:50:05.450000 audit[3718]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002fcf58 items=0 ppid=3711 pid=3718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:05.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564383062666535323664343034333737633737343061316338383362 Feb 9 00:50:05.450000 audit: BPF prog-id=162 op=UNLOAD Feb 9 00:50:05.450000 audit: BPF prog-id=161 op=UNLOAD Feb 9 00:50:05.450000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit[3718]: AVC avc: denied { perfmon } for pid=3718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit[3718]: AVC avc: denied { bpf } for pid=3718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.450000 audit: BPF prog-id=163 op=LOAD Feb 9 00:50:05.450000 audit[3718]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002fd368 items=0 ppid=3711 pid=3718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:05.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564383062666535323664343034333737633737343061316338383362 Feb 9 00:50:05.453521 systemd-resolved[1072]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 00:50:05.455973 env[1127]: time="2024-02-09T00:50:05.454230959Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-qmz9r,Uid:96b676bf-04bb-4866-aa59-8b21202275e7,Namespace:kube-system,Attempt:1,} returns sandbox id \"a5bc70d916b17fdea347bfc1d50519ac264b97fc1f4db80100d4a8e6289871a1\"" Feb 9 00:50:05.456055 kubelet[2019]: E0209 00:50:05.454992 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:50:05.460566 env[1127]: time="2024-02-09T00:50:05.460529458Z" level=info msg="CreateContainer within sandbox \"a5bc70d916b17fdea347bfc1d50519ac264b97fc1f4db80100d4a8e6289871a1\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 00:50:05.484556 env[1127]: time="2024-02-09T00:50:05.484512749Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-785cff5fd-dmbq4,Uid:9649c383-e4cb-4dd0-8777-7860935dfc41,Namespace:calico-system,Attempt:1,} returns sandbox id \"5d80bfe526d404377c7740a1c883b740011846c31a6e53eb8c23a3f0d6f8a4d4\"" Feb 9 00:50:05.489281 env[1127]: time="2024-02-09T00:50:05.489241332Z" level=info msg="CreateContainer within sandbox \"a5bc70d916b17fdea347bfc1d50519ac264b97fc1f4db80100d4a8e6289871a1\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"f37d7ab3548a8f1c5ce93a1b2f87035e855533a7ade92963073cec636d754f3f\"" Feb 9 00:50:05.489639 env[1127]: time="2024-02-09T00:50:05.489610885Z" level=info msg="StartContainer for \"f37d7ab3548a8f1c5ce93a1b2f87035e855533a7ade92963073cec636d754f3f\"" Feb 9 00:50:05.505095 systemd[1]: Started cri-containerd-f37d7ab3548a8f1c5ce93a1b2f87035e855533a7ade92963073cec636d754f3f.scope. Feb 9 00:50:05.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.521000 audit: BPF prog-id=164 op=LOAD Feb 9 00:50:05.523000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.523000 audit[3759]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3651 pid=3759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:05.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633376437616233353438613866316335636539336131623266383730 Feb 9 00:50:05.523000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.523000 audit[3759]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3651 pid=3759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:05.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633376437616233353438613866316335636539336131623266383730 Feb 9 00:50:05.523000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.523000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.523000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.523000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.523000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.523000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.523000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.523000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.523000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.523000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.523000 audit: BPF prog-id=165 op=LOAD Feb 9 00:50:05.523000 audit[3759]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000284c60 items=0 ppid=3651 pid=3759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:05.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633376437616233353438613866316335636539336131623266383730 Feb 9 00:50:05.523000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.523000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.523000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.523000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.523000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.523000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.523000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.523000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.523000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.523000 audit: BPF prog-id=166 op=LOAD Feb 9 00:50:05.523000 audit[3759]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000284ca8 items=0 ppid=3651 pid=3759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:05.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633376437616233353438613866316335636539336131623266383730 Feb 9 00:50:05.523000 audit: BPF prog-id=166 op=UNLOAD Feb 9 00:50:05.523000 audit: BPF prog-id=165 op=UNLOAD Feb 9 00:50:05.523000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.523000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.523000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.523000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.523000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.523000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.523000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.523000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.523000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.523000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:05.523000 audit: BPF prog-id=167 op=LOAD Feb 9 00:50:05.523000 audit[3759]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002850b8 items=0 ppid=3651 pid=3759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:05.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633376437616233353438613866316335636539336131623266383730 Feb 9 00:50:05.541187 env[1127]: time="2024-02-09T00:50:05.541124564Z" level=info msg="StartContainer for \"f37d7ab3548a8f1c5ce93a1b2f87035e855533a7ade92963073cec636d754f3f\" returns successfully" Feb 9 00:50:05.921412 kubelet[2019]: E0209 00:50:05.921368 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:50:05.940683 kubelet[2019]: I0209 00:50:05.940626 2019 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-qmz9r" podStartSLOduration=36.940581366 podCreationTimestamp="2024-02-09 00:49:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 00:50:05.929856713 +0000 UTC m=+51.211493782" watchObservedRunningTime="2024-02-09 00:50:05.940581366 +0000 UTC m=+51.222218435" Feb 9 00:50:05.939000 audit[3793]: NETFILTER_CFG table=filter:104 family=2 entries=14 op=nft_register_rule pid=3793 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:50:05.939000 audit[3793]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffcc43a9410 a2=0 a3=7ffcc43a93fc items=0 ppid=2178 pid=3793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:05.939000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:50:05.940000 audit[3793]: NETFILTER_CFG table=nat:105 family=2 entries=14 op=nft_register_rule pid=3793 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:50:05.940000 audit[3793]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7ffcc43a9410 a2=0 a3=31030 items=0 ppid=2178 pid=3793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:05.940000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:50:05.949000 audit[3795]: NETFILTER_CFG table=filter:106 family=2 entries=11 op=nft_register_rule pid=3795 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:50:05.949000 audit[3795]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffc1ddd2aa0 a2=0 a3=7ffc1ddd2a8c items=0 ppid=2178 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:05.949000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:50:05.954000 audit[3795]: NETFILTER_CFG table=nat:107 family=2 entries=35 op=nft_register_chain pid=3795 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:50:05.954000 audit[3795]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffc1ddd2aa0 a2=0 a3=7ffc1ddd2a8c items=0 ppid=2178 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:05.954000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:50:06.536095 systemd-networkd[1023]: vxlan.calico: Gained IPv6LL Feb 9 00:50:06.664471 systemd-networkd[1023]: cali1f0acb0236e: Gained IPv6LL Feb 9 00:50:06.664756 systemd-networkd[1023]: cali4a6435fed60: Gained IPv6LL Feb 9 00:50:06.809167 env[1127]: time="2024-02-09T00:50:06.809038559Z" level=info msg="StopPodSandbox for \"24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873\"" Feb 9 00:50:06.922961 kubelet[2019]: E0209 00:50:06.922916 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:50:06.984197 systemd-networkd[1023]: cali857f8599cfc: Gained IPv6LL Feb 9 00:50:07.012062 env[1127]: 2024-02-09 00:50:06.869 [INFO][3812] k8s.go 578: Cleaning up netns ContainerID="24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" Feb 9 00:50:07.012062 env[1127]: 2024-02-09 00:50:06.869 [INFO][3812] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" iface="eth0" netns="/var/run/netns/cni-fd05da99-d611-3d4b-a8b6-468c91316437" Feb 9 00:50:07.012062 env[1127]: 2024-02-09 00:50:06.869 [INFO][3812] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" iface="eth0" netns="/var/run/netns/cni-fd05da99-d611-3d4b-a8b6-468c91316437" Feb 9 00:50:07.012062 env[1127]: 2024-02-09 00:50:06.870 [INFO][3812] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" iface="eth0" netns="/var/run/netns/cni-fd05da99-d611-3d4b-a8b6-468c91316437" Feb 9 00:50:07.012062 env[1127]: 2024-02-09 00:50:06.870 [INFO][3812] k8s.go 585: Releasing IP address(es) ContainerID="24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" Feb 9 00:50:07.012062 env[1127]: 2024-02-09 00:50:06.870 [INFO][3812] utils.go 188: Calico CNI releasing IP address ContainerID="24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" Feb 9 00:50:07.012062 env[1127]: 2024-02-09 00:50:06.886 [INFO][3820] ipam_plugin.go 415: Releasing address using handleID ContainerID="24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" HandleID="k8s-pod-network.24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" Workload="localhost-k8s-coredns--5d78c9869d--b874j-eth0" Feb 9 00:50:07.012062 env[1127]: 2024-02-09 00:50:06.886 [INFO][3820] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:50:07.012062 env[1127]: 2024-02-09 00:50:06.886 [INFO][3820] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:50:07.012062 env[1127]: 2024-02-09 00:50:06.929 [WARNING][3820] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" HandleID="k8s-pod-network.24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" Workload="localhost-k8s-coredns--5d78c9869d--b874j-eth0" Feb 9 00:50:07.012062 env[1127]: 2024-02-09 00:50:06.946 [INFO][3820] ipam_plugin.go 443: Releasing address using workloadID ContainerID="24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" HandleID="k8s-pod-network.24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" Workload="localhost-k8s-coredns--5d78c9869d--b874j-eth0" Feb 9 00:50:07.012062 env[1127]: 2024-02-09 00:50:07.009 [INFO][3820] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:50:07.012062 env[1127]: 2024-02-09 00:50:07.010 [INFO][3812] k8s.go 591: Teardown processing complete. ContainerID="24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" Feb 9 00:50:07.013975 systemd[1]: run-netns-cni\x2dfd05da99\x2dd611\x2d3d4b\x2da8b6\x2d468c91316437.mount: Deactivated successfully. Feb 9 00:50:07.014532 env[1127]: time="2024-02-09T00:50:07.014498270Z" level=info msg="TearDown network for sandbox \"24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873\" successfully" Feb 9 00:50:07.014532 env[1127]: time="2024-02-09T00:50:07.014530651Z" level=info msg="StopPodSandbox for \"24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873\" returns successfully" Feb 9 00:50:07.014814 kubelet[2019]: E0209 00:50:07.014787 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:50:07.016044 env[1127]: time="2024-02-09T00:50:07.015989859Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-b874j,Uid:2536b126-e3ee-4a37-873f-9284c092f8da,Namespace:kube-system,Attempt:1,}" Feb 9 00:50:07.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.84:22-10.0.0.1:51268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:07.801111 systemd[1]: Started sshd@11-10.0.0.84:22-10.0.0.1:51268.service. Feb 9 00:50:07.802019 kernel: kauditd_printk_skb: 368 callbacks suppressed Feb 9 00:50:07.802065 kernel: audit: type=1130 audit(1707439807.800:1293): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.84:22-10.0.0.1:51268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:07.869000 audit[3828]: USER_ACCT pid=3828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:07.870996 sshd[3828]: Accepted publickey for core from 10.0.0.1 port 51268 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:50:07.872031 sshd[3828]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:50:07.869000 audit[3828]: CRED_ACQ pid=3828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:07.875103 systemd-logind[1111]: New session 12 of user core. Feb 9 00:50:07.875902 kernel: audit: type=1101 audit(1707439807.869:1294): pid=3828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:07.876031 kernel: audit: type=1103 audit(1707439807.869:1295): pid=3828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:07.876117 systemd[1]: Started session-12.scope. Feb 9 00:50:07.869000 audit[3828]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf8c2f300 a2=3 a3=0 items=0 ppid=1 pid=3828 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:07.880377 kernel: audit: type=1006 audit(1707439807.869:1296): pid=3828 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 9 00:50:07.880422 kernel: audit: type=1300 audit(1707439807.869:1296): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf8c2f300 a2=3 a3=0 items=0 ppid=1 pid=3828 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:07.869000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 00:50:07.881346 kernel: audit: type=1327 audit(1707439807.869:1296): proctitle=737368643A20636F7265205B707269765D Feb 9 00:50:07.881380 kernel: audit: type=1105 audit(1707439807.879:1297): pid=3828 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:07.879000 audit[3828]: USER_START pid=3828 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:07.880000 audit[3830]: CRED_ACQ pid=3830 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:07.886402 kernel: audit: type=1103 audit(1707439807.880:1298): pid=3830 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:07.924509 kubelet[2019]: E0209 00:50:07.924485 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:50:08.037343 sshd[3828]: pam_unix(sshd:session): session closed for user core Feb 9 00:50:08.037000 audit[3828]: USER_END pid=3828 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:08.041067 systemd[1]: sshd@11-10.0.0.84:22-10.0.0.1:51268.service: Deactivated successfully. Feb 9 00:50:08.041717 systemd[1]: session-12.scope: Deactivated successfully. Feb 9 00:50:08.043155 systemd[1]: Started sshd@12-10.0.0.84:22-10.0.0.1:51276.service. Feb 9 00:50:08.045724 systemd-logind[1111]: Session 12 logged out. Waiting for processes to exit. Feb 9 00:50:08.046616 systemd-logind[1111]: Removed session 12. Feb 9 00:50:08.037000 audit[3828]: CRED_DISP pid=3828 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:08.071991 kernel: audit: type=1106 audit(1707439808.037:1299): pid=3828 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:08.072054 kernel: audit: type=1104 audit(1707439808.037:1300): pid=3828 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:08.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.84:22-10.0.0.1:51268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:08.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.84:22-10.0.0.1:51276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:08.099000 audit[3844]: USER_ACCT pid=3844 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:08.100369 sshd[3844]: Accepted publickey for core from 10.0.0.1 port 51276 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:50:08.100000 audit[3844]: CRED_ACQ pid=3844 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:08.100000 audit[3844]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3ccadd40 a2=3 a3=0 items=0 ppid=1 pid=3844 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:08.100000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 00:50:08.101489 sshd[3844]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:50:08.110232 systemd-logind[1111]: New session 13 of user core. Feb 9 00:50:08.111312 systemd[1]: Started session-13.scope. Feb 9 00:50:08.114000 audit[3844]: USER_START pid=3844 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:08.115000 audit[3846]: CRED_ACQ pid=3846 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:09.241821 sshd[3844]: pam_unix(sshd:session): session closed for user core Feb 9 00:50:09.242000 audit[3844]: USER_END pid=3844 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:09.242000 audit[3844]: CRED_DISP pid=3844 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:09.246152 systemd[1]: Started sshd@13-10.0.0.84:22-10.0.0.1:51286.service. Feb 9 00:50:09.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.84:22-10.0.0.1:51286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:09.246844 systemd[1]: sshd@12-10.0.0.84:22-10.0.0.1:51276.service: Deactivated successfully. Feb 9 00:50:09.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.84:22-10.0.0.1:51276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:09.247619 systemd[1]: session-13.scope: Deactivated successfully. Feb 9 00:50:09.248916 systemd-logind[1111]: Session 13 logged out. Waiting for processes to exit. Feb 9 00:50:09.249828 systemd-logind[1111]: Removed session 13. Feb 9 00:50:09.281000 audit[3860]: USER_ACCT pid=3860 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:09.283186 sshd[3860]: Accepted publickey for core from 10.0.0.1 port 51286 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:50:09.283000 audit[3860]: CRED_ACQ pid=3860 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:09.283000 audit[3860]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcbeb8e450 a2=3 a3=0 items=0 ppid=1 pid=3860 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:09.283000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 00:50:09.284377 sshd[3860]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:50:09.293429 systemd-logind[1111]: New session 14 of user core. Feb 9 00:50:09.293539 systemd[1]: Started session-14.scope. Feb 9 00:50:09.300000 audit[3860]: USER_START pid=3860 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:09.302000 audit[3875]: CRED_ACQ pid=3875 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:09.397036 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali868e0ccf60b: link becomes ready Feb 9 00:50:09.397306 systemd-networkd[1023]: cali868e0ccf60b: Link UP Feb 9 00:50:09.399137 systemd-networkd[1023]: cali868e0ccf60b: Gained carrier Feb 9 00:50:09.407839 env[1127]: 2024-02-09 00:50:09.330 [INFO][3863] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5d78c9869d--b874j-eth0 coredns-5d78c9869d- kube-system 2536b126-e3ee-4a37-873f-9284c092f8da 821 0 2024-02-09 00:49:29 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5d78c9869d-b874j eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali868e0ccf60b [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="53b9f9d348a8830fd3405852d0d72cb7dc8568f0341859570255e8bbb1082741" Namespace="kube-system" Pod="coredns-5d78c9869d-b874j" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--b874j-" Feb 9 00:50:09.407839 env[1127]: 2024-02-09 00:50:09.330 [INFO][3863] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="53b9f9d348a8830fd3405852d0d72cb7dc8568f0341859570255e8bbb1082741" Namespace="kube-system" Pod="coredns-5d78c9869d-b874j" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--b874j-eth0" Feb 9 00:50:09.407839 env[1127]: 2024-02-09 00:50:09.359 [INFO][3877] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="53b9f9d348a8830fd3405852d0d72cb7dc8568f0341859570255e8bbb1082741" HandleID="k8s-pod-network.53b9f9d348a8830fd3405852d0d72cb7dc8568f0341859570255e8bbb1082741" Workload="localhost-k8s-coredns--5d78c9869d--b874j-eth0" Feb 9 00:50:09.407839 env[1127]: 2024-02-09 00:50:09.368 [INFO][3877] ipam_plugin.go 268: Auto assigning IP ContainerID="53b9f9d348a8830fd3405852d0d72cb7dc8568f0341859570255e8bbb1082741" HandleID="k8s-pod-network.53b9f9d348a8830fd3405852d0d72cb7dc8568f0341859570255e8bbb1082741" Workload="localhost-k8s-coredns--5d78c9869d--b874j-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003047a0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5d78c9869d-b874j", "timestamp":"2024-02-09 00:50:09.359083214 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 00:50:09.407839 env[1127]: 2024-02-09 00:50:09.368 [INFO][3877] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:50:09.407839 env[1127]: 2024-02-09 00:50:09.368 [INFO][3877] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:50:09.407839 env[1127]: 2024-02-09 00:50:09.368 [INFO][3877] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 9 00:50:09.407839 env[1127]: 2024-02-09 00:50:09.370 [INFO][3877] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.53b9f9d348a8830fd3405852d0d72cb7dc8568f0341859570255e8bbb1082741" host="localhost" Feb 9 00:50:09.407839 env[1127]: 2024-02-09 00:50:09.373 [INFO][3877] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 9 00:50:09.407839 env[1127]: 2024-02-09 00:50:09.378 [INFO][3877] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 9 00:50:09.407839 env[1127]: 2024-02-09 00:50:09.379 [INFO][3877] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 9 00:50:09.407839 env[1127]: 2024-02-09 00:50:09.382 [INFO][3877] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 9 00:50:09.407839 env[1127]: 2024-02-09 00:50:09.382 [INFO][3877] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.53b9f9d348a8830fd3405852d0d72cb7dc8568f0341859570255e8bbb1082741" host="localhost" Feb 9 00:50:09.407839 env[1127]: 2024-02-09 00:50:09.384 [INFO][3877] ipam.go 1682: Creating new handle: k8s-pod-network.53b9f9d348a8830fd3405852d0d72cb7dc8568f0341859570255e8bbb1082741 Feb 9 00:50:09.407839 env[1127]: 2024-02-09 00:50:09.387 [INFO][3877] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.53b9f9d348a8830fd3405852d0d72cb7dc8568f0341859570255e8bbb1082741" host="localhost" Feb 9 00:50:09.407839 env[1127]: 2024-02-09 00:50:09.392 [INFO][3877] ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.53b9f9d348a8830fd3405852d0d72cb7dc8568f0341859570255e8bbb1082741" host="localhost" Feb 9 00:50:09.407839 env[1127]: 2024-02-09 00:50:09.392 [INFO][3877] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.53b9f9d348a8830fd3405852d0d72cb7dc8568f0341859570255e8bbb1082741" host="localhost" Feb 9 00:50:09.407839 env[1127]: 2024-02-09 00:50:09.392 [INFO][3877] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:50:09.407839 env[1127]: 2024-02-09 00:50:09.392 [INFO][3877] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="53b9f9d348a8830fd3405852d0d72cb7dc8568f0341859570255e8bbb1082741" HandleID="k8s-pod-network.53b9f9d348a8830fd3405852d0d72cb7dc8568f0341859570255e8bbb1082741" Workload="localhost-k8s-coredns--5d78c9869d--b874j-eth0" Feb 9 00:50:09.408534 env[1127]: 2024-02-09 00:50:09.394 [INFO][3863] k8s.go 385: Populated endpoint ContainerID="53b9f9d348a8830fd3405852d0d72cb7dc8568f0341859570255e8bbb1082741" Namespace="kube-system" Pod="coredns-5d78c9869d-b874j" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--b874j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--b874j-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"2536b126-e3ee-4a37-873f-9284c092f8da", ResourceVersion:"821", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 49, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5d78c9869d-b874j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali868e0ccf60b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:50:09.408534 env[1127]: 2024-02-09 00:50:09.394 [INFO][3863] k8s.go 386: Calico CNI using IPs: [192.168.88.132/32] ContainerID="53b9f9d348a8830fd3405852d0d72cb7dc8568f0341859570255e8bbb1082741" Namespace="kube-system" Pod="coredns-5d78c9869d-b874j" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--b874j-eth0" Feb 9 00:50:09.408534 env[1127]: 2024-02-09 00:50:09.394 [INFO][3863] dataplane_linux.go 68: Setting the host side veth name to cali868e0ccf60b ContainerID="53b9f9d348a8830fd3405852d0d72cb7dc8568f0341859570255e8bbb1082741" Namespace="kube-system" Pod="coredns-5d78c9869d-b874j" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--b874j-eth0" Feb 9 00:50:09.408534 env[1127]: 2024-02-09 00:50:09.395 [INFO][3863] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="53b9f9d348a8830fd3405852d0d72cb7dc8568f0341859570255e8bbb1082741" Namespace="kube-system" Pod="coredns-5d78c9869d-b874j" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--b874j-eth0" Feb 9 00:50:09.408534 env[1127]: 2024-02-09 00:50:09.396 [INFO][3863] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="53b9f9d348a8830fd3405852d0d72cb7dc8568f0341859570255e8bbb1082741" Namespace="kube-system" Pod="coredns-5d78c9869d-b874j" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--b874j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--b874j-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"2536b126-e3ee-4a37-873f-9284c092f8da", ResourceVersion:"821", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 49, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"53b9f9d348a8830fd3405852d0d72cb7dc8568f0341859570255e8bbb1082741", Pod:"coredns-5d78c9869d-b874j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali868e0ccf60b", MAC:"de:c6:f0:c9:a8:fd", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:50:09.408534 env[1127]: 2024-02-09 00:50:09.406 [INFO][3863] k8s.go 491: Wrote updated endpoint to datastore ContainerID="53b9f9d348a8830fd3405852d0d72cb7dc8568f0341859570255e8bbb1082741" Namespace="kube-system" Pod="coredns-5d78c9869d-b874j" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--b874j-eth0" Feb 9 00:50:09.418000 audit[3910]: NETFILTER_CFG table=filter:108 family=2 entries=44 op=nft_register_chain pid=3910 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 00:50:09.418000 audit[3910]: SYSCALL arch=c000003e syscall=46 success=yes exit=21940 a0=3 a1=7ffff0f593e0 a2=0 a3=7ffff0f593cc items=0 ppid=3228 pid=3910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:09.418000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 00:50:09.422243 env[1127]: time="2024-02-09T00:50:09.422198983Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 00:50:09.422362 env[1127]: time="2024-02-09T00:50:09.422338805Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 00:50:09.422452 env[1127]: time="2024-02-09T00:50:09.422429716Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 00:50:09.426850 env[1127]: time="2024-02-09T00:50:09.422700865Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/53b9f9d348a8830fd3405852d0d72cb7dc8568f0341859570255e8bbb1082741 pid=3917 runtime=io.containerd.runc.v2 Feb 9 00:50:09.427330 sshd[3860]: pam_unix(sshd:session): session closed for user core Feb 9 00:50:09.427000 audit[3860]: USER_END pid=3860 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:09.427000 audit[3860]: CRED_DISP pid=3860 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:09.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.84:22-10.0.0.1:51286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:09.429796 systemd[1]: sshd@13-10.0.0.84:22-10.0.0.1:51286.service: Deactivated successfully. Feb 9 00:50:09.430385 systemd[1]: session-14.scope: Deactivated successfully. Feb 9 00:50:09.431129 systemd-logind[1111]: Session 14 logged out. Waiting for processes to exit. Feb 9 00:50:09.431881 systemd-logind[1111]: Removed session 14. Feb 9 00:50:09.441042 systemd[1]: run-containerd-runc-k8s.io-53b9f9d348a8830fd3405852d0d72cb7dc8568f0341859570255e8bbb1082741-runc.Z9X7yq.mount: Deactivated successfully. Feb 9 00:50:09.442848 systemd[1]: Started cri-containerd-53b9f9d348a8830fd3405852d0d72cb7dc8568f0341859570255e8bbb1082741.scope. Feb 9 00:50:09.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.451000 audit: BPF prog-id=168 op=LOAD Feb 9 00:50:09.451000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.451000 audit[3927]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3917 pid=3927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:09.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533623966396433343861383833306664333430353835326430643732 Feb 9 00:50:09.451000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.451000 audit[3927]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3917 pid=3927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:09.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533623966396433343861383833306664333430353835326430643732 Feb 9 00:50:09.451000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.451000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.451000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.451000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.451000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.451000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.451000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.451000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.451000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.451000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.451000 audit: BPF prog-id=169 op=LOAD Feb 9 00:50:09.451000 audit[3927]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024e60 items=0 ppid=3917 pid=3927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:09.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533623966396433343861383833306664333430353835326430643732 Feb 9 00:50:09.451000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.451000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.451000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.451000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.451000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.451000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.451000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.451000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.451000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.451000 audit: BPF prog-id=170 op=LOAD Feb 9 00:50:09.451000 audit[3927]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024ea8 items=0 ppid=3917 pid=3927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:09.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533623966396433343861383833306664333430353835326430643732 Feb 9 00:50:09.452000 audit: BPF prog-id=170 op=UNLOAD Feb 9 00:50:09.452000 audit: BPF prog-id=169 op=UNLOAD Feb 9 00:50:09.452000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.452000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.452000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.452000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.452000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.452000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.452000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.452000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.452000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.452000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.452000 audit: BPF prog-id=171 op=LOAD Feb 9 00:50:09.452000 audit[3927]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000252b8 items=0 ppid=3917 pid=3927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:09.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533623966396433343861383833306664333430353835326430643732 Feb 9 00:50:09.454019 systemd-resolved[1072]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 00:50:09.479358 env[1127]: time="2024-02-09T00:50:09.479320206Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-b874j,Uid:2536b126-e3ee-4a37-873f-9284c092f8da,Namespace:kube-system,Attempt:1,} returns sandbox id \"53b9f9d348a8830fd3405852d0d72cb7dc8568f0341859570255e8bbb1082741\"" Feb 9 00:50:09.480029 kubelet[2019]: E0209 00:50:09.480010 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:50:09.482053 env[1127]: time="2024-02-09T00:50:09.482024460Z" level=info msg="CreateContainer within sandbox \"53b9f9d348a8830fd3405852d0d72cb7dc8568f0341859570255e8bbb1082741\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 00:50:09.495164 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount397587541.mount: Deactivated successfully. Feb 9 00:50:09.498243 env[1127]: time="2024-02-09T00:50:09.498168487Z" level=info msg="CreateContainer within sandbox \"53b9f9d348a8830fd3405852d0d72cb7dc8568f0341859570255e8bbb1082741\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"c8bd100c7fd43b49a682e4197e0e8c61216581471e07d68635fdf137862fcf1f\"" Feb 9 00:50:09.499843 env[1127]: time="2024-02-09T00:50:09.499814976Z" level=info msg="StartContainer for \"c8bd100c7fd43b49a682e4197e0e8c61216581471e07d68635fdf137862fcf1f\"" Feb 9 00:50:09.515906 systemd[1]: Started cri-containerd-c8bd100c7fd43b49a682e4197e0e8c61216581471e07d68635fdf137862fcf1f.scope. Feb 9 00:50:09.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.526000 audit: BPF prog-id=172 op=LOAD Feb 9 00:50:09.527000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.527000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3917 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:09.527000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338626431303063376664343362343961363832653431393765306538 Feb 9 00:50:09.528000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.528000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3917 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:09.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338626431303063376664343362343961363832653431393765306538 Feb 9 00:50:09.528000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.528000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.528000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.528000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.528000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.528000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.528000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.528000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.528000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.528000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.528000 audit: BPF prog-id=173 op=LOAD Feb 9 00:50:09.528000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000024590 items=0 ppid=3917 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:09.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338626431303063376664343362343961363832653431393765306538 Feb 9 00:50:09.529000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.529000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.529000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.529000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.529000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.529000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.529000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.529000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.529000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.529000 audit: BPF prog-id=174 op=LOAD Feb 9 00:50:09.529000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0000245d8 items=0 ppid=3917 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:09.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338626431303063376664343362343961363832653431393765306538 Feb 9 00:50:09.530000 audit: BPF prog-id=174 op=UNLOAD Feb 9 00:50:09.530000 audit: BPF prog-id=173 op=UNLOAD Feb 9 00:50:09.530000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.530000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.530000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.530000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.530000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.530000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.530000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.530000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.530000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.530000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:09.530000 audit: BPF prog-id=175 op=LOAD Feb 9 00:50:09.530000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0000249e8 items=0 ppid=3917 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:09.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338626431303063376664343362343961363832653431393765306538 Feb 9 00:50:09.546278 env[1127]: time="2024-02-09T00:50:09.546209174Z" level=info msg="StartContainer for \"c8bd100c7fd43b49a682e4197e0e8c61216581471e07d68635fdf137862fcf1f\" returns successfully" Feb 9 00:50:09.930032 kubelet[2019]: E0209 00:50:09.930002 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:50:09.936955 kubelet[2019]: I0209 00:50:09.936885 2019 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-b874j" podStartSLOduration=40.936843869 podCreationTimestamp="2024-02-09 00:49:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 00:50:09.936737259 +0000 UTC m=+55.218374328" watchObservedRunningTime="2024-02-09 00:50:09.936843869 +0000 UTC m=+55.218480928" Feb 9 00:50:09.947000 audit[3992]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=3992 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:50:09.947000 audit[3992]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffcb4577900 a2=0 a3=7ffcb45778ec items=0 ppid=2178 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:09.947000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:50:09.949000 audit[3992]: NETFILTER_CFG table=nat:110 family=2 entries=44 op=nft_register_rule pid=3992 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:50:09.949000 audit[3992]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffcb4577900 a2=0 a3=7ffcb45778ec items=0 ppid=2178 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:09.949000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:50:09.959000 audit[3994]: NETFILTER_CFG table=filter:111 family=2 entries=8 op=nft_register_rule pid=3994 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:50:09.959000 audit[3994]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffc0e9ac580 a2=0 a3=7ffc0e9ac56c items=0 ppid=2178 pid=3994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:09.959000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:50:09.963000 audit[3994]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=3994 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:50:09.963000 audit[3994]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7ffc0e9ac580 a2=0 a3=7ffc0e9ac56c items=0 ppid=2178 pid=3994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:09.963000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:50:10.642000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 00:50:10.642000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 00:50:10.642000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000dba880 a2=fc6 a3=0 items=0 ppid=1762 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 key=(null) Feb 9 00:50:10.642000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001898f00 a2=fc6 a3=0 items=0 ppid=1762 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 key=(null) Feb 9 00:50:10.642000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 00:50:10.642000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 00:50:10.724381 env[1127]: time="2024-02-09T00:50:10.724319225Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:50:10.725978 env[1127]: time="2024-02-09T00:50:10.725931850Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:50:10.727319 env[1127]: time="2024-02-09T00:50:10.727294987Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:50:10.728605 env[1127]: time="2024-02-09T00:50:10.728569238Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:50:10.729071 env[1127]: time="2024-02-09T00:50:10.729040722Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 9 00:50:10.729644 env[1127]: time="2024-02-09T00:50:10.729567351Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 9 00:50:10.730536 env[1127]: time="2024-02-09T00:50:10.730505019Z" level=info msg="CreateContainer within sandbox \"dc800238c510b1e612f264f867b05dcdf076d868ed9efa3dfc9fd7598bf11f87\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 00:50:10.743496 env[1127]: time="2024-02-09T00:50:10.743453941Z" level=info msg="CreateContainer within sandbox \"dc800238c510b1e612f264f867b05dcdf076d868ed9efa3dfc9fd7598bf11f87\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"dd820276cfff2b5a9b137902366d24917f5f2a6752f6050f2be6b19b8a30653a\"" Feb 9 00:50:10.743931 env[1127]: time="2024-02-09T00:50:10.743897995Z" level=info msg="StartContainer for \"dd820276cfff2b5a9b137902366d24917f5f2a6752f6050f2be6b19b8a30653a\"" Feb 9 00:50:10.759855 systemd[1]: Started cri-containerd-dd820276cfff2b5a9b137902366d24917f5f2a6752f6050f2be6b19b8a30653a.scope. Feb 9 00:50:10.770000 audit[4004]: AVC avc: denied { perfmon } for pid=4004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:10.770000 audit[4004]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3597 pid=4004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:10.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464383230323736636666663262356139623133373930323336366432 Feb 9 00:50:10.770000 audit[4004]: AVC avc: denied { bpf } for pid=4004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:10.770000 audit[4004]: AVC avc: denied { bpf } for pid=4004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:10.770000 audit[4004]: AVC avc: denied { bpf } for pid=4004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:10.770000 audit[4004]: AVC avc: denied { perfmon } for pid=4004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:10.770000 audit[4004]: AVC avc: denied { perfmon } for pid=4004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:10.770000 audit[4004]: AVC avc: denied { perfmon } for pid=4004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:10.770000 audit[4004]: AVC avc: denied { perfmon } for pid=4004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:10.770000 audit[4004]: AVC avc: denied { perfmon } for pid=4004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:10.770000 audit[4004]: AVC avc: denied { bpf } for pid=4004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:10.770000 audit[4004]: AVC avc: denied { bpf } for pid=4004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:10.770000 audit: BPF prog-id=176 op=LOAD Feb 9 00:50:10.770000 audit[4004]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003ce180 items=0 ppid=3597 pid=4004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:10.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464383230323736636666663262356139623133373930323336366432 Feb 9 00:50:10.770000 audit[4004]: AVC avc: denied { bpf } for pid=4004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:10.770000 audit[4004]: AVC avc: denied { bpf } for pid=4004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:10.770000 audit[4004]: AVC avc: denied { perfmon } for pid=4004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:10.770000 audit[4004]: AVC avc: denied { perfmon } for pid=4004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:10.770000 audit[4004]: AVC avc: denied { perfmon } for pid=4004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:10.770000 audit[4004]: AVC avc: denied { perfmon } for pid=4004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:10.770000 audit[4004]: AVC avc: denied { perfmon } for pid=4004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:10.770000 audit[4004]: AVC avc: denied { bpf } for pid=4004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:10.770000 audit[4004]: AVC avc: denied { bpf } for pid=4004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:10.770000 audit: BPF prog-id=177 op=LOAD Feb 9 00:50:10.770000 audit[4004]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003ce1c8 items=0 ppid=3597 pid=4004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:10.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464383230323736636666663262356139623133373930323336366432 Feb 9 00:50:10.770000 audit: BPF prog-id=177 op=UNLOAD Feb 9 00:50:10.770000 audit: BPF prog-id=176 op=UNLOAD Feb 9 00:50:10.770000 audit[4004]: AVC avc: denied { bpf } for pid=4004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:10.770000 audit[4004]: AVC avc: denied { bpf } for pid=4004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:10.770000 audit[4004]: AVC avc: denied { bpf } for pid=4004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:10.770000 audit[4004]: AVC avc: denied { perfmon } for pid=4004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:10.770000 audit[4004]: AVC avc: denied { perfmon } for pid=4004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:10.770000 audit[4004]: AVC avc: denied { perfmon } for pid=4004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:10.770000 audit[4004]: AVC avc: denied { perfmon } for pid=4004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:10.770000 audit[4004]: AVC avc: denied { perfmon } for pid=4004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:10.770000 audit[4004]: AVC avc: denied { bpf } for pid=4004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:10.770000 audit[4004]: AVC avc: denied { bpf } for pid=4004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:10.770000 audit: BPF prog-id=178 op=LOAD Feb 9 00:50:10.770000 audit[4004]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003ce258 items=0 ppid=3597 pid=4004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:10.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464383230323736636666663262356139623133373930323336366432 Feb 9 00:50:10.786200 env[1127]: time="2024-02-09T00:50:10.786158745Z" level=info msg="StartContainer for \"dd820276cfff2b5a9b137902366d24917f5f2a6752f6050f2be6b19b8a30653a\" returns successfully" Feb 9 00:50:10.909000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c643,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 00:50:10.909000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00e1f4f30 a2=fc6 a3=0 items=0 ppid=1727 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c643,c887 key=(null) Feb 9 00:50:10.909000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c643,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 00:50:10.909000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 9 00:50:10.909000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00df570b0 a2=fc6 a3=0 items=0 ppid=1727 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c643,c887 key=(null) Feb 9 00:50:10.909000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 9 00:50:10.915000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c643,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 00:50:10.915000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00e1f4f60 a2=fc6 a3=0 items=0 ppid=1727 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c643,c887 key=(null) Feb 9 00:50:10.915000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 9 00:50:10.915000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=521018 scontext=system_u:system_r:svirt_lxc_net_t:s0:c643,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 00:50:10.915000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00de94e40 a2=fc6 a3=0 items=0 ppid=1727 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c643,c887 key=(null) Feb 9 00:50:10.915000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c643,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 00:50:10.915000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 9 00:50:10.915000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00b02b9e0 a2=fc6 a3=0 items=0 ppid=1727 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c643,c887 key=(null) Feb 9 00:50:10.915000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 9 00:50:10.916000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c643,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 00:50:10.916000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c012467760 a2=fc6 a3=0 items=0 ppid=1727 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c643,c887 key=(null) Feb 9 00:50:10.916000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 9 00:50:10.932766 kubelet[2019]: E0209 00:50:10.932746 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:50:10.952072 systemd-networkd[1023]: cali868e0ccf60b: Gained IPv6LL Feb 9 00:50:11.934551 kubelet[2019]: E0209 00:50:11.934525 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:50:14.432301 systemd[1]: Started sshd@14-10.0.0.84:22-10.0.0.1:51292.service. Feb 9 00:50:14.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.84:22-10.0.0.1:51292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:14.433156 kernel: kauditd_printk_skb: 219 callbacks suppressed Feb 9 00:50:14.433287 kernel: audit: type=1130 audit(1707439814.431:1375): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.84:22-10.0.0.1:51292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:14.470000 audit[4044]: USER_ACCT pid=4044 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:14.471994 sshd[4044]: Accepted publickey for core from 10.0.0.1 port 51292 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:50:14.474643 sshd[4044]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:50:14.473000 audit[4044]: CRED_ACQ pid=4044 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:14.479931 kernel: audit: type=1101 audit(1707439814.470:1376): pid=4044 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:14.480016 kernel: audit: type=1103 audit(1707439814.473:1377): pid=4044 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:14.480042 kernel: audit: type=1006 audit(1707439814.473:1378): pid=4044 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 9 00:50:14.479433 systemd-logind[1111]: New session 15 of user core. Feb 9 00:50:14.479882 systemd[1]: Started session-15.scope. Feb 9 00:50:14.473000 audit[4044]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe465a060 a2=3 a3=0 items=0 ppid=1 pid=4044 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:14.486063 kernel: audit: type=1300 audit(1707439814.473:1378): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe465a060 a2=3 a3=0 items=0 ppid=1 pid=4044 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:14.487446 kernel: audit: type=1327 audit(1707439814.473:1378): proctitle=737368643A20636F7265205B707269765D Feb 9 00:50:14.473000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 00:50:14.493000 audit[4044]: USER_START pid=4044 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:14.496000 audit[4046]: CRED_ACQ pid=4046 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:14.502766 kernel: audit: type=1105 audit(1707439814.493:1379): pid=4044 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:14.502818 kernel: audit: type=1103 audit(1707439814.496:1380): pid=4046 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:14.608514 sshd[4044]: pam_unix(sshd:session): session closed for user core Feb 9 00:50:14.608000 audit[4044]: USER_END pid=4044 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:14.611371 systemd[1]: sshd@14-10.0.0.84:22-10.0.0.1:51292.service: Deactivated successfully. Feb 9 00:50:14.612049 systemd[1]: session-15.scope: Deactivated successfully. Feb 9 00:50:14.612863 systemd-logind[1111]: Session 15 logged out. Waiting for processes to exit. Feb 9 00:50:14.614090 systemd-logind[1111]: Removed session 15. Feb 9 00:50:14.609000 audit[4044]: CRED_DISP pid=4044 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:14.619104 kernel: audit: type=1106 audit(1707439814.608:1381): pid=4044 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:14.619285 kernel: audit: type=1104 audit(1707439814.609:1382): pid=4044 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:14.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.84:22-10.0.0.1:51292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:14.794916 env[1127]: time="2024-02-09T00:50:14.794818049Z" level=info msg="StopPodSandbox for \"7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4\"" Feb 9 00:50:14.850731 env[1127]: 2024-02-09 00:50:14.823 [WARNING][4072] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--h9gqp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"83b2cfd5-6e1c-47b1-936c-f1d68fb2b441", ResourceVersion:"795", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 49, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"dc800238c510b1e612f264f867b05dcdf076d868ed9efa3dfc9fd7598bf11f87", Pod:"csi-node-driver-h9gqp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali4a6435fed60", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:50:14.850731 env[1127]: 2024-02-09 00:50:14.823 [INFO][4072] k8s.go 578: Cleaning up netns ContainerID="7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" Feb 9 00:50:14.850731 env[1127]: 2024-02-09 00:50:14.823 [INFO][4072] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" iface="eth0" netns="" Feb 9 00:50:14.850731 env[1127]: 2024-02-09 00:50:14.823 [INFO][4072] k8s.go 585: Releasing IP address(es) ContainerID="7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" Feb 9 00:50:14.850731 env[1127]: 2024-02-09 00:50:14.823 [INFO][4072] utils.go 188: Calico CNI releasing IP address ContainerID="7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" Feb 9 00:50:14.850731 env[1127]: 2024-02-09 00:50:14.840 [INFO][4081] ipam_plugin.go 415: Releasing address using handleID ContainerID="7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" HandleID="k8s-pod-network.7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" Workload="localhost-k8s-csi--node--driver--h9gqp-eth0" Feb 9 00:50:14.850731 env[1127]: 2024-02-09 00:50:14.840 [INFO][4081] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:50:14.850731 env[1127]: 2024-02-09 00:50:14.840 [INFO][4081] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:50:14.850731 env[1127]: 2024-02-09 00:50:14.846 [WARNING][4081] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" HandleID="k8s-pod-network.7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" Workload="localhost-k8s-csi--node--driver--h9gqp-eth0" Feb 9 00:50:14.850731 env[1127]: 2024-02-09 00:50:14.846 [INFO][4081] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" HandleID="k8s-pod-network.7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" Workload="localhost-k8s-csi--node--driver--h9gqp-eth0" Feb 9 00:50:14.850731 env[1127]: 2024-02-09 00:50:14.848 [INFO][4081] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:50:14.850731 env[1127]: 2024-02-09 00:50:14.849 [INFO][4072] k8s.go 591: Teardown processing complete. ContainerID="7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" Feb 9 00:50:14.851185 env[1127]: time="2024-02-09T00:50:14.850849553Z" level=info msg="TearDown network for sandbox \"7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4\" successfully" Feb 9 00:50:14.851185 env[1127]: time="2024-02-09T00:50:14.850874772Z" level=info msg="StopPodSandbox for \"7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4\" returns successfully" Feb 9 00:50:14.851262 env[1127]: time="2024-02-09T00:50:14.851244667Z" level=info msg="RemovePodSandbox for \"7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4\"" Feb 9 00:50:14.851297 env[1127]: time="2024-02-09T00:50:14.851268282Z" level=info msg="Forcibly stopping sandbox \"7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4\"" Feb 9 00:50:14.907914 env[1127]: 2024-02-09 00:50:14.880 [WARNING][4105] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--h9gqp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"83b2cfd5-6e1c-47b1-936c-f1d68fb2b441", ResourceVersion:"795", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 49, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"dc800238c510b1e612f264f867b05dcdf076d868ed9efa3dfc9fd7598bf11f87", Pod:"csi-node-driver-h9gqp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali4a6435fed60", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:50:14.907914 env[1127]: 2024-02-09 00:50:14.880 [INFO][4105] k8s.go 578: Cleaning up netns ContainerID="7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" Feb 9 00:50:14.907914 env[1127]: 2024-02-09 00:50:14.880 [INFO][4105] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" iface="eth0" netns="" Feb 9 00:50:14.907914 env[1127]: 2024-02-09 00:50:14.880 [INFO][4105] k8s.go 585: Releasing IP address(es) ContainerID="7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" Feb 9 00:50:14.907914 env[1127]: 2024-02-09 00:50:14.880 [INFO][4105] utils.go 188: Calico CNI releasing IP address ContainerID="7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" Feb 9 00:50:14.907914 env[1127]: 2024-02-09 00:50:14.897 [INFO][4113] ipam_plugin.go 415: Releasing address using handleID ContainerID="7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" HandleID="k8s-pod-network.7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" Workload="localhost-k8s-csi--node--driver--h9gqp-eth0" Feb 9 00:50:14.907914 env[1127]: 2024-02-09 00:50:14.897 [INFO][4113] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:50:14.907914 env[1127]: 2024-02-09 00:50:14.898 [INFO][4113] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:50:14.907914 env[1127]: 2024-02-09 00:50:14.903 [WARNING][4113] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" HandleID="k8s-pod-network.7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" Workload="localhost-k8s-csi--node--driver--h9gqp-eth0" Feb 9 00:50:14.907914 env[1127]: 2024-02-09 00:50:14.904 [INFO][4113] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" HandleID="k8s-pod-network.7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" Workload="localhost-k8s-csi--node--driver--h9gqp-eth0" Feb 9 00:50:14.907914 env[1127]: 2024-02-09 00:50:14.905 [INFO][4113] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:50:14.907914 env[1127]: 2024-02-09 00:50:14.906 [INFO][4105] k8s.go 591: Teardown processing complete. ContainerID="7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4" Feb 9 00:50:14.908428 env[1127]: time="2024-02-09T00:50:14.907925495Z" level=info msg="TearDown network for sandbox \"7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4\" successfully" Feb 9 00:50:14.947971 env[1127]: time="2024-02-09T00:50:14.947924545Z" level=info msg="RemovePodSandbox \"7e8a084f588ff6fb1308eae87ef9d158245f8a650330e5733e6b296c6de2f0c4\" returns successfully" Feb 9 00:50:14.948321 env[1127]: time="2024-02-09T00:50:14.948286504Z" level=info msg="StopPodSandbox for \"24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873\"" Feb 9 00:50:15.005726 env[1127]: 2024-02-09 00:50:14.977 [WARNING][4135] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--b874j-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"2536b126-e3ee-4a37-873f-9284c092f8da", ResourceVersion:"856", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 49, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"53b9f9d348a8830fd3405852d0d72cb7dc8568f0341859570255e8bbb1082741", Pod:"coredns-5d78c9869d-b874j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali868e0ccf60b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:50:15.005726 env[1127]: 2024-02-09 00:50:14.977 [INFO][4135] k8s.go 578: Cleaning up netns ContainerID="24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" Feb 9 00:50:15.005726 env[1127]: 2024-02-09 00:50:14.977 [INFO][4135] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" iface="eth0" netns="" Feb 9 00:50:15.005726 env[1127]: 2024-02-09 00:50:14.977 [INFO][4135] k8s.go 585: Releasing IP address(es) ContainerID="24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" Feb 9 00:50:15.005726 env[1127]: 2024-02-09 00:50:14.977 [INFO][4135] utils.go 188: Calico CNI releasing IP address ContainerID="24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" Feb 9 00:50:15.005726 env[1127]: 2024-02-09 00:50:14.996 [INFO][4143] ipam_plugin.go 415: Releasing address using handleID ContainerID="24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" HandleID="k8s-pod-network.24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" Workload="localhost-k8s-coredns--5d78c9869d--b874j-eth0" Feb 9 00:50:15.005726 env[1127]: 2024-02-09 00:50:14.996 [INFO][4143] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:50:15.005726 env[1127]: 2024-02-09 00:50:14.997 [INFO][4143] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:50:15.005726 env[1127]: 2024-02-09 00:50:15.002 [WARNING][4143] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" HandleID="k8s-pod-network.24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" Workload="localhost-k8s-coredns--5d78c9869d--b874j-eth0" Feb 9 00:50:15.005726 env[1127]: 2024-02-09 00:50:15.002 [INFO][4143] ipam_plugin.go 443: Releasing address using workloadID ContainerID="24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" HandleID="k8s-pod-network.24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" Workload="localhost-k8s-coredns--5d78c9869d--b874j-eth0" Feb 9 00:50:15.005726 env[1127]: 2024-02-09 00:50:15.003 [INFO][4143] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:50:15.005726 env[1127]: 2024-02-09 00:50:15.004 [INFO][4135] k8s.go 591: Teardown processing complete. ContainerID="24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" Feb 9 00:50:15.006269 env[1127]: time="2024-02-09T00:50:15.005731282Z" level=info msg="TearDown network for sandbox \"24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873\" successfully" Feb 9 00:50:15.006269 env[1127]: time="2024-02-09T00:50:15.005754306Z" level=info msg="StopPodSandbox for \"24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873\" returns successfully" Feb 9 00:50:15.006269 env[1127]: time="2024-02-09T00:50:15.006196801Z" level=info msg="RemovePodSandbox for \"24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873\"" Feb 9 00:50:15.006269 env[1127]: time="2024-02-09T00:50:15.006230817Z" level=info msg="Forcibly stopping sandbox \"24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873\"" Feb 9 00:50:15.073237 env[1127]: 2024-02-09 00:50:15.034 [WARNING][4165] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--b874j-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"2536b126-e3ee-4a37-873f-9284c092f8da", ResourceVersion:"856", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 49, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"53b9f9d348a8830fd3405852d0d72cb7dc8568f0341859570255e8bbb1082741", Pod:"coredns-5d78c9869d-b874j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali868e0ccf60b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:50:15.073237 env[1127]: 2024-02-09 00:50:15.034 [INFO][4165] k8s.go 578: Cleaning up netns ContainerID="24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" Feb 9 00:50:15.073237 env[1127]: 2024-02-09 00:50:15.034 [INFO][4165] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" iface="eth0" netns="" Feb 9 00:50:15.073237 env[1127]: 2024-02-09 00:50:15.035 [INFO][4165] k8s.go 585: Releasing IP address(es) ContainerID="24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" Feb 9 00:50:15.073237 env[1127]: 2024-02-09 00:50:15.035 [INFO][4165] utils.go 188: Calico CNI releasing IP address ContainerID="24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" Feb 9 00:50:15.073237 env[1127]: 2024-02-09 00:50:15.054 [INFO][4173] ipam_plugin.go 415: Releasing address using handleID ContainerID="24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" HandleID="k8s-pod-network.24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" Workload="localhost-k8s-coredns--5d78c9869d--b874j-eth0" Feb 9 00:50:15.073237 env[1127]: 2024-02-09 00:50:15.054 [INFO][4173] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:50:15.073237 env[1127]: 2024-02-09 00:50:15.055 [INFO][4173] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:50:15.073237 env[1127]: 2024-02-09 00:50:15.061 [WARNING][4173] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" HandleID="k8s-pod-network.24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" Workload="localhost-k8s-coredns--5d78c9869d--b874j-eth0" Feb 9 00:50:15.073237 env[1127]: 2024-02-09 00:50:15.061 [INFO][4173] ipam_plugin.go 443: Releasing address using workloadID ContainerID="24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" HandleID="k8s-pod-network.24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" Workload="localhost-k8s-coredns--5d78c9869d--b874j-eth0" Feb 9 00:50:15.073237 env[1127]: 2024-02-09 00:50:15.070 [INFO][4173] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:50:15.073237 env[1127]: 2024-02-09 00:50:15.071 [INFO][4165] k8s.go 591: Teardown processing complete. ContainerID="24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873" Feb 9 00:50:15.074130 env[1127]: time="2024-02-09T00:50:15.073262713Z" level=info msg="TearDown network for sandbox \"24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873\" successfully" Feb 9 00:50:15.076124 env[1127]: time="2024-02-09T00:50:15.076100672Z" level=info msg="RemovePodSandbox \"24ec8a360b526e83a55ffde9475540a7fb327bc4a3c46c49083ca0cf92416873\" returns successfully" Feb 9 00:50:15.076591 env[1127]: time="2024-02-09T00:50:15.076560120Z" level=info msg="StopPodSandbox for \"c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954\"" Feb 9 00:50:15.136633 env[1127]: 2024-02-09 00:50:15.108 [WARNING][4196] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--qmz9r-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"96b676bf-04bb-4866-aa59-8b21202275e7", ResourceVersion:"812", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 49, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a5bc70d916b17fdea347bfc1d50519ac264b97fc1f4db80100d4a8e6289871a1", Pod:"coredns-5d78c9869d-qmz9r", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali857f8599cfc", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:50:15.136633 env[1127]: 2024-02-09 00:50:15.108 [INFO][4196] k8s.go 578: Cleaning up netns ContainerID="c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" Feb 9 00:50:15.136633 env[1127]: 2024-02-09 00:50:15.108 [INFO][4196] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" iface="eth0" netns="" Feb 9 00:50:15.136633 env[1127]: 2024-02-09 00:50:15.108 [INFO][4196] k8s.go 585: Releasing IP address(es) ContainerID="c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" Feb 9 00:50:15.136633 env[1127]: 2024-02-09 00:50:15.108 [INFO][4196] utils.go 188: Calico CNI releasing IP address ContainerID="c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" Feb 9 00:50:15.136633 env[1127]: 2024-02-09 00:50:15.125 [INFO][4204] ipam_plugin.go 415: Releasing address using handleID ContainerID="c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" HandleID="k8s-pod-network.c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" Workload="localhost-k8s-coredns--5d78c9869d--qmz9r-eth0" Feb 9 00:50:15.136633 env[1127]: 2024-02-09 00:50:15.125 [INFO][4204] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:50:15.136633 env[1127]: 2024-02-09 00:50:15.125 [INFO][4204] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:50:15.136633 env[1127]: 2024-02-09 00:50:15.133 [WARNING][4204] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" HandleID="k8s-pod-network.c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" Workload="localhost-k8s-coredns--5d78c9869d--qmz9r-eth0" Feb 9 00:50:15.136633 env[1127]: 2024-02-09 00:50:15.133 [INFO][4204] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" HandleID="k8s-pod-network.c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" Workload="localhost-k8s-coredns--5d78c9869d--qmz9r-eth0" Feb 9 00:50:15.136633 env[1127]: 2024-02-09 00:50:15.134 [INFO][4204] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:50:15.136633 env[1127]: 2024-02-09 00:50:15.135 [INFO][4196] k8s.go 591: Teardown processing complete. ContainerID="c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" Feb 9 00:50:15.137239 env[1127]: time="2024-02-09T00:50:15.136642215Z" level=info msg="TearDown network for sandbox \"c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954\" successfully" Feb 9 00:50:15.137239 env[1127]: time="2024-02-09T00:50:15.136672454Z" level=info msg="StopPodSandbox for \"c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954\" returns successfully" Feb 9 00:50:15.137239 env[1127]: time="2024-02-09T00:50:15.137174213Z" level=info msg="RemovePodSandbox for \"c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954\"" Feb 9 00:50:15.137330 env[1127]: time="2024-02-09T00:50:15.137221805Z" level=info msg="Forcibly stopping sandbox \"c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954\"" Feb 9 00:50:15.210734 env[1127]: 2024-02-09 00:50:15.173 [WARNING][4226] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--qmz9r-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"96b676bf-04bb-4866-aa59-8b21202275e7", ResourceVersion:"812", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 49, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a5bc70d916b17fdea347bfc1d50519ac264b97fc1f4db80100d4a8e6289871a1", Pod:"coredns-5d78c9869d-qmz9r", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali857f8599cfc", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:50:15.210734 env[1127]: 2024-02-09 00:50:15.174 [INFO][4226] k8s.go 578: Cleaning up netns ContainerID="c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" Feb 9 00:50:15.210734 env[1127]: 2024-02-09 00:50:15.174 [INFO][4226] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" iface="eth0" netns="" Feb 9 00:50:15.210734 env[1127]: 2024-02-09 00:50:15.174 [INFO][4226] k8s.go 585: Releasing IP address(es) ContainerID="c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" Feb 9 00:50:15.210734 env[1127]: 2024-02-09 00:50:15.174 [INFO][4226] utils.go 188: Calico CNI releasing IP address ContainerID="c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" Feb 9 00:50:15.210734 env[1127]: 2024-02-09 00:50:15.199 [INFO][4234] ipam_plugin.go 415: Releasing address using handleID ContainerID="c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" HandleID="k8s-pod-network.c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" Workload="localhost-k8s-coredns--5d78c9869d--qmz9r-eth0" Feb 9 00:50:15.210734 env[1127]: 2024-02-09 00:50:15.200 [INFO][4234] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:50:15.210734 env[1127]: 2024-02-09 00:50:15.201 [INFO][4234] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:50:15.210734 env[1127]: 2024-02-09 00:50:15.207 [WARNING][4234] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" HandleID="k8s-pod-network.c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" Workload="localhost-k8s-coredns--5d78c9869d--qmz9r-eth0" Feb 9 00:50:15.210734 env[1127]: 2024-02-09 00:50:15.207 [INFO][4234] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" HandleID="k8s-pod-network.c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" Workload="localhost-k8s-coredns--5d78c9869d--qmz9r-eth0" Feb 9 00:50:15.210734 env[1127]: 2024-02-09 00:50:15.208 [INFO][4234] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:50:15.210734 env[1127]: 2024-02-09 00:50:15.209 [INFO][4226] k8s.go 591: Teardown processing complete. ContainerID="c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954" Feb 9 00:50:15.211237 env[1127]: time="2024-02-09T00:50:15.210765264Z" level=info msg="TearDown network for sandbox \"c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954\" successfully" Feb 9 00:50:15.213515 env[1127]: time="2024-02-09T00:50:15.213490046Z" level=info msg="RemovePodSandbox \"c8211b4bf3515596bc67f5ebf558ecf768b5d1a181a5a31d5337a80cf36cf954\" returns successfully" Feb 9 00:50:15.214038 env[1127]: time="2024-02-09T00:50:15.214000371Z" level=info msg="StopPodSandbox for \"f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954\"" Feb 9 00:50:15.276917 env[1127]: 2024-02-09 00:50:15.243 [WARNING][4258] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--785cff5fd--dmbq4-eth0", GenerateName:"calico-kube-controllers-785cff5fd-", Namespace:"calico-system", SelfLink:"", UID:"9649c383-e4cb-4dd0-8777-7860935dfc41", ResourceVersion:"801", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 49, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"785cff5fd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5d80bfe526d404377c7740a1c883b740011846c31a6e53eb8c23a3f0d6f8a4d4", Pod:"calico-kube-controllers-785cff5fd-dmbq4", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali1f0acb0236e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:50:15.276917 env[1127]: 2024-02-09 00:50:15.243 [INFO][4258] k8s.go 578: Cleaning up netns ContainerID="f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" Feb 9 00:50:15.276917 env[1127]: 2024-02-09 00:50:15.243 [INFO][4258] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" iface="eth0" netns="" Feb 9 00:50:15.276917 env[1127]: 2024-02-09 00:50:15.243 [INFO][4258] k8s.go 585: Releasing IP address(es) ContainerID="f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" Feb 9 00:50:15.276917 env[1127]: 2024-02-09 00:50:15.243 [INFO][4258] utils.go 188: Calico CNI releasing IP address ContainerID="f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" Feb 9 00:50:15.276917 env[1127]: 2024-02-09 00:50:15.267 [INFO][4267] ipam_plugin.go 415: Releasing address using handleID ContainerID="f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" HandleID="k8s-pod-network.f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" Workload="localhost-k8s-calico--kube--controllers--785cff5fd--dmbq4-eth0" Feb 9 00:50:15.276917 env[1127]: 2024-02-09 00:50:15.267 [INFO][4267] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:50:15.276917 env[1127]: 2024-02-09 00:50:15.267 [INFO][4267] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:50:15.276917 env[1127]: 2024-02-09 00:50:15.273 [WARNING][4267] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" HandleID="k8s-pod-network.f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" Workload="localhost-k8s-calico--kube--controllers--785cff5fd--dmbq4-eth0" Feb 9 00:50:15.276917 env[1127]: 2024-02-09 00:50:15.273 [INFO][4267] ipam_plugin.go 443: Releasing address using workloadID ContainerID="f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" HandleID="k8s-pod-network.f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" Workload="localhost-k8s-calico--kube--controllers--785cff5fd--dmbq4-eth0" Feb 9 00:50:15.276917 env[1127]: 2024-02-09 00:50:15.274 [INFO][4267] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:50:15.276917 env[1127]: 2024-02-09 00:50:15.275 [INFO][4258] k8s.go 591: Teardown processing complete. ContainerID="f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" Feb 9 00:50:15.277466 env[1127]: time="2024-02-09T00:50:15.277412156Z" level=info msg="TearDown network for sandbox \"f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954\" successfully" Feb 9 00:50:15.277466 env[1127]: time="2024-02-09T00:50:15.277447374Z" level=info msg="StopPodSandbox for \"f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954\" returns successfully" Feb 9 00:50:15.277962 env[1127]: time="2024-02-09T00:50:15.277910348Z" level=info msg="RemovePodSandbox for \"f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954\"" Feb 9 00:50:15.278121 env[1127]: time="2024-02-09T00:50:15.277964793Z" level=info msg="Forcibly stopping sandbox \"f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954\"" Feb 9 00:50:15.337296 env[1127]: 2024-02-09 00:50:15.309 [WARNING][4290] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--785cff5fd--dmbq4-eth0", GenerateName:"calico-kube-controllers-785cff5fd-", Namespace:"calico-system", SelfLink:"", UID:"9649c383-e4cb-4dd0-8777-7860935dfc41", ResourceVersion:"801", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 49, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"785cff5fd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5d80bfe526d404377c7740a1c883b740011846c31a6e53eb8c23a3f0d6f8a4d4", Pod:"calico-kube-controllers-785cff5fd-dmbq4", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali1f0acb0236e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:50:15.337296 env[1127]: 2024-02-09 00:50:15.309 [INFO][4290] k8s.go 578: Cleaning up netns ContainerID="f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" Feb 9 00:50:15.337296 env[1127]: 2024-02-09 00:50:15.309 [INFO][4290] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" iface="eth0" netns="" Feb 9 00:50:15.337296 env[1127]: 2024-02-09 00:50:15.309 [INFO][4290] k8s.go 585: Releasing IP address(es) ContainerID="f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" Feb 9 00:50:15.337296 env[1127]: 2024-02-09 00:50:15.309 [INFO][4290] utils.go 188: Calico CNI releasing IP address ContainerID="f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" Feb 9 00:50:15.337296 env[1127]: 2024-02-09 00:50:15.325 [INFO][4297] ipam_plugin.go 415: Releasing address using handleID ContainerID="f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" HandleID="k8s-pod-network.f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" Workload="localhost-k8s-calico--kube--controllers--785cff5fd--dmbq4-eth0" Feb 9 00:50:15.337296 env[1127]: 2024-02-09 00:50:15.325 [INFO][4297] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:50:15.337296 env[1127]: 2024-02-09 00:50:15.325 [INFO][4297] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:50:15.337296 env[1127]: 2024-02-09 00:50:15.332 [WARNING][4297] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" HandleID="k8s-pod-network.f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" Workload="localhost-k8s-calico--kube--controllers--785cff5fd--dmbq4-eth0" Feb 9 00:50:15.337296 env[1127]: 2024-02-09 00:50:15.332 [INFO][4297] ipam_plugin.go 443: Releasing address using workloadID ContainerID="f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" HandleID="k8s-pod-network.f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" Workload="localhost-k8s-calico--kube--controllers--785cff5fd--dmbq4-eth0" Feb 9 00:50:15.337296 env[1127]: 2024-02-09 00:50:15.333 [INFO][4297] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:50:15.337296 env[1127]: 2024-02-09 00:50:15.334 [INFO][4290] k8s.go 591: Teardown processing complete. ContainerID="f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954" Feb 9 00:50:15.337296 env[1127]: time="2024-02-09T00:50:15.336114438Z" level=info msg="TearDown network for sandbox \"f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954\" successfully" Feb 9 00:50:15.339866 env[1127]: time="2024-02-09T00:50:15.339833009Z" level=info msg="RemovePodSandbox \"f30329e232ca4427d07c9ab2bf2922fe5c6a81fb44d1a5b22a0095626566e954\" returns successfully" Feb 9 00:50:15.464026 env[1127]: time="2024-02-09T00:50:15.463972507Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:50:15.465554 env[1127]: time="2024-02-09T00:50:15.465491831Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:50:15.467338 env[1127]: time="2024-02-09T00:50:15.467296365Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:50:15.468894 env[1127]: time="2024-02-09T00:50:15.468865315Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:50:15.469595 env[1127]: time="2024-02-09T00:50:15.469556630Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 9 00:50:15.470163 env[1127]: time="2024-02-09T00:50:15.470140336Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 00:50:15.478391 env[1127]: time="2024-02-09T00:50:15.478353276Z" level=info msg="CreateContainer within sandbox \"5d80bfe526d404377c7740a1c883b740011846c31a6e53eb8c23a3f0d6f8a4d4\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 9 00:50:15.487623 env[1127]: time="2024-02-09T00:50:15.487584901Z" level=info msg="CreateContainer within sandbox \"5d80bfe526d404377c7740a1c883b740011846c31a6e53eb8c23a3f0d6f8a4d4\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"07048eebf94c325576814c182f247618b3f2d2cb817b66bd41ddfbdf6c9cd867\"" Feb 9 00:50:15.490979 env[1127]: time="2024-02-09T00:50:15.488074196Z" level=info msg="StartContainer for \"07048eebf94c325576814c182f247618b3f2d2cb817b66bd41ddfbdf6c9cd867\"" Feb 9 00:50:15.542303 systemd[1]: Started cri-containerd-07048eebf94c325576814c182f247618b3f2d2cb817b66bd41ddfbdf6c9cd867.scope. Feb 9 00:50:15.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.550000 audit: BPF prog-id=179 op=LOAD Feb 9 00:50:15.551000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.551000 audit[4314]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3711 pid=4314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:15.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037303438656562663934633332353537363831346331383266323437 Feb 9 00:50:15.551000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.551000 audit[4314]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3711 pid=4314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:15.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037303438656562663934633332353537363831346331383266323437 Feb 9 00:50:15.551000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.551000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.551000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.551000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.551000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.551000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.551000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.551000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.551000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.551000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.551000 audit: BPF prog-id=180 op=LOAD Feb 9 00:50:15.551000 audit[4314]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003543f0 items=0 ppid=3711 pid=4314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:15.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037303438656562663934633332353537363831346331383266323437 Feb 9 00:50:15.551000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.551000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.551000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.551000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.551000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.551000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.551000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.551000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.551000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.551000 audit: BPF prog-id=181 op=LOAD Feb 9 00:50:15.551000 audit[4314]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000354438 items=0 ppid=3711 pid=4314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:15.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037303438656562663934633332353537363831346331383266323437 Feb 9 00:50:15.551000 audit: BPF prog-id=181 op=UNLOAD Feb 9 00:50:15.551000 audit: BPF prog-id=180 op=UNLOAD Feb 9 00:50:15.551000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.551000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.551000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.551000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.551000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.551000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.551000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.551000 audit[4314]: AVC avc: denied { perfmon } for pid=4314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.551000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.551000 audit[4314]: AVC avc: denied { bpf } for pid=4314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:15.551000 audit: BPF prog-id=182 op=LOAD Feb 9 00:50:15.551000 audit[4314]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000354848 items=0 ppid=3711 pid=4314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:15.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037303438656562663934633332353537363831346331383266323437 Feb 9 00:50:15.576715 env[1127]: time="2024-02-09T00:50:15.576677355Z" level=info msg="StartContainer for \"07048eebf94c325576814c182f247618b3f2d2cb817b66bd41ddfbdf6c9cd867\" returns successfully" Feb 9 00:50:15.951910 kubelet[2019]: I0209 00:50:15.951636 2019 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-785cff5fd-dmbq4" podStartSLOduration=30.967405763 podCreationTimestamp="2024-02-09 00:49:35 +0000 UTC" firstStartedPulling="2024-02-09 00:50:05.485673538 +0000 UTC m=+50.767310607" lastFinishedPulling="2024-02-09 00:50:15.469863252 +0000 UTC m=+60.751500321" observedRunningTime="2024-02-09 00:50:15.950699266 +0000 UTC m=+61.232336335" watchObservedRunningTime="2024-02-09 00:50:15.951595477 +0000 UTC m=+61.233232546" Feb 9 00:50:17.379661 env[1127]: time="2024-02-09T00:50:17.379585464Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:50:17.381296 env[1127]: time="2024-02-09T00:50:17.381261896Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:50:17.382707 env[1127]: time="2024-02-09T00:50:17.382646124Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:50:17.383951 env[1127]: time="2024-02-09T00:50:17.383913889Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:50:17.384287 env[1127]: time="2024-02-09T00:50:17.384261559Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 9 00:50:17.386089 env[1127]: time="2024-02-09T00:50:17.386052772Z" level=info msg="CreateContainer within sandbox \"dc800238c510b1e612f264f867b05dcdf076d868ed9efa3dfc9fd7598bf11f87\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 00:50:17.409066 env[1127]: time="2024-02-09T00:50:17.409018729Z" level=info msg="CreateContainer within sandbox \"dc800238c510b1e612f264f867b05dcdf076d868ed9efa3dfc9fd7598bf11f87\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"d3eb5991e270a5bc828cb39161d74decae49da297660645a8b94ee4bc2d820e9\"" Feb 9 00:50:17.409618 env[1127]: time="2024-02-09T00:50:17.409560783Z" level=info msg="StartContainer for \"d3eb5991e270a5bc828cb39161d74decae49da297660645a8b94ee4bc2d820e9\"" Feb 9 00:50:17.427359 systemd[1]: Started cri-containerd-d3eb5991e270a5bc828cb39161d74decae49da297660645a8b94ee4bc2d820e9.scope. Feb 9 00:50:17.438000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:17.438000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3597 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:17.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433656235393931653237306135626338323863623339313631643734 Feb 9 00:50:17.438000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:17.438000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:17.438000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:17.438000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:17.438000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:17.438000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:17.438000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:17.438000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:17.438000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:17.438000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:17.438000 audit: BPF prog-id=183 op=LOAD Feb 9 00:50:17.438000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002edeb0 items=0 ppid=3597 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:17.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433656235393931653237306135626338323863623339313631643734 Feb 9 00:50:17.438000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:17.438000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:17.438000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:17.438000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:17.438000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:17.438000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:17.438000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:17.438000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:17.438000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:17.438000 audit: BPF prog-id=184 op=LOAD Feb 9 00:50:17.438000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002edef8 items=0 ppid=3597 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:17.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433656235393931653237306135626338323863623339313631643734 Feb 9 00:50:17.439000 audit: BPF prog-id=184 op=UNLOAD Feb 9 00:50:17.439000 audit: BPF prog-id=183 op=UNLOAD Feb 9 00:50:17.439000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:17.439000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:17.439000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:17.439000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:17.439000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:17.439000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:17.439000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:17.439000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:17.439000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:17.439000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:17.439000 audit: BPF prog-id=185 op=LOAD Feb 9 00:50:17.439000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002edf88 items=0 ppid=3597 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:17.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433656235393931653237306135626338323863623339313631643734 Feb 9 00:50:17.455585 env[1127]: time="2024-02-09T00:50:17.455538215Z" level=info msg="StartContainer for \"d3eb5991e270a5bc828cb39161d74decae49da297660645a8b94ee4bc2d820e9\" returns successfully" Feb 9 00:50:17.874423 kubelet[2019]: I0209 00:50:17.874395 2019 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 00:50:17.874837 kubelet[2019]: I0209 00:50:17.874492 2019 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 00:50:17.965182 kubelet[2019]: I0209 00:50:17.965149 2019 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-h9gqp" podStartSLOduration=30.950379265 podCreationTimestamp="2024-02-09 00:49:35 +0000 UTC" firstStartedPulling="2024-02-09 00:50:05.36979202 +0000 UTC m=+50.651429089" lastFinishedPulling="2024-02-09 00:50:17.384521691 +0000 UTC m=+62.666158760" observedRunningTime="2024-02-09 00:50:17.964665471 +0000 UTC m=+63.246302540" watchObservedRunningTime="2024-02-09 00:50:17.965108936 +0000 UTC m=+63.246746005" Feb 9 00:50:19.613532 systemd[1]: Started sshd@15-10.0.0.84:22-10.0.0.1:43100.service. Feb 9 00:50:19.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.84:22-10.0.0.1:43100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:19.614356 kernel: kauditd_printk_skb: 101 callbacks suppressed Feb 9 00:50:19.614463 kernel: audit: type=1130 audit(1707439819.612:1408): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.84:22-10.0.0.1:43100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:19.655000 audit[4405]: USER_ACCT pid=4405 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:19.656266 sshd[4405]: Accepted publickey for core from 10.0.0.1 port 43100 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:50:19.658970 kernel: audit: type=1101 audit(1707439819.655:1409): pid=4405 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:19.658000 audit[4405]: CRED_ACQ pid=4405 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:19.659589 sshd[4405]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:50:19.663146 kernel: audit: type=1103 audit(1707439819.658:1410): pid=4405 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:19.663205 kernel: audit: type=1006 audit(1707439819.658:1411): pid=4405 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 9 00:50:19.663224 kernel: audit: type=1300 audit(1707439819.658:1411): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd2878180 a2=3 a3=0 items=0 ppid=1 pid=4405 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:19.658000 audit[4405]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd2878180 a2=3 a3=0 items=0 ppid=1 pid=4405 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:19.664693 systemd[1]: Started session-16.scope. Feb 9 00:50:19.666795 kernel: audit: type=1327 audit(1707439819.658:1411): proctitle=737368643A20636F7265205B707269765D Feb 9 00:50:19.658000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 00:50:19.666051 systemd-logind[1111]: New session 16 of user core. Feb 9 00:50:19.676350 kernel: audit: type=1105 audit(1707439819.670:1412): pid=4405 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:19.676400 kernel: audit: type=1103 audit(1707439819.670:1413): pid=4407 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:19.670000 audit[4405]: USER_START pid=4405 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:19.670000 audit[4407]: CRED_ACQ pid=4407 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:19.768544 sshd[4405]: pam_unix(sshd:session): session closed for user core Feb 9 00:50:19.768000 audit[4405]: USER_END pid=4405 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:19.770857 systemd[1]: sshd@15-10.0.0.84:22-10.0.0.1:43100.service: Deactivated successfully. Feb 9 00:50:19.771855 systemd[1]: session-16.scope: Deactivated successfully. Feb 9 00:50:19.768000 audit[4405]: CRED_DISP pid=4405 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:19.772524 systemd-logind[1111]: Session 16 logged out. Waiting for processes to exit. Feb 9 00:50:19.773241 systemd-logind[1111]: Removed session 16. Feb 9 00:50:19.774583 kernel: audit: type=1106 audit(1707439819.768:1414): pid=4405 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:19.774625 kernel: audit: type=1104 audit(1707439819.768:1415): pid=4405 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:19.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.84:22-10.0.0.1:43100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:24.278055 kubelet[2019]: E0209 00:50:24.278029 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:50:24.773213 systemd[1]: Started sshd@16-10.0.0.84:22-10.0.0.1:43116.service. Feb 9 00:50:24.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.84:22-10.0.0.1:43116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:24.774033 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 00:50:24.774094 kernel: audit: type=1130 audit(1707439824.772:1417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.84:22-10.0.0.1:43116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:24.807000 audit[4465]: USER_ACCT pid=4465 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:24.808297 sshd[4465]: Accepted publickey for core from 10.0.0.1 port 43116 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:50:24.810000 audit[4465]: CRED_ACQ pid=4465 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:24.811723 sshd[4465]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:50:24.814192 kernel: audit: type=1101 audit(1707439824.807:1418): pid=4465 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:24.814237 kernel: audit: type=1103 audit(1707439824.810:1419): pid=4465 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:24.814276 kernel: audit: type=1006 audit(1707439824.810:1420): pid=4465 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 9 00:50:24.815233 systemd-logind[1111]: New session 17 of user core. Feb 9 00:50:24.810000 audit[4465]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc414dd700 a2=3 a3=0 items=0 ppid=1 pid=4465 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:24.815966 systemd[1]: Started session-17.scope. Feb 9 00:50:24.819343 kernel: audit: type=1300 audit(1707439824.810:1420): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc414dd700 a2=3 a3=0 items=0 ppid=1 pid=4465 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:24.819397 kernel: audit: type=1327 audit(1707439824.810:1420): proctitle=737368643A20636F7265205B707269765D Feb 9 00:50:24.810000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 00:50:24.819000 audit[4465]: USER_START pid=4465 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:24.823901 kernel: audit: type=1105 audit(1707439824.819:1421): pid=4465 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:24.823967 kernel: audit: type=1103 audit(1707439824.821:1422): pid=4467 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:24.821000 audit[4467]: CRED_ACQ pid=4467 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:24.920043 sshd[4465]: pam_unix(sshd:session): session closed for user core Feb 9 00:50:24.919000 audit[4465]: USER_END pid=4465 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:24.922312 systemd[1]: sshd@16-10.0.0.84:22-10.0.0.1:43116.service: Deactivated successfully. Feb 9 00:50:24.923075 systemd[1]: session-17.scope: Deactivated successfully. Feb 9 00:50:24.923687 systemd-logind[1111]: Session 17 logged out. Waiting for processes to exit. Feb 9 00:50:24.924366 systemd-logind[1111]: Removed session 17. Feb 9 00:50:24.920000 audit[4465]: CRED_DISP pid=4465 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:24.927654 kernel: audit: type=1106 audit(1707439824.919:1423): pid=4465 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:24.927718 kernel: audit: type=1104 audit(1707439824.920:1424): pid=4465 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:24.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.84:22-10.0.0.1:43116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:25.809124 kubelet[2019]: E0209 00:50:25.809089 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:50:26.830000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 00:50:26.830000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f840a0 a2=fc6 a3=0 items=0 ppid=1762 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 key=(null) Feb 9 00:50:26.830000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 00:50:26.830000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 00:50:26.830000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f840c0 a2=fc6 a3=0 items=0 ppid=1762 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 key=(null) Feb 9 00:50:26.830000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 00:50:26.831000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 00:50:26.831000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f84140 a2=fc6 a3=0 items=0 ppid=1762 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 key=(null) Feb 9 00:50:26.831000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 00:50:26.831000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 00:50:26.831000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0018a5980 a2=fc6 a3=0 items=0 ppid=1762 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c779,c868 key=(null) Feb 9 00:50:26.831000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 00:50:29.924773 systemd[1]: Started sshd@17-10.0.0.84:22-10.0.0.1:33716.service. Feb 9 00:50:29.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.84:22-10.0.0.1:33716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:29.925475 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 00:50:29.925576 kernel: audit: type=1130 audit(1707439829.923:1430): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.84:22-10.0.0.1:33716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:29.959000 audit[4482]: USER_ACCT pid=4482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:29.961070 sshd[4482]: Accepted publickey for core from 10.0.0.1 port 33716 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:50:29.962000 audit[4482]: CRED_ACQ pid=4482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:29.963860 sshd[4482]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:50:29.965998 kernel: audit: type=1101 audit(1707439829.959:1431): pid=4482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:29.966062 kernel: audit: type=1103 audit(1707439829.962:1432): pid=4482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:29.967761 kernel: audit: type=1006 audit(1707439829.962:1433): pid=4482 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Feb 9 00:50:29.967809 kernel: audit: type=1300 audit(1707439829.962:1433): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcac5dacf0 a2=3 a3=0 items=0 ppid=1 pid=4482 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:29.962000 audit[4482]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcac5dacf0 a2=3 a3=0 items=0 ppid=1 pid=4482 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:29.967377 systemd-logind[1111]: New session 18 of user core. Feb 9 00:50:29.968071 systemd[1]: Started session-18.scope. Feb 9 00:50:29.962000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 00:50:29.971134 kernel: audit: type=1327 audit(1707439829.962:1433): proctitle=737368643A20636F7265205B707269765D Feb 9 00:50:29.972000 audit[4482]: USER_START pid=4482 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:29.973000 audit[4484]: CRED_ACQ pid=4484 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:29.978332 kernel: audit: type=1105 audit(1707439829.972:1434): pid=4482 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:29.978377 kernel: audit: type=1103 audit(1707439829.973:1435): pid=4484 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:30.075134 sshd[4482]: pam_unix(sshd:session): session closed for user core Feb 9 00:50:30.075000 audit[4482]: USER_END pid=4482 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:30.078907 systemd[1]: Started sshd@18-10.0.0.84:22-10.0.0.1:33726.service. Feb 9 00:50:30.079461 systemd[1]: sshd@17-10.0.0.84:22-10.0.0.1:33716.service: Deactivated successfully. Feb 9 00:50:30.075000 audit[4482]: CRED_DISP pid=4482 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:30.080007 systemd[1]: session-18.scope: Deactivated successfully. Feb 9 00:50:30.081117 systemd-logind[1111]: Session 18 logged out. Waiting for processes to exit. Feb 9 00:50:30.081817 systemd-logind[1111]: Removed session 18. Feb 9 00:50:30.082327 kernel: audit: type=1106 audit(1707439830.075:1436): pid=4482 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:30.082567 kernel: audit: type=1104 audit(1707439830.075:1437): pid=4482 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:30.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.84:22-10.0.0.1:33726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:30.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.84:22-10.0.0.1:33716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:30.114000 audit[4494]: USER_ACCT pid=4494 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:30.115849 sshd[4494]: Accepted publickey for core from 10.0.0.1 port 33726 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:50:30.115000 audit[4494]: CRED_ACQ pid=4494 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:30.115000 audit[4494]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5d7e2a20 a2=3 a3=0 items=0 ppid=1 pid=4494 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:30.115000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 00:50:30.116857 sshd[4494]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:50:30.119707 systemd-logind[1111]: New session 19 of user core. Feb 9 00:50:30.120555 systemd[1]: Started session-19.scope. Feb 9 00:50:30.122000 audit[4494]: USER_START pid=4494 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:30.123000 audit[4497]: CRED_ACQ pid=4497 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:30.287025 sshd[4494]: pam_unix(sshd:session): session closed for user core Feb 9 00:50:30.287000 audit[4494]: USER_END pid=4494 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:30.287000 audit[4494]: CRED_DISP pid=4494 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:30.290609 systemd[1]: Started sshd@19-10.0.0.84:22-10.0.0.1:33740.service. Feb 9 00:50:30.291014 systemd[1]: sshd@18-10.0.0.84:22-10.0.0.1:33726.service: Deactivated successfully. Feb 9 00:50:30.291776 systemd-logind[1111]: Session 19 logged out. Waiting for processes to exit. Feb 9 00:50:30.291987 systemd[1]: session-19.scope: Deactivated successfully. Feb 9 00:50:30.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.84:22-10.0.0.1:33740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:30.290000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.84:22-10.0.0.1:33726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:30.293180 systemd-logind[1111]: Removed session 19. Feb 9 00:50:30.327000 audit[4508]: USER_ACCT pid=4508 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:30.328442 sshd[4508]: Accepted publickey for core from 10.0.0.1 port 33740 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:50:30.328000 audit[4508]: CRED_ACQ pid=4508 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:30.328000 audit[4508]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc37203370 a2=3 a3=0 items=0 ppid=1 pid=4508 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:30.328000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 00:50:30.329488 sshd[4508]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:50:30.333090 systemd-logind[1111]: New session 20 of user core. Feb 9 00:50:30.333767 systemd[1]: Started session-20.scope. Feb 9 00:50:30.337000 audit[4508]: USER_START pid=4508 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:30.338000 audit[4511]: CRED_ACQ pid=4511 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:31.205000 audit[4523]: NETFILTER_CFG table=filter:113 family=2 entries=20 op=nft_register_rule pid=4523 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:50:31.205000 audit[4523]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffd384d5380 a2=0 a3=7ffd384d536c items=0 ppid=2178 pid=4523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:31.205000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:50:31.211920 sshd[4508]: pam_unix(sshd:session): session closed for user core Feb 9 00:50:31.212000 audit[4508]: USER_END pid=4508 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:31.212000 audit[4508]: CRED_DISP pid=4508 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:31.207000 audit[4523]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4523 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:50:31.207000 audit[4523]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd384d5380 a2=0 a3=31030 items=0 ppid=2178 pid=4523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:31.207000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:50:31.213000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.84:22-10.0.0.1:33740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:31.214726 systemd[1]: sshd@19-10.0.0.84:22-10.0.0.1:33740.service: Deactivated successfully. Feb 9 00:50:31.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.84:22-10.0.0.1:33744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:31.215265 systemd[1]: session-20.scope: Deactivated successfully. Feb 9 00:50:31.217195 systemd[1]: Started sshd@20-10.0.0.84:22-10.0.0.1:33744.service. Feb 9 00:50:31.219394 systemd-logind[1111]: Session 20 logged out. Waiting for processes to exit. Feb 9 00:50:31.221114 systemd-logind[1111]: Removed session 20. Feb 9 00:50:31.218000 audit[4528]: NETFILTER_CFG table=filter:115 family=2 entries=32 op=nft_register_rule pid=4528 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:50:31.218000 audit[4528]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffe58e970f0 a2=0 a3=7ffe58e970dc items=0 ppid=2178 pid=4528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:31.218000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:50:31.221000 audit[4528]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4528 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:50:31.221000 audit[4528]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffe58e970f0 a2=0 a3=31030 items=0 ppid=2178 pid=4528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:31.221000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:50:31.258000 audit[4527]: USER_ACCT pid=4527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:31.259579 sshd[4527]: Accepted publickey for core from 10.0.0.1 port 33744 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:50:31.259000 audit[4527]: CRED_ACQ pid=4527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:31.259000 audit[4527]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2a948060 a2=3 a3=0 items=0 ppid=1 pid=4527 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:31.259000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 00:50:31.260666 sshd[4527]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:50:31.264003 systemd-logind[1111]: New session 21 of user core. Feb 9 00:50:31.264785 systemd[1]: Started session-21.scope. Feb 9 00:50:31.267000 audit[4527]: USER_START pid=4527 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:31.268000 audit[4530]: CRED_ACQ pid=4530 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:31.560252 sshd[4527]: pam_unix(sshd:session): session closed for user core Feb 9 00:50:31.560000 audit[4527]: USER_END pid=4527 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:31.560000 audit[4527]: CRED_DISP pid=4527 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:31.562922 systemd[1]: sshd@20-10.0.0.84:22-10.0.0.1:33744.service: Deactivated successfully. Feb 9 00:50:31.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.84:22-10.0.0.1:33744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:31.563426 systemd[1]: session-21.scope: Deactivated successfully. Feb 9 00:50:31.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.84:22-10.0.0.1:33756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:31.565456 systemd[1]: Started sshd@21-10.0.0.84:22-10.0.0.1:33756.service. Feb 9 00:50:31.566383 systemd-logind[1111]: Session 21 logged out. Waiting for processes to exit. Feb 9 00:50:31.567452 systemd-logind[1111]: Removed session 21. Feb 9 00:50:31.600000 audit[4539]: USER_ACCT pid=4539 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:31.601295 sshd[4539]: Accepted publickey for core from 10.0.0.1 port 33756 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:50:31.601000 audit[4539]: CRED_ACQ pid=4539 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:31.601000 audit[4539]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2e9e54e0 a2=3 a3=0 items=0 ppid=1 pid=4539 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:31.601000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 00:50:31.602396 sshd[4539]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:50:31.606124 systemd-logind[1111]: New session 22 of user core. Feb 9 00:50:31.607227 systemd[1]: Started session-22.scope. Feb 9 00:50:31.610000 audit[4539]: USER_START pid=4539 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:31.612000 audit[4541]: CRED_ACQ pid=4541 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:31.708506 sshd[4539]: pam_unix(sshd:session): session closed for user core Feb 9 00:50:31.708000 audit[4539]: USER_END pid=4539 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:31.708000 audit[4539]: CRED_DISP pid=4539 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:31.710484 systemd[1]: sshd@21-10.0.0.84:22-10.0.0.1:33756.service: Deactivated successfully. Feb 9 00:50:31.711203 systemd[1]: session-22.scope: Deactivated successfully. Feb 9 00:50:31.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.84:22-10.0.0.1:33756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:31.711720 systemd-logind[1111]: Session 22 logged out. Waiting for processes to exit. Feb 9 00:50:31.712356 systemd-logind[1111]: Removed session 22. Feb 9 00:50:33.809010 kubelet[2019]: E0209 00:50:33.808975 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:50:36.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.84:22-10.0.0.1:47620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:36.712924 systemd[1]: Started sshd@22-10.0.0.84:22-10.0.0.1:47620.service. Feb 9 00:50:36.716211 kernel: kauditd_printk_skb: 57 callbacks suppressed Feb 9 00:50:36.716388 kernel: audit: type=1130 audit(1707439836.712:1479): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.84:22-10.0.0.1:47620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:36.746000 audit[4554]: USER_ACCT pid=4554 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:36.748164 sshd[4554]: Accepted publickey for core from 10.0.0.1 port 47620 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:50:36.749000 audit[4554]: CRED_ACQ pid=4554 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:36.751175 sshd[4554]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:50:36.753471 kernel: audit: type=1101 audit(1707439836.746:1480): pid=4554 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:36.753515 kernel: audit: type=1103 audit(1707439836.749:1481): pid=4554 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:36.753540 kernel: audit: type=1006 audit(1707439836.749:1482): pid=4554 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 9 00:50:36.755194 kernel: audit: type=1300 audit(1707439836.749:1482): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf9ad7d90 a2=3 a3=0 items=0 ppid=1 pid=4554 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:36.749000 audit[4554]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf9ad7d90 a2=3 a3=0 items=0 ppid=1 pid=4554 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:36.754577 systemd-logind[1111]: New session 23 of user core. Feb 9 00:50:36.755284 systemd[1]: Started session-23.scope. Feb 9 00:50:36.749000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 00:50:36.759060 kernel: audit: type=1327 audit(1707439836.749:1482): proctitle=737368643A20636F7265205B707269765D Feb 9 00:50:36.757000 audit[4554]: USER_START pid=4554 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:36.758000 audit[4556]: CRED_ACQ pid=4556 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:36.764301 kernel: audit: type=1105 audit(1707439836.757:1483): pid=4554 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:36.764337 kernel: audit: type=1103 audit(1707439836.758:1484): pid=4556 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:36.856186 sshd[4554]: pam_unix(sshd:session): session closed for user core Feb 9 00:50:36.856000 audit[4554]: USER_END pid=4554 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:36.858158 systemd[1]: sshd@22-10.0.0.84:22-10.0.0.1:47620.service: Deactivated successfully. Feb 9 00:50:36.858829 systemd[1]: session-23.scope: Deactivated successfully. Feb 9 00:50:36.859360 systemd-logind[1111]: Session 23 logged out. Waiting for processes to exit. Feb 9 00:50:36.859971 systemd-logind[1111]: Removed session 23. Feb 9 00:50:36.856000 audit[4554]: CRED_DISP pid=4554 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:36.862393 kernel: audit: type=1106 audit(1707439836.856:1485): pid=4554 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:36.862428 kernel: audit: type=1104 audit(1707439836.856:1486): pid=4554 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:36.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.84:22-10.0.0.1:47620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:37.605000 audit[4567]: NETFILTER_CFG table=filter:117 family=2 entries=20 op=nft_register_rule pid=4567 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:50:37.605000 audit[4567]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffc00787120 a2=0 a3=7ffc0078710c items=0 ppid=2178 pid=4567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:37.605000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:50:37.607000 audit[4567]: NETFILTER_CFG table=nat:118 family=2 entries=104 op=nft_register_chain pid=4567 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:50:37.607000 audit[4567]: SYSCALL arch=c000003e syscall=46 success=yes exit=47436 a0=3 a1=7ffc00787120 a2=0 a3=7ffc0078710c items=0 ppid=2178 pid=4567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:37.607000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:50:40.163000 audit[4571]: NETFILTER_CFG table=filter:119 family=2 entries=9 op=nft_register_rule pid=4571 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:50:40.163000 audit[4571]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc215f5d90 a2=0 a3=7ffc215f5d7c items=0 ppid=2178 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:40.163000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:50:40.165000 audit[4571]: NETFILTER_CFG table=nat:120 family=2 entries=44 op=nft_register_rule pid=4571 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:50:40.165000 audit[4571]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffc215f5d90 a2=0 a3=7ffc215f5d7c items=0 ppid=2178 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:40.165000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:50:40.173287 kubelet[2019]: I0209 00:50:40.173266 2019 topology_manager.go:212] "Topology Admit Handler" Feb 9 00:50:40.174813 kubelet[2019]: I0209 00:50:40.174787 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7hp8l\" (UniqueName: \"kubernetes.io/projected/7edebf49-9d97-4fee-a44e-05abf3871385-kube-api-access-7hp8l\") pod \"calico-apiserver-597759d574-xsqmd\" (UID: \"7edebf49-9d97-4fee-a44e-05abf3871385\") " pod="calico-apiserver/calico-apiserver-597759d574-xsqmd" Feb 9 00:50:40.175063 kubelet[2019]: I0209 00:50:40.175037 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/7edebf49-9d97-4fee-a44e-05abf3871385-calico-apiserver-certs\") pod \"calico-apiserver-597759d574-xsqmd\" (UID: \"7edebf49-9d97-4fee-a44e-05abf3871385\") " pod="calico-apiserver/calico-apiserver-597759d574-xsqmd" Feb 9 00:50:40.178469 systemd[1]: Created slice kubepods-besteffort-pod7edebf49_9d97_4fee_a44e_05abf3871385.slice. Feb 9 00:50:40.181000 audit[4573]: NETFILTER_CFG table=filter:121 family=2 entries=10 op=nft_register_rule pid=4573 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:50:40.181000 audit[4573]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffd21956610 a2=0 a3=7ffd219565fc items=0 ppid=2178 pid=4573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:40.181000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:50:40.184000 audit[4573]: NETFILTER_CFG table=nat:122 family=2 entries=44 op=nft_register_rule pid=4573 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:50:40.184000 audit[4573]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffd21956610 a2=0 a3=7ffd219565fc items=0 ppid=2178 pid=4573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:40.184000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:50:40.275549 kubelet[2019]: E0209 00:50:40.275508 2019 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 00:50:40.275772 kubelet[2019]: E0209 00:50:40.275750 2019 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/7edebf49-9d97-4fee-a44e-05abf3871385-calico-apiserver-certs podName:7edebf49-9d97-4fee-a44e-05abf3871385 nodeName:}" failed. No retries permitted until 2024-02-09 00:50:40.775561013 +0000 UTC m=+86.057198082 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/7edebf49-9d97-4fee-a44e-05abf3871385-calico-apiserver-certs") pod "calico-apiserver-597759d574-xsqmd" (UID: "7edebf49-9d97-4fee-a44e-05abf3871385") : secret "calico-apiserver-certs" not found Feb 9 00:50:40.777764 kubelet[2019]: E0209 00:50:40.777717 2019 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 00:50:40.777964 kubelet[2019]: E0209 00:50:40.777794 2019 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/7edebf49-9d97-4fee-a44e-05abf3871385-calico-apiserver-certs podName:7edebf49-9d97-4fee-a44e-05abf3871385 nodeName:}" failed. No retries permitted until 2024-02-09 00:50:41.777779339 +0000 UTC m=+87.059416408 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/7edebf49-9d97-4fee-a44e-05abf3871385-calico-apiserver-certs") pod "calico-apiserver-597759d574-xsqmd" (UID: "7edebf49-9d97-4fee-a44e-05abf3871385") : secret "calico-apiserver-certs" not found Feb 9 00:50:41.861040 systemd[1]: Started sshd@23-10.0.0.84:22-10.0.0.1:47628.service. Feb 9 00:50:41.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.84:22-10.0.0.1:47628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:41.864177 kernel: kauditd_printk_skb: 19 callbacks suppressed Feb 9 00:50:41.864286 kernel: audit: type=1130 audit(1707439841.859:1494): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.84:22-10.0.0.1:47628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:41.892000 audit[4577]: USER_ACCT pid=4577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:41.894923 sshd[4577]: Accepted publickey for core from 10.0.0.1 port 47628 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:50:41.895000 audit[4577]: CRED_ACQ pid=4577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:41.897756 sshd[4577]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:50:41.899958 kernel: audit: type=1101 audit(1707439841.892:1495): pid=4577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:41.900001 kernel: audit: type=1103 audit(1707439841.895:1496): pid=4577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:41.900025 kernel: audit: type=1006 audit(1707439841.895:1497): pid=4577 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 9 00:50:41.900975 systemd-logind[1111]: New session 24 of user core. Feb 9 00:50:41.901711 systemd[1]: Started session-24.scope. Feb 9 00:50:41.895000 audit[4577]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff82e4a0c0 a2=3 a3=0 items=0 ppid=1 pid=4577 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:41.904538 kernel: audit: type=1300 audit(1707439841.895:1497): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff82e4a0c0 a2=3 a3=0 items=0 ppid=1 pid=4577 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:41.904585 kernel: audit: type=1327 audit(1707439841.895:1497): proctitle=737368643A20636F7265205B707269765D Feb 9 00:50:41.895000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 00:50:41.903000 audit[4577]: USER_START pid=4577 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:41.908418 kernel: audit: type=1105 audit(1707439841.903:1498): pid=4577 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:41.908475 kernel: audit: type=1103 audit(1707439841.904:1499): pid=4579 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:41.904000 audit[4579]: CRED_ACQ pid=4579 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:41.987018 env[1127]: time="2024-02-09T00:50:41.986597100Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-597759d574-xsqmd,Uid:7edebf49-9d97-4fee-a44e-05abf3871385,Namespace:calico-apiserver,Attempt:0,}" Feb 9 00:50:42.007994 sshd[4577]: pam_unix(sshd:session): session closed for user core Feb 9 00:50:42.014315 kernel: audit: type=1106 audit(1707439842.006:1500): pid=4577 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:42.014429 kernel: audit: type=1104 audit(1707439842.006:1501): pid=4577 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:42.006000 audit[4577]: USER_END pid=4577 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:42.006000 audit[4577]: CRED_DISP pid=4577 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:42.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.84:22-10.0.0.1:47628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:42.010233 systemd[1]: sshd@23-10.0.0.84:22-10.0.0.1:47628.service: Deactivated successfully. Feb 9 00:50:42.010820 systemd[1]: session-24.scope: Deactivated successfully. Feb 9 00:50:42.011631 systemd-logind[1111]: Session 24 logged out. Waiting for processes to exit. Feb 9 00:50:42.012383 systemd-logind[1111]: Removed session 24. Feb 9 00:50:42.102022 systemd-networkd[1023]: cali92c18eb4a10: Link UP Feb 9 00:50:42.104297 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 00:50:42.104335 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali92c18eb4a10: link becomes ready Feb 9 00:50:42.104543 systemd-networkd[1023]: cali92c18eb4a10: Gained carrier Feb 9 00:50:42.116091 env[1127]: 2024-02-09 00:50:42.039 [INFO][4588] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--597759d574--xsqmd-eth0 calico-apiserver-597759d574- calico-apiserver 7edebf49-9d97-4fee-a44e-05abf3871385 1086 0 2024-02-09 00:50:40 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:597759d574 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-597759d574-xsqmd eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali92c18eb4a10 [] []}} ContainerID="da73183dd86dc12c2c1379ac8d70a6edd92d275210256f9a62b57d7d50b24be9" Namespace="calico-apiserver" Pod="calico-apiserver-597759d574-xsqmd" WorkloadEndpoint="localhost-k8s-calico--apiserver--597759d574--xsqmd-" Feb 9 00:50:42.116091 env[1127]: 2024-02-09 00:50:42.039 [INFO][4588] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="da73183dd86dc12c2c1379ac8d70a6edd92d275210256f9a62b57d7d50b24be9" Namespace="calico-apiserver" Pod="calico-apiserver-597759d574-xsqmd" WorkloadEndpoint="localhost-k8s-calico--apiserver--597759d574--xsqmd-eth0" Feb 9 00:50:42.116091 env[1127]: 2024-02-09 00:50:42.067 [INFO][4602] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="da73183dd86dc12c2c1379ac8d70a6edd92d275210256f9a62b57d7d50b24be9" HandleID="k8s-pod-network.da73183dd86dc12c2c1379ac8d70a6edd92d275210256f9a62b57d7d50b24be9" Workload="localhost-k8s-calico--apiserver--597759d574--xsqmd-eth0" Feb 9 00:50:42.116091 env[1127]: 2024-02-09 00:50:42.077 [INFO][4602] ipam_plugin.go 268: Auto assigning IP ContainerID="da73183dd86dc12c2c1379ac8d70a6edd92d275210256f9a62b57d7d50b24be9" HandleID="k8s-pod-network.da73183dd86dc12c2c1379ac8d70a6edd92d275210256f9a62b57d7d50b24be9" Workload="localhost-k8s-calico--apiserver--597759d574--xsqmd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000cda60), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-597759d574-xsqmd", "timestamp":"2024-02-09 00:50:42.067269572 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 00:50:42.116091 env[1127]: 2024-02-09 00:50:42.077 [INFO][4602] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:50:42.116091 env[1127]: 2024-02-09 00:50:42.077 [INFO][4602] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:50:42.116091 env[1127]: 2024-02-09 00:50:42.077 [INFO][4602] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 9 00:50:42.116091 env[1127]: 2024-02-09 00:50:42.078 [INFO][4602] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.da73183dd86dc12c2c1379ac8d70a6edd92d275210256f9a62b57d7d50b24be9" host="localhost" Feb 9 00:50:42.116091 env[1127]: 2024-02-09 00:50:42.081 [INFO][4602] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 9 00:50:42.116091 env[1127]: 2024-02-09 00:50:42.086 [INFO][4602] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 9 00:50:42.116091 env[1127]: 2024-02-09 00:50:42.087 [INFO][4602] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 9 00:50:42.116091 env[1127]: 2024-02-09 00:50:42.089 [INFO][4602] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 9 00:50:42.116091 env[1127]: 2024-02-09 00:50:42.089 [INFO][4602] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.da73183dd86dc12c2c1379ac8d70a6edd92d275210256f9a62b57d7d50b24be9" host="localhost" Feb 9 00:50:42.116091 env[1127]: 2024-02-09 00:50:42.090 [INFO][4602] ipam.go 1682: Creating new handle: k8s-pod-network.da73183dd86dc12c2c1379ac8d70a6edd92d275210256f9a62b57d7d50b24be9 Feb 9 00:50:42.116091 env[1127]: 2024-02-09 00:50:42.092 [INFO][4602] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.da73183dd86dc12c2c1379ac8d70a6edd92d275210256f9a62b57d7d50b24be9" host="localhost" Feb 9 00:50:42.116091 env[1127]: 2024-02-09 00:50:42.096 [INFO][4602] ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.da73183dd86dc12c2c1379ac8d70a6edd92d275210256f9a62b57d7d50b24be9" host="localhost" Feb 9 00:50:42.116091 env[1127]: 2024-02-09 00:50:42.096 [INFO][4602] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.da73183dd86dc12c2c1379ac8d70a6edd92d275210256f9a62b57d7d50b24be9" host="localhost" Feb 9 00:50:42.116091 env[1127]: 2024-02-09 00:50:42.096 [INFO][4602] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:50:42.116091 env[1127]: 2024-02-09 00:50:42.096 [INFO][4602] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="da73183dd86dc12c2c1379ac8d70a6edd92d275210256f9a62b57d7d50b24be9" HandleID="k8s-pod-network.da73183dd86dc12c2c1379ac8d70a6edd92d275210256f9a62b57d7d50b24be9" Workload="localhost-k8s-calico--apiserver--597759d574--xsqmd-eth0" Feb 9 00:50:42.116811 env[1127]: 2024-02-09 00:50:42.099 [INFO][4588] k8s.go 385: Populated endpoint ContainerID="da73183dd86dc12c2c1379ac8d70a6edd92d275210256f9a62b57d7d50b24be9" Namespace="calico-apiserver" Pod="calico-apiserver-597759d574-xsqmd" WorkloadEndpoint="localhost-k8s-calico--apiserver--597759d574--xsqmd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--597759d574--xsqmd-eth0", GenerateName:"calico-apiserver-597759d574-", Namespace:"calico-apiserver", SelfLink:"", UID:"7edebf49-9d97-4fee-a44e-05abf3871385", ResourceVersion:"1086", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 50, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"597759d574", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-597759d574-xsqmd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali92c18eb4a10", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:50:42.116811 env[1127]: 2024-02-09 00:50:42.100 [INFO][4588] k8s.go 386: Calico CNI using IPs: [192.168.88.133/32] ContainerID="da73183dd86dc12c2c1379ac8d70a6edd92d275210256f9a62b57d7d50b24be9" Namespace="calico-apiserver" Pod="calico-apiserver-597759d574-xsqmd" WorkloadEndpoint="localhost-k8s-calico--apiserver--597759d574--xsqmd-eth0" Feb 9 00:50:42.116811 env[1127]: 2024-02-09 00:50:42.100 [INFO][4588] dataplane_linux.go 68: Setting the host side veth name to cali92c18eb4a10 ContainerID="da73183dd86dc12c2c1379ac8d70a6edd92d275210256f9a62b57d7d50b24be9" Namespace="calico-apiserver" Pod="calico-apiserver-597759d574-xsqmd" WorkloadEndpoint="localhost-k8s-calico--apiserver--597759d574--xsqmd-eth0" Feb 9 00:50:42.116811 env[1127]: 2024-02-09 00:50:42.105 [INFO][4588] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="da73183dd86dc12c2c1379ac8d70a6edd92d275210256f9a62b57d7d50b24be9" Namespace="calico-apiserver" Pod="calico-apiserver-597759d574-xsqmd" WorkloadEndpoint="localhost-k8s-calico--apiserver--597759d574--xsqmd-eth0" Feb 9 00:50:42.116811 env[1127]: 2024-02-09 00:50:42.105 [INFO][4588] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="da73183dd86dc12c2c1379ac8d70a6edd92d275210256f9a62b57d7d50b24be9" Namespace="calico-apiserver" Pod="calico-apiserver-597759d574-xsqmd" WorkloadEndpoint="localhost-k8s-calico--apiserver--597759d574--xsqmd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--597759d574--xsqmd-eth0", GenerateName:"calico-apiserver-597759d574-", Namespace:"calico-apiserver", SelfLink:"", UID:"7edebf49-9d97-4fee-a44e-05abf3871385", ResourceVersion:"1086", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 50, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"597759d574", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"da73183dd86dc12c2c1379ac8d70a6edd92d275210256f9a62b57d7d50b24be9", Pod:"calico-apiserver-597759d574-xsqmd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali92c18eb4a10", MAC:"1a:f4:98:07:67:ea", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:50:42.116811 env[1127]: 2024-02-09 00:50:42.113 [INFO][4588] k8s.go 491: Wrote updated endpoint to datastore ContainerID="da73183dd86dc12c2c1379ac8d70a6edd92d275210256f9a62b57d7d50b24be9" Namespace="calico-apiserver" Pod="calico-apiserver-597759d574-xsqmd" WorkloadEndpoint="localhost-k8s-calico--apiserver--597759d574--xsqmd-eth0" Feb 9 00:50:42.128000 audit[4635]: NETFILTER_CFG table=filter:123 family=2 entries=55 op=nft_register_chain pid=4635 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 00:50:42.128000 audit[4635]: SYSCALL arch=c000003e syscall=46 success=yes exit=28088 a0=3 a1=7ffdfe66ee90 a2=0 a3=7ffdfe66ee7c items=0 ppid=3228 pid=4635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:42.128000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 00:50:42.132198 env[1127]: time="2024-02-09T00:50:42.132093181Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 00:50:42.132399 env[1127]: time="2024-02-09T00:50:42.132345691Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 00:50:42.132399 env[1127]: time="2024-02-09T00:50:42.132365660Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 00:50:42.132715 env[1127]: time="2024-02-09T00:50:42.132666832Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/da73183dd86dc12c2c1379ac8d70a6edd92d275210256f9a62b57d7d50b24be9 pid=4636 runtime=io.containerd.runc.v2 Feb 9 00:50:42.148925 systemd[1]: Started cri-containerd-da73183dd86dc12c2c1379ac8d70a6edd92d275210256f9a62b57d7d50b24be9.scope. Feb 9 00:50:42.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit: BPF prog-id=186 op=LOAD Feb 9 00:50:42.156000 audit[4647]: AVC avc: denied { bpf } for pid=4647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit[4647]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4636 pid=4647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:42.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461373331383364643836646331326332633133373961633864373061 Feb 9 00:50:42.156000 audit[4647]: AVC avc: denied { perfmon } for pid=4647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit[4647]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=4636 pid=4647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:42.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461373331383364643836646331326332633133373961633864373061 Feb 9 00:50:42.156000 audit[4647]: AVC avc: denied { bpf } for pid=4647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit[4647]: AVC avc: denied { bpf } for pid=4647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit[4647]: AVC avc: denied { bpf } for pid=4647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit[4647]: AVC avc: denied { perfmon } for pid=4647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit[4647]: AVC avc: denied { perfmon } for pid=4647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit[4647]: AVC avc: denied { perfmon } for pid=4647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit[4647]: AVC avc: denied { perfmon } for pid=4647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit[4647]: AVC avc: denied { perfmon } for pid=4647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit[4647]: AVC avc: denied { bpf } for pid=4647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit[4647]: AVC avc: denied { bpf } for pid=4647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit: BPF prog-id=187 op=LOAD Feb 9 00:50:42.156000 audit[4647]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00021eab0 items=0 ppid=4636 pid=4647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:42.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461373331383364643836646331326332633133373961633864373061 Feb 9 00:50:42.156000 audit[4647]: AVC avc: denied { bpf } for pid=4647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit[4647]: AVC avc: denied { bpf } for pid=4647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit[4647]: AVC avc: denied { perfmon } for pid=4647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit[4647]: AVC avc: denied { perfmon } for pid=4647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit[4647]: AVC avc: denied { perfmon } for pid=4647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit[4647]: AVC avc: denied { perfmon } for pid=4647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit[4647]: AVC avc: denied { perfmon } for pid=4647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit[4647]: AVC avc: denied { bpf } for pid=4647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit[4647]: AVC avc: denied { bpf } for pid=4647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit: BPF prog-id=188 op=LOAD Feb 9 00:50:42.156000 audit[4647]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00021eaf8 items=0 ppid=4636 pid=4647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:42.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461373331383364643836646331326332633133373961633864373061 Feb 9 00:50:42.156000 audit: BPF prog-id=188 op=UNLOAD Feb 9 00:50:42.156000 audit: BPF prog-id=187 op=UNLOAD Feb 9 00:50:42.156000 audit[4647]: AVC avc: denied { bpf } for pid=4647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit[4647]: AVC avc: denied { bpf } for pid=4647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit[4647]: AVC avc: denied { bpf } for pid=4647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit[4647]: AVC avc: denied { perfmon } for pid=4647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit[4647]: AVC avc: denied { perfmon } for pid=4647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit[4647]: AVC avc: denied { perfmon } for pid=4647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit[4647]: AVC avc: denied { perfmon } for pid=4647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit[4647]: AVC avc: denied { perfmon } for pid=4647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit[4647]: AVC avc: denied { bpf } for pid=4647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit[4647]: AVC avc: denied { bpf } for pid=4647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:42.156000 audit: BPF prog-id=189 op=LOAD Feb 9 00:50:42.156000 audit[4647]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c00021ef08 items=0 ppid=4636 pid=4647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:42.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461373331383364643836646331326332633133373961633864373061 Feb 9 00:50:42.159313 systemd-resolved[1072]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 00:50:42.179262 env[1127]: time="2024-02-09T00:50:42.179209602Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-597759d574-xsqmd,Uid:7edebf49-9d97-4fee-a44e-05abf3871385,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"da73183dd86dc12c2c1379ac8d70a6edd92d275210256f9a62b57d7d50b24be9\"" Feb 9 00:50:42.180785 env[1127]: time="2024-02-09T00:50:42.180758218Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 00:50:42.788845 systemd[1]: run-containerd-runc-k8s.io-da73183dd86dc12c2c1379ac8d70a6edd92d275210256f9a62b57d7d50b24be9-runc.pmLdiL.mount: Deactivated successfully. Feb 9 00:50:43.976114 systemd-networkd[1023]: cali92c18eb4a10: Gained IPv6LL Feb 9 00:50:44.060592 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2152530548.mount: Deactivated successfully. Feb 9 00:50:44.809926 kubelet[2019]: E0209 00:50:44.808546 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:50:46.594403 env[1127]: time="2024-02-09T00:50:46.594348375Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:50:46.596328 env[1127]: time="2024-02-09T00:50:46.596280798Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:50:46.598006 env[1127]: time="2024-02-09T00:50:46.597962302Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:50:46.599532 env[1127]: time="2024-02-09T00:50:46.599504963Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:50:46.600346 env[1127]: time="2024-02-09T00:50:46.600303219Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 9 00:50:46.602293 env[1127]: time="2024-02-09T00:50:46.602254056Z" level=info msg="CreateContainer within sandbox \"da73183dd86dc12c2c1379ac8d70a6edd92d275210256f9a62b57d7d50b24be9\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 00:50:46.612704 env[1127]: time="2024-02-09T00:50:46.611612518Z" level=info msg="CreateContainer within sandbox \"da73183dd86dc12c2c1379ac8d70a6edd92d275210256f9a62b57d7d50b24be9\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"372696cbb2e5634588c394bf955ca44e76118a700fd8a1f6ddb1fae5ad4e7406\"" Feb 9 00:50:46.612704 env[1127]: time="2024-02-09T00:50:46.612120323Z" level=info msg="StartContainer for \"372696cbb2e5634588c394bf955ca44e76118a700fd8a1f6ddb1fae5ad4e7406\"" Feb 9 00:50:46.633764 systemd[1]: Started cri-containerd-372696cbb2e5634588c394bf955ca44e76118a700fd8a1f6ddb1fae5ad4e7406.scope. Feb 9 00:50:46.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.645000 audit: BPF prog-id=190 op=LOAD Feb 9 00:50:46.645000 audit[4686]: AVC avc: denied { bpf } for pid=4686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.645000 audit[4686]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4636 pid=4686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:46.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337323639366362623265353633343538386333393462663935356361 Feb 9 00:50:46.645000 audit[4686]: AVC avc: denied { perfmon } for pid=4686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.645000 audit[4686]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4636 pid=4686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:46.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337323639366362623265353633343538386333393462663935356361 Feb 9 00:50:46.645000 audit[4686]: AVC avc: denied { bpf } for pid=4686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.645000 audit[4686]: AVC avc: denied { bpf } for pid=4686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.645000 audit[4686]: AVC avc: denied { bpf } for pid=4686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.645000 audit[4686]: AVC avc: denied { perfmon } for pid=4686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.645000 audit[4686]: AVC avc: denied { perfmon } for pid=4686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.645000 audit[4686]: AVC avc: denied { perfmon } for pid=4686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.645000 audit[4686]: AVC avc: denied { perfmon } for pid=4686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.645000 audit[4686]: AVC avc: denied { perfmon } for pid=4686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.645000 audit[4686]: AVC avc: denied { bpf } for pid=4686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.645000 audit[4686]: AVC avc: denied { bpf } for pid=4686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.645000 audit: BPF prog-id=191 op=LOAD Feb 9 00:50:46.645000 audit[4686]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002260e0 items=0 ppid=4636 pid=4686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:46.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337323639366362623265353633343538386333393462663935356361 Feb 9 00:50:46.645000 audit[4686]: AVC avc: denied { bpf } for pid=4686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.645000 audit[4686]: AVC avc: denied { bpf } for pid=4686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.645000 audit[4686]: AVC avc: denied { perfmon } for pid=4686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.645000 audit[4686]: AVC avc: denied { perfmon } for pid=4686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.645000 audit[4686]: AVC avc: denied { perfmon } for pid=4686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.645000 audit[4686]: AVC avc: denied { perfmon } for pid=4686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.645000 audit[4686]: AVC avc: denied { perfmon } for pid=4686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.645000 audit[4686]: AVC avc: denied { bpf } for pid=4686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.645000 audit[4686]: AVC avc: denied { bpf } for pid=4686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.645000 audit: BPF prog-id=192 op=LOAD Feb 9 00:50:46.645000 audit[4686]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000226128 items=0 ppid=4636 pid=4686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:46.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337323639366362623265353633343538386333393462663935356361 Feb 9 00:50:46.646000 audit: BPF prog-id=192 op=UNLOAD Feb 9 00:50:46.646000 audit: BPF prog-id=191 op=UNLOAD Feb 9 00:50:46.646000 audit[4686]: AVC avc: denied { bpf } for pid=4686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.646000 audit[4686]: AVC avc: denied { bpf } for pid=4686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.646000 audit[4686]: AVC avc: denied { bpf } for pid=4686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.646000 audit[4686]: AVC avc: denied { perfmon } for pid=4686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.646000 audit[4686]: AVC avc: denied { perfmon } for pid=4686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.646000 audit[4686]: AVC avc: denied { perfmon } for pid=4686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.646000 audit[4686]: AVC avc: denied { perfmon } for pid=4686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.646000 audit[4686]: AVC avc: denied { perfmon } for pid=4686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.646000 audit[4686]: AVC avc: denied { bpf } for pid=4686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.646000 audit[4686]: AVC avc: denied { bpf } for pid=4686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:50:46.646000 audit: BPF prog-id=193 op=LOAD Feb 9 00:50:46.646000 audit[4686]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000226538 items=0 ppid=4636 pid=4686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:46.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337323639366362623265353633343538386333393462663935356361 Feb 9 00:50:46.673565 env[1127]: time="2024-02-09T00:50:46.673525435Z" level=info msg="StartContainer for \"372696cbb2e5634588c394bf955ca44e76118a700fd8a1f6ddb1fae5ad4e7406\" returns successfully" Feb 9 00:50:47.014467 kernel: kauditd_printk_skb: 118 callbacks suppressed Feb 9 00:50:47.014581 kernel: audit: type=1130 audit(1707439847.010:1540): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.84:22-10.0.0.1:35100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:47.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.84:22-10.0.0.1:35100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:47.011362 systemd[1]: Started sshd@24-10.0.0.84:22-10.0.0.1:35100.service. Feb 9 00:50:47.031840 kubelet[2019]: I0209 00:50:47.031780 2019 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-597759d574-xsqmd" podStartSLOduration=2.611408539 podCreationTimestamp="2024-02-09 00:50:40 +0000 UTC" firstStartedPulling="2024-02-09 00:50:42.180392502 +0000 UTC m=+87.462029562" lastFinishedPulling="2024-02-09 00:50:46.600723148 +0000 UTC m=+91.882360217" observedRunningTime="2024-02-09 00:50:47.031381746 +0000 UTC m=+92.313018815" watchObservedRunningTime="2024-02-09 00:50:47.031739194 +0000 UTC m=+92.313376264" Feb 9 00:50:47.040000 audit[4719]: NETFILTER_CFG table=filter:124 family=2 entries=10 op=nft_register_rule pid=4719 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:50:47.043986 kernel: audit: type=1325 audit(1707439847.040:1541): table=filter:124 family=2 entries=10 op=nft_register_rule pid=4719 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:50:47.040000 audit[4719]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc11917090 a2=0 a3=7ffc1191707c items=0 ppid=2178 pid=4719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:47.040000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:50:47.049262 kernel: audit: type=1300 audit(1707439847.040:1541): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc11917090 a2=0 a3=7ffc1191707c items=0 ppid=2178 pid=4719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:47.049305 kernel: audit: type=1327 audit(1707439847.040:1541): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:50:47.045000 audit[4719]: NETFILTER_CFG table=nat:125 family=2 entries=44 op=nft_register_rule pid=4719 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:50:47.045000 audit[4719]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffc11917090 a2=0 a3=7ffc1191707c items=0 ppid=2178 pid=4719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:47.055045 kernel: audit: type=1325 audit(1707439847.045:1542): table=nat:125 family=2 entries=44 op=nft_register_rule pid=4719 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:50:47.055093 kernel: audit: type=1300 audit(1707439847.045:1542): arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffc11917090 a2=0 a3=7ffc1191707c items=0 ppid=2178 pid=4719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:47.055119 kernel: audit: type=1327 audit(1707439847.045:1542): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:50:47.045000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:50:47.055231 sshd[4716]: Accepted publickey for core from 10.0.0.1 port 35100 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:50:47.054000 audit[4716]: USER_ACCT pid=4716 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:47.057066 sshd[4716]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:50:47.059543 kernel: audit: type=1101 audit(1707439847.054:1543): pid=4716 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:47.062188 kernel: audit: type=1103 audit(1707439847.055:1544): pid=4716 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:47.055000 audit[4716]: CRED_ACQ pid=4716 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:47.063994 kernel: audit: type=1006 audit(1707439847.055:1545): pid=4716 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 9 00:50:47.062382 systemd[1]: Started session-25.scope. Feb 9 00:50:47.063529 systemd-logind[1111]: New session 25 of user core. Feb 9 00:50:47.055000 audit[4716]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc582a5260 a2=3 a3=0 items=0 ppid=1 pid=4716 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:47.055000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 00:50:47.067000 audit[4716]: USER_START pid=4716 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:47.069000 audit[4720]: CRED_ACQ pid=4720 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:47.118000 audit[4696]: AVC avc: denied { watch } for pid=4696 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_00_50_41.3931947101/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c48,c147 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c48,c147 tclass=file permissive=0 Feb 9 00:50:47.118000 audit[4696]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000bd8ee0 a2=fc6 a3=0 items=0 ppid=4636 pid=4696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c48,c147 key=(null) Feb 9 00:50:47.118000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 00:50:47.186851 sshd[4716]: pam_unix(sshd:session): session closed for user core Feb 9 00:50:47.187000 audit[4716]: USER_END pid=4716 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:47.187000 audit[4716]: CRED_DISP pid=4716 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:47.189478 systemd[1]: sshd@24-10.0.0.84:22-10.0.0.1:35100.service: Deactivated successfully. Feb 9 00:50:47.190157 systemd[1]: session-25.scope: Deactivated successfully. Feb 9 00:50:47.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.84:22-10.0.0.1:35100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:47.190848 systemd-logind[1111]: Session 25 logged out. Waiting for processes to exit. Feb 9 00:50:47.191609 systemd-logind[1111]: Removed session 25. Feb 9 00:50:47.626000 audit[4733]: NETFILTER_CFG table=filter:126 family=2 entries=10 op=nft_register_rule pid=4733 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:50:47.626000 audit[4733]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffcf551a210 a2=0 a3=7ffcf551a1fc items=0 ppid=2178 pid=4733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:47.626000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:50:47.627000 audit[4733]: NETFILTER_CFG table=nat:127 family=2 entries=44 op=nft_register_rule pid=4733 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:50:47.627000 audit[4733]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffcf551a210 a2=0 a3=7ffcf551a1fc items=0 ppid=2178 pid=4733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:47.627000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:50:52.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.84:22-10.0.0.1:35114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:52.190472 systemd[1]: Started sshd@25-10.0.0.84:22-10.0.0.1:35114.service. Feb 9 00:50:52.191402 kernel: kauditd_printk_skb: 16 callbacks suppressed Feb 9 00:50:52.191436 kernel: audit: type=1130 audit(1707439852.189:1554): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.84:22-10.0.0.1:35114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:52.227000 audit[4758]: USER_ACCT pid=4758 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:52.228749 sshd[4758]: Accepted publickey for core from 10.0.0.1 port 35114 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:50:52.230492 sshd[4758]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:50:52.229000 audit[4758]: CRED_ACQ pid=4758 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:52.233818 systemd-logind[1111]: New session 26 of user core. Feb 9 00:50:52.234415 kernel: audit: type=1101 audit(1707439852.227:1555): pid=4758 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:52.234504 kernel: audit: type=1103 audit(1707439852.229:1556): pid=4758 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:52.234535 kernel: audit: type=1006 audit(1707439852.229:1557): pid=4758 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 9 00:50:52.234562 systemd[1]: Started session-26.scope. Feb 9 00:50:52.229000 audit[4758]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc2e350b0 a2=3 a3=0 items=0 ppid=1 pid=4758 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:52.239255 kernel: audit: type=1300 audit(1707439852.229:1557): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc2e350b0 a2=3 a3=0 items=0 ppid=1 pid=4758 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:50:52.239305 kernel: audit: type=1327 audit(1707439852.229:1557): proctitle=737368643A20636F7265205B707269765D Feb 9 00:50:52.229000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 00:50:52.237000 audit[4758]: USER_START pid=4758 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:52.243510 kernel: audit: type=1105 audit(1707439852.237:1558): pid=4758 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:52.243560 kernel: audit: type=1103 audit(1707439852.238:1559): pid=4760 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:52.238000 audit[4760]: CRED_ACQ pid=4760 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:52.340347 sshd[4758]: pam_unix(sshd:session): session closed for user core Feb 9 00:50:52.340000 audit[4758]: USER_END pid=4758 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:52.342203 systemd[1]: sshd@25-10.0.0.84:22-10.0.0.1:35114.service: Deactivated successfully. Feb 9 00:50:52.342919 systemd[1]: session-26.scope: Deactivated successfully. Feb 9 00:50:52.343445 systemd-logind[1111]: Session 26 logged out. Waiting for processes to exit. Feb 9 00:50:52.344193 systemd-logind[1111]: Removed session 26. Feb 9 00:50:52.340000 audit[4758]: CRED_DISP pid=4758 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:52.347157 kernel: audit: type=1106 audit(1707439852.340:1560): pid=4758 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:52.347206 kernel: audit: type=1104 audit(1707439852.340:1561): pid=4758 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:50:52.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.84:22-10.0.0.1:35114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:50:52.809297 kubelet[2019]: E0209 00:50:52.809257 2019 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"