Feb 9 19:40:25.909171 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Feb 9 17:23:38 -00 2024 Feb 9 19:40:25.909192 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:40:25.909204 kernel: BIOS-provided physical RAM map: Feb 9 19:40:25.909210 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Feb 9 19:40:25.909215 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable Feb 9 19:40:25.909221 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Feb 9 19:40:25.909228 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable Feb 9 19:40:25.909234 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Feb 9 19:40:25.909239 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable Feb 9 19:40:25.909248 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Feb 9 19:40:25.909254 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable Feb 9 19:40:25.909259 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Feb 9 19:40:25.909265 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Feb 9 19:40:25.909271 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Feb 9 19:40:25.909278 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Feb 9 19:40:25.909287 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Feb 9 19:40:25.909293 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Feb 9 19:40:25.909299 kernel: NX (Execute Disable) protection: active Feb 9 19:40:25.909305 kernel: e820: update [mem 0x9b3fa018-0x9b403c57] usable ==> usable Feb 9 19:40:25.909311 kernel: e820: update [mem 0x9b3fa018-0x9b403c57] usable ==> usable Feb 9 19:40:25.909317 kernel: e820: update [mem 0x9b3bd018-0x9b3f9e57] usable ==> usable Feb 9 19:40:25.909323 kernel: e820: update [mem 0x9b3bd018-0x9b3f9e57] usable ==> usable Feb 9 19:40:25.909331 kernel: extended physical RAM map: Feb 9 19:40:25.909337 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable Feb 9 19:40:25.909343 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable Feb 9 19:40:25.909352 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Feb 9 19:40:25.909359 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable Feb 9 19:40:25.909365 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Feb 9 19:40:25.909371 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable Feb 9 19:40:25.909377 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Feb 9 19:40:25.909383 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b3bd017] usable Feb 9 19:40:25.909389 kernel: reserve setup_data: [mem 0x000000009b3bd018-0x000000009b3f9e57] usable Feb 9 19:40:25.909394 kernel: reserve setup_data: [mem 0x000000009b3f9e58-0x000000009b3fa017] usable Feb 9 19:40:25.909400 kernel: reserve setup_data: [mem 0x000000009b3fa018-0x000000009b403c57] usable Feb 9 19:40:25.909406 kernel: reserve setup_data: [mem 0x000000009b403c58-0x000000009c8eefff] usable Feb 9 19:40:25.909412 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Feb 9 19:40:25.909421 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Feb 9 19:40:25.909427 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Feb 9 19:40:25.909433 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Feb 9 19:40:25.909439 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Feb 9 19:40:25.909450 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Feb 9 19:40:25.909456 kernel: efi: EFI v2.70 by EDK II Feb 9 19:40:25.909463 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b773018 RNG=0x9cb75018 Feb 9 19:40:25.909472 kernel: random: crng init done Feb 9 19:40:25.909479 kernel: SMBIOS 2.8 present. Feb 9 19:40:25.909485 kernel: DMI: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015 Feb 9 19:40:25.909492 kernel: Hypervisor detected: KVM Feb 9 19:40:25.909498 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 9 19:40:25.909504 kernel: kvm-clock: cpu 0, msr 67faa001, primary cpu clock Feb 9 19:40:25.909511 kernel: kvm-clock: using sched offset of 4528108859 cycles Feb 9 19:40:25.909518 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 9 19:40:25.909525 kernel: tsc: Detected 2794.750 MHz processor Feb 9 19:40:25.909537 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 19:40:25.909543 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 19:40:25.909550 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 Feb 9 19:40:25.909557 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 19:40:25.909564 kernel: Using GB pages for direct mapping Feb 9 19:40:25.909570 kernel: Secure boot disabled Feb 9 19:40:25.909577 kernel: ACPI: Early table checksum verification disabled Feb 9 19:40:25.909583 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) Feb 9 19:40:25.909590 kernel: ACPI: XSDT 0x000000009CB7D0E8 00004C (v01 BOCHS BXPC 00000001 01000013) Feb 9 19:40:25.909610 kernel: ACPI: FACP 0x000000009CB7A000 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 19:40:25.909617 kernel: ACPI: DSDT 0x000000009CB7B000 001A39 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 19:40:25.909624 kernel: ACPI: FACS 0x000000009CBDD000 000040 Feb 9 19:40:25.909630 kernel: ACPI: APIC 0x000000009CB79000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 19:40:25.909636 kernel: ACPI: HPET 0x000000009CB78000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 19:40:25.909643 kernel: ACPI: WAET 0x000000009CB77000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 19:40:25.909649 kernel: ACPI: BGRT 0x000000009CB76000 000038 (v01 INTEL EDK2 00000002 01000013) Feb 9 19:40:25.909656 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb7a000-0x9cb7a073] Feb 9 19:40:25.909664 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7b000-0x9cb7ca38] Feb 9 19:40:25.909675 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] Feb 9 19:40:25.909681 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb79000-0x9cb7908f] Feb 9 19:40:25.909688 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb78000-0x9cb78037] Feb 9 19:40:25.909694 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb77000-0x9cb77027] Feb 9 19:40:25.909701 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb76000-0x9cb76037] Feb 9 19:40:25.909707 kernel: No NUMA configuration found Feb 9 19:40:25.909714 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] Feb 9 19:40:25.909721 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] Feb 9 19:40:25.909727 kernel: Zone ranges: Feb 9 19:40:25.909738 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 19:40:25.909744 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] Feb 9 19:40:25.909751 kernel: Normal empty Feb 9 19:40:25.909757 kernel: Movable zone start for each node Feb 9 19:40:25.909763 kernel: Early memory node ranges Feb 9 19:40:25.909772 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Feb 9 19:40:25.909779 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] Feb 9 19:40:25.909785 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] Feb 9 19:40:25.909792 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] Feb 9 19:40:25.909802 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] Feb 9 19:40:25.909808 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] Feb 9 19:40:25.909815 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] Feb 9 19:40:25.909821 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 19:40:25.909828 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Feb 9 19:40:25.909834 kernel: On node 0, zone DMA: 8 pages in unavailable ranges Feb 9 19:40:25.909841 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 19:40:25.909847 kernel: On node 0, zone DMA: 240 pages in unavailable ranges Feb 9 19:40:25.909854 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges Feb 9 19:40:25.909864 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges Feb 9 19:40:25.909870 kernel: ACPI: PM-Timer IO Port: 0xb008 Feb 9 19:40:25.909877 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 9 19:40:25.909883 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 9 19:40:25.909897 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 9 19:40:25.909904 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 9 19:40:25.909911 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 19:40:25.909918 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 9 19:40:25.909924 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 9 19:40:25.909931 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 19:40:25.909941 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 9 19:40:25.909947 kernel: TSC deadline timer available Feb 9 19:40:25.909954 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Feb 9 19:40:25.909960 kernel: kvm-guest: KVM setup pv remote TLB flush Feb 9 19:40:25.909967 kernel: kvm-guest: setup PV sched yield Feb 9 19:40:25.909975 kernel: [mem 0x9d000000-0xffffffff] available for PCI devices Feb 9 19:40:25.909982 kernel: Booting paravirtualized kernel on KVM Feb 9 19:40:25.909988 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 19:40:25.909995 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Feb 9 19:40:25.910007 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u524288 Feb 9 19:40:25.910013 kernel: pcpu-alloc: s185624 r8192 d31464 u524288 alloc=1*2097152 Feb 9 19:40:25.910030 kernel: pcpu-alloc: [0] 0 1 2 3 Feb 9 19:40:25.910040 kernel: kvm-guest: setup async PF for cpu 0 Feb 9 19:40:25.910047 kernel: kvm-guest: stealtime: cpu 0, msr 9b01c0c0 Feb 9 19:40:25.910054 kernel: kvm-guest: PV spinlocks enabled Feb 9 19:40:25.910061 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 9 19:40:25.910067 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 Feb 9 19:40:25.910074 kernel: Policy zone: DMA32 Feb 9 19:40:25.910082 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:40:25.910089 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 19:40:25.910100 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 19:40:25.910107 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 19:40:25.910114 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 19:40:25.910121 kernel: Memory: 2400512K/2567000K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 166228K reserved, 0K cma-reserved) Feb 9 19:40:25.910128 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Feb 9 19:40:25.910138 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 19:40:25.910145 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 19:40:25.910152 kernel: rcu: Hierarchical RCU implementation. Feb 9 19:40:25.910159 kernel: rcu: RCU event tracing is enabled. Feb 9 19:40:25.910166 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Feb 9 19:40:25.910173 kernel: Rude variant of Tasks RCU enabled. Feb 9 19:40:25.910180 kernel: Tracing variant of Tasks RCU enabled. Feb 9 19:40:25.910187 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 19:40:25.910194 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Feb 9 19:40:25.910204 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Feb 9 19:40:25.910211 kernel: Console: colour dummy device 80x25 Feb 9 19:40:25.910218 kernel: printk: console [ttyS0] enabled Feb 9 19:40:25.910225 kernel: ACPI: Core revision 20210730 Feb 9 19:40:25.910232 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Feb 9 19:40:25.910239 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 19:40:25.910246 kernel: x2apic enabled Feb 9 19:40:25.910252 kernel: Switched APIC routing to physical x2apic. Feb 9 19:40:25.910259 kernel: kvm-guest: setup PV IPIs Feb 9 19:40:25.910270 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 9 19:40:25.910277 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Feb 9 19:40:25.910284 kernel: Calibrating delay loop (skipped) preset value.. 5589.50 BogoMIPS (lpj=2794750) Feb 9 19:40:25.910291 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Feb 9 19:40:25.910298 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Feb 9 19:40:25.910305 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Feb 9 19:40:25.910312 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 19:40:25.910319 kernel: Spectre V2 : Mitigation: Retpolines Feb 9 19:40:25.910326 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 19:40:25.910336 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 9 19:40:25.910343 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Feb 9 19:40:25.910350 kernel: RETBleed: Mitigation: untrained return thunk Feb 9 19:40:25.910358 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 9 19:40:25.910365 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 9 19:40:25.910372 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 19:40:25.910379 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 19:40:25.910388 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 19:40:25.910395 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 19:40:25.910405 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Feb 9 19:40:25.910412 kernel: Freeing SMP alternatives memory: 32K Feb 9 19:40:25.910419 kernel: pid_max: default: 32768 minimum: 301 Feb 9 19:40:25.910426 kernel: LSM: Security Framework initializing Feb 9 19:40:25.910432 kernel: SELinux: Initializing. Feb 9 19:40:25.910439 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 19:40:25.910446 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 19:40:25.910453 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Feb 9 19:40:25.910463 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Feb 9 19:40:25.910470 kernel: ... version: 0 Feb 9 19:40:25.910477 kernel: ... bit width: 48 Feb 9 19:40:25.910484 kernel: ... generic registers: 6 Feb 9 19:40:25.910491 kernel: ... value mask: 0000ffffffffffff Feb 9 19:40:25.910498 kernel: ... max period: 00007fffffffffff Feb 9 19:40:25.910504 kernel: ... fixed-purpose events: 0 Feb 9 19:40:25.910511 kernel: ... event mask: 000000000000003f Feb 9 19:40:25.910518 kernel: signal: max sigframe size: 1776 Feb 9 19:40:25.910525 kernel: rcu: Hierarchical SRCU implementation. Feb 9 19:40:25.910535 kernel: smp: Bringing up secondary CPUs ... Feb 9 19:40:25.910542 kernel: x86: Booting SMP configuration: Feb 9 19:40:25.910549 kernel: .... node #0, CPUs: #1 Feb 9 19:40:25.910555 kernel: kvm-clock: cpu 1, msr 67faa041, secondary cpu clock Feb 9 19:40:25.910562 kernel: kvm-guest: setup async PF for cpu 1 Feb 9 19:40:25.910569 kernel: kvm-guest: stealtime: cpu 1, msr 9b09c0c0 Feb 9 19:40:25.910576 kernel: #2 Feb 9 19:40:25.910583 kernel: kvm-clock: cpu 2, msr 67faa081, secondary cpu clock Feb 9 19:40:25.910590 kernel: kvm-guest: setup async PF for cpu 2 Feb 9 19:40:25.910609 kernel: kvm-guest: stealtime: cpu 2, msr 9b11c0c0 Feb 9 19:40:25.910616 kernel: #3 Feb 9 19:40:25.910623 kernel: kvm-clock: cpu 3, msr 67faa0c1, secondary cpu clock Feb 9 19:40:25.910629 kernel: kvm-guest: setup async PF for cpu 3 Feb 9 19:40:25.910636 kernel: kvm-guest: stealtime: cpu 3, msr 9b19c0c0 Feb 9 19:40:25.910643 kernel: smp: Brought up 1 node, 4 CPUs Feb 9 19:40:25.910650 kernel: smpboot: Max logical packages: 1 Feb 9 19:40:25.910656 kernel: smpboot: Total of 4 processors activated (22358.00 BogoMIPS) Feb 9 19:40:25.910663 kernel: devtmpfs: initialized Feb 9 19:40:25.910674 kernel: x86/mm: Memory block size: 128MB Feb 9 19:40:25.910681 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) Feb 9 19:40:25.910688 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) Feb 9 19:40:25.910695 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) Feb 9 19:40:25.910702 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) Feb 9 19:40:25.910711 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) Feb 9 19:40:25.910718 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 19:40:25.910725 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Feb 9 19:40:25.910732 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 19:40:25.910742 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 19:40:25.910749 kernel: audit: initializing netlink subsys (disabled) Feb 9 19:40:25.910756 kernel: audit: type=2000 audit(1707507624.814:1): state=initialized audit_enabled=0 res=1 Feb 9 19:40:25.910763 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 19:40:25.910769 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 19:40:25.910776 kernel: cpuidle: using governor menu Feb 9 19:40:25.910783 kernel: ACPI: bus type PCI registered Feb 9 19:40:25.910790 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 19:40:25.910797 kernel: dca service started, version 1.12.1 Feb 9 19:40:25.910807 kernel: PCI: Using configuration type 1 for base access Feb 9 19:40:25.910814 kernel: PCI: Using configuration type 1 for extended access Feb 9 19:40:25.910821 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 19:40:25.910827 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 19:40:25.910834 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 19:40:25.910841 kernel: ACPI: Added _OSI(Module Device) Feb 9 19:40:25.910848 kernel: ACPI: Added _OSI(Processor Device) Feb 9 19:40:25.910855 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 19:40:25.910862 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 19:40:25.910872 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 19:40:25.910879 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 19:40:25.910886 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 19:40:25.910900 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 19:40:25.910907 kernel: ACPI: Interpreter enabled Feb 9 19:40:25.910913 kernel: ACPI: PM: (supports S0 S3 S5) Feb 9 19:40:25.910920 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 19:40:25.910927 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 19:40:25.910934 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Feb 9 19:40:25.910945 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 9 19:40:25.911078 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 9 19:40:25.911090 kernel: acpiphp: Slot [3] registered Feb 9 19:40:25.911098 kernel: acpiphp: Slot [4] registered Feb 9 19:40:25.911104 kernel: acpiphp: Slot [5] registered Feb 9 19:40:25.911111 kernel: acpiphp: Slot [6] registered Feb 9 19:40:25.911118 kernel: acpiphp: Slot [7] registered Feb 9 19:40:25.911125 kernel: acpiphp: Slot [8] registered Feb 9 19:40:25.911131 kernel: acpiphp: Slot [9] registered Feb 9 19:40:25.911143 kernel: acpiphp: Slot [10] registered Feb 9 19:40:25.911149 kernel: acpiphp: Slot [11] registered Feb 9 19:40:25.911156 kernel: acpiphp: Slot [12] registered Feb 9 19:40:25.911163 kernel: acpiphp: Slot [13] registered Feb 9 19:40:25.911170 kernel: acpiphp: Slot [14] registered Feb 9 19:40:25.911176 kernel: acpiphp: Slot [15] registered Feb 9 19:40:25.911183 kernel: acpiphp: Slot [16] registered Feb 9 19:40:25.911190 kernel: acpiphp: Slot [17] registered Feb 9 19:40:25.911197 kernel: acpiphp: Slot [18] registered Feb 9 19:40:25.911207 kernel: acpiphp: Slot [19] registered Feb 9 19:40:25.911213 kernel: acpiphp: Slot [20] registered Feb 9 19:40:25.911220 kernel: acpiphp: Slot [21] registered Feb 9 19:40:25.911227 kernel: acpiphp: Slot [22] registered Feb 9 19:40:25.911234 kernel: acpiphp: Slot [23] registered Feb 9 19:40:25.911240 kernel: acpiphp: Slot [24] registered Feb 9 19:40:25.911247 kernel: acpiphp: Slot [25] registered Feb 9 19:40:25.911254 kernel: acpiphp: Slot [26] registered Feb 9 19:40:25.911261 kernel: acpiphp: Slot [27] registered Feb 9 19:40:25.911267 kernel: acpiphp: Slot [28] registered Feb 9 19:40:25.911278 kernel: acpiphp: Slot [29] registered Feb 9 19:40:25.911284 kernel: acpiphp: Slot [30] registered Feb 9 19:40:25.911291 kernel: acpiphp: Slot [31] registered Feb 9 19:40:25.911298 kernel: PCI host bridge to bus 0000:00 Feb 9 19:40:25.911388 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 19:40:25.911458 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 19:40:25.911524 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 19:40:25.911606 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xfebfffff window] Feb 9 19:40:25.911676 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0x87fffffff window] Feb 9 19:40:25.911742 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 9 19:40:25.911843 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 9 19:40:25.911941 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 9 19:40:25.912038 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Feb 9 19:40:25.912113 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc0c0-0xc0cf] Feb 9 19:40:25.912197 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Feb 9 19:40:25.912270 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Feb 9 19:40:25.912344 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Feb 9 19:40:25.912416 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Feb 9 19:40:25.912498 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 9 19:40:25.912571 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Feb 9 19:40:25.912776 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Feb 9 19:40:25.912865 kernel: pci 0000:00:02.0: [1234:1111] type 00 class 0x030000 Feb 9 19:40:25.912948 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] Feb 9 19:40:25.913023 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xc1043000-0xc1043fff] Feb 9 19:40:25.913096 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] Feb 9 19:40:25.913168 kernel: pci 0000:00:02.0: BAR 0: assigned to efifb Feb 9 19:40:25.913241 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 9 19:40:25.913336 kernel: pci 0000:00:03.0: [1af4:1005] type 00 class 0x00ff00 Feb 9 19:40:25.913412 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0a0-0xc0bf] Feb 9 19:40:25.913489 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] Feb 9 19:40:25.913564 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] Feb 9 19:40:25.913664 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Feb 9 19:40:25.913741 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Feb 9 19:40:25.913852 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] Feb 9 19:40:25.913948 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] Feb 9 19:40:25.914033 kernel: pci 0000:00:05.0: [1af4:1000] type 00 class 0x020000 Feb 9 19:40:25.914108 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Feb 9 19:40:25.914189 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc1040000-0xc1040fff] Feb 9 19:40:25.914269 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] Feb 9 19:40:25.914344 kernel: pci 0000:00:05.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] Feb 9 19:40:25.914354 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 9 19:40:25.914367 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 9 19:40:25.914374 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 9 19:40:25.914381 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 9 19:40:25.914388 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 9 19:40:25.914395 kernel: iommu: Default domain type: Translated Feb 9 19:40:25.914402 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 19:40:25.914478 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Feb 9 19:40:25.914552 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 9 19:40:25.914639 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Feb 9 19:40:25.914655 kernel: vgaarb: loaded Feb 9 19:40:25.914662 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 19:40:25.914670 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 19:40:25.914677 kernel: PTP clock support registered Feb 9 19:40:25.914683 kernel: Registered efivars operations Feb 9 19:40:25.914690 kernel: PCI: Using ACPI for IRQ routing Feb 9 19:40:25.914697 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 19:40:25.914704 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] Feb 9 19:40:25.914711 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] Feb 9 19:40:25.914722 kernel: e820: reserve RAM buffer [mem 0x9b3bd018-0x9bffffff] Feb 9 19:40:25.914729 kernel: e820: reserve RAM buffer [mem 0x9b3fa018-0x9bffffff] Feb 9 19:40:25.914736 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] Feb 9 19:40:25.914742 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] Feb 9 19:40:25.914749 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Feb 9 19:40:25.914756 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Feb 9 19:40:25.914763 kernel: clocksource: Switched to clocksource kvm-clock Feb 9 19:40:25.914770 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 19:40:25.914777 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 19:40:25.914788 kernel: pnp: PnP ACPI init Feb 9 19:40:25.914878 kernel: pnp 00:02: [dma 2] Feb 9 19:40:25.914890 kernel: pnp: PnP ACPI: found 6 devices Feb 9 19:40:25.914903 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 19:40:25.914911 kernel: NET: Registered PF_INET protocol family Feb 9 19:40:25.914918 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 19:40:25.914925 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 9 19:40:25.914932 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 19:40:25.914944 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 19:40:25.914951 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 9 19:40:25.914958 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 9 19:40:25.914965 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 19:40:25.914972 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 19:40:25.914979 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 19:40:25.914986 kernel: NET: Registered PF_XDP protocol family Feb 9 19:40:25.915063 kernel: pci 0000:00:05.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window Feb 9 19:40:25.915166 kernel: pci 0000:00:05.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] Feb 9 19:40:25.915235 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 19:40:25.915301 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 19:40:25.915366 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 19:40:25.915431 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xfebfffff window] Feb 9 19:40:25.915496 kernel: pci_bus 0000:00: resource 8 [mem 0x800000000-0x87fffffff window] Feb 9 19:40:25.915571 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Feb 9 19:40:25.915661 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 9 19:40:25.915743 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 9 19:40:25.915753 kernel: PCI: CLS 0 bytes, default 64 Feb 9 19:40:25.915761 kernel: Initialise system trusted keyrings Feb 9 19:40:25.915768 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 9 19:40:25.915775 kernel: Key type asymmetric registered Feb 9 19:40:25.915783 kernel: Asymmetric key parser 'x509' registered Feb 9 19:40:25.915790 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 19:40:25.915797 kernel: io scheduler mq-deadline registered Feb 9 19:40:25.915805 kernel: io scheduler kyber registered Feb 9 19:40:25.915817 kernel: io scheduler bfq registered Feb 9 19:40:25.915825 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 19:40:25.915832 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 9 19:40:25.915840 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Feb 9 19:40:25.915847 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 9 19:40:25.915854 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 19:40:25.915861 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 19:40:25.915869 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 9 19:40:25.915876 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 9 19:40:25.915887 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 9 19:40:25.915901 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 9 19:40:25.915990 kernel: rtc_cmos 00:05: RTC can wake from S4 Feb 9 19:40:25.916061 kernel: rtc_cmos 00:05: registered as rtc0 Feb 9 19:40:25.916138 kernel: rtc_cmos 00:05: setting system clock to 2024-02-09T19:40:25 UTC (1707507625) Feb 9 19:40:25.916208 kernel: rtc_cmos 00:05: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Feb 9 19:40:25.916218 kernel: efifb: probing for efifb Feb 9 19:40:25.916225 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k Feb 9 19:40:25.916232 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 Feb 9 19:40:25.916240 kernel: efifb: scrolling: redraw Feb 9 19:40:25.916247 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 9 19:40:25.916255 kernel: Console: switching to colour frame buffer device 160x50 Feb 9 19:40:25.916262 kernel: fb0: EFI VGA frame buffer device Feb 9 19:40:25.916274 kernel: pstore: Registered efi as persistent store backend Feb 9 19:40:25.916282 kernel: NET: Registered PF_INET6 protocol family Feb 9 19:40:25.916289 kernel: Segment Routing with IPv6 Feb 9 19:40:25.916296 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 19:40:25.916304 kernel: NET: Registered PF_PACKET protocol family Feb 9 19:40:25.916311 kernel: Key type dns_resolver registered Feb 9 19:40:25.916318 kernel: IPI shorthand broadcast: enabled Feb 9 19:40:25.916325 kernel: sched_clock: Marking stable (454199745, 95506545)->(564620624, -14914334) Feb 9 19:40:25.916333 kernel: registered taskstats version 1 Feb 9 19:40:25.916340 kernel: Loading compiled-in X.509 certificates Feb 9 19:40:25.916351 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 56154408a02b3bd349a9e9180c9bd837fd1d636a' Feb 9 19:40:25.916358 kernel: Key type .fscrypt registered Feb 9 19:40:25.916365 kernel: Key type fscrypt-provisioning registered Feb 9 19:40:25.916373 kernel: pstore: Using crash dump compression: deflate Feb 9 19:40:25.916380 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 19:40:25.916387 kernel: ima: Allocated hash algorithm: sha1 Feb 9 19:40:25.916394 kernel: ima: No architecture policies found Feb 9 19:40:25.916401 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 19:40:25.916412 kernel: Write protecting the kernel read-only data: 28672k Feb 9 19:40:25.916420 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 19:40:25.916427 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 19:40:25.916438 kernel: Run /init as init process Feb 9 19:40:25.916445 kernel: with arguments: Feb 9 19:40:25.916452 kernel: /init Feb 9 19:40:25.916459 kernel: with environment: Feb 9 19:40:25.916466 kernel: HOME=/ Feb 9 19:40:25.916473 kernel: TERM=linux Feb 9 19:40:25.916480 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 19:40:25.916493 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:40:25.916503 systemd[1]: Detected virtualization kvm. Feb 9 19:40:25.916515 systemd[1]: Detected architecture x86-64. Feb 9 19:40:25.916522 systemd[1]: Running in initrd. Feb 9 19:40:25.916529 systemd[1]: No hostname configured, using default hostname. Feb 9 19:40:25.916537 systemd[1]: Hostname set to . Feb 9 19:40:25.916545 systemd[1]: Initializing machine ID from VM UUID. Feb 9 19:40:25.916556 systemd[1]: Queued start job for default target initrd.target. Feb 9 19:40:25.916564 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:40:25.916572 systemd[1]: Reached target cryptsetup.target. Feb 9 19:40:25.916580 systemd[1]: Reached target paths.target. Feb 9 19:40:25.916587 systemd[1]: Reached target slices.target. Feb 9 19:40:25.916595 systemd[1]: Reached target swap.target. Feb 9 19:40:25.916957 systemd[1]: Reached target timers.target. Feb 9 19:40:25.917022 systemd[1]: Listening on iscsid.socket. Feb 9 19:40:25.917030 systemd[1]: Listening on iscsiuio.socket. Feb 9 19:40:25.917038 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 19:40:25.917046 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 19:40:25.917054 systemd[1]: Listening on systemd-journald.socket. Feb 9 19:40:25.917062 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:40:25.917070 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:40:25.917078 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:40:25.917086 systemd[1]: Reached target sockets.target. Feb 9 19:40:25.917097 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:40:25.917105 systemd[1]: Finished network-cleanup.service. Feb 9 19:40:25.917113 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 19:40:25.917121 systemd[1]: Starting systemd-journald.service... Feb 9 19:40:25.917128 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:40:25.917136 systemd[1]: Starting systemd-resolved.service... Feb 9 19:40:25.917144 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 19:40:25.917151 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:40:25.917159 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 19:40:25.917170 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 19:40:25.917178 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 19:40:25.917186 kernel: audit: type=1130 audit(1707507625.909:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:25.917194 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 19:40:25.917202 kernel: audit: type=1130 audit(1707507625.912:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:25.917210 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 19:40:25.917220 systemd-journald[197]: Journal started Feb 9 19:40:25.917265 systemd-journald[197]: Runtime Journal (/run/log/journal/4ada407305e746f98e3b0cd2547a66a9) is 6.0M, max 48.4M, 42.4M free. Feb 9 19:40:25.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:25.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:25.902447 systemd-modules-load[198]: Inserted module 'overlay' Feb 9 19:40:25.919241 systemd[1]: Started systemd-journald.service. Feb 9 19:40:25.919263 kernel: audit: type=1130 audit(1707507625.917:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:25.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:25.933455 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 19:40:25.941933 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 19:40:25.941959 kernel: audit: type=1130 audit(1707507625.933:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:25.941970 kernel: Bridge firewalling registered Feb 9 19:40:25.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:25.934725 systemd[1]: Starting dracut-cmdline.service... Feb 9 19:40:25.937196 systemd-modules-load[198]: Inserted module 'br_netfilter' Feb 9 19:40:25.944437 dracut-cmdline[214]: dracut-dracut-053 Feb 9 19:40:25.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:25.938286 systemd-resolved[199]: Positive Trust Anchors: Feb 9 19:40:25.947696 kernel: audit: type=1130 audit(1707507625.942:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:25.947711 dracut-cmdline[214]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:40:25.938299 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:40:25.938327 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:40:25.940547 systemd-resolved[199]: Defaulting to hostname 'linux'. Feb 9 19:40:25.942013 systemd[1]: Started systemd-resolved.service. Feb 9 19:40:25.942689 systemd[1]: Reached target nss-lookup.target. Feb 9 19:40:25.959623 kernel: SCSI subsystem initialized Feb 9 19:40:25.973016 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 19:40:25.973044 kernel: device-mapper: uevent: version 1.0.3 Feb 9 19:40:25.974220 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 19:40:25.977791 systemd-modules-load[198]: Inserted module 'dm_multipath' Feb 9 19:40:25.978672 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:40:25.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:25.980481 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:40:25.983492 kernel: audit: type=1130 audit(1707507625.979:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:25.989708 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:40:25.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:25.993626 kernel: audit: type=1130 audit(1707507625.989:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:26.003621 kernel: Loading iSCSI transport class v2.0-870. Feb 9 19:40:26.013629 kernel: iscsi: registered transport (tcp) Feb 9 19:40:26.032772 kernel: iscsi: registered transport (qla4xxx) Feb 9 19:40:26.032814 kernel: QLogic iSCSI HBA Driver Feb 9 19:40:26.062332 systemd[1]: Finished dracut-cmdline.service. Feb 9 19:40:26.065987 kernel: audit: type=1130 audit(1707507626.062:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:26.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:26.063939 systemd[1]: Starting dracut-pre-udev.service... Feb 9 19:40:26.109636 kernel: raid6: avx2x4 gen() 29484 MB/s Feb 9 19:40:26.126636 kernel: raid6: avx2x4 xor() 7777 MB/s Feb 9 19:40:26.143631 kernel: raid6: avx2x2 gen() 30812 MB/s Feb 9 19:40:26.160621 kernel: raid6: avx2x2 xor() 18788 MB/s Feb 9 19:40:26.177620 kernel: raid6: avx2x1 gen() 26673 MB/s Feb 9 19:40:26.194616 kernel: raid6: avx2x1 xor() 15338 MB/s Feb 9 19:40:26.211619 kernel: raid6: sse2x4 gen() 14395 MB/s Feb 9 19:40:26.228619 kernel: raid6: sse2x4 xor() 7581 MB/s Feb 9 19:40:26.245621 kernel: raid6: sse2x2 gen() 15760 MB/s Feb 9 19:40:26.262620 kernel: raid6: sse2x2 xor() 9823 MB/s Feb 9 19:40:26.279617 kernel: raid6: sse2x1 gen() 12353 MB/s Feb 9 19:40:26.296629 kernel: raid6: sse2x1 xor() 7472 MB/s Feb 9 19:40:26.296644 kernel: raid6: using algorithm avx2x2 gen() 30812 MB/s Feb 9 19:40:26.296670 kernel: raid6: .... xor() 18788 MB/s, rmw enabled Feb 9 19:40:26.297617 kernel: raid6: using avx2x2 recovery algorithm Feb 9 19:40:26.308618 kernel: xor: automatically using best checksumming function avx Feb 9 19:40:26.398639 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 19:40:26.407454 systemd[1]: Finished dracut-pre-udev.service. Feb 9 19:40:26.410654 kernel: audit: type=1130 audit(1707507626.407:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:26.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:26.409000 audit: BPF prog-id=7 op=LOAD Feb 9 19:40:26.409000 audit: BPF prog-id=8 op=LOAD Feb 9 19:40:26.411012 systemd[1]: Starting systemd-udevd.service... Feb 9 19:40:26.422992 systemd-udevd[399]: Using default interface naming scheme 'v252'. Feb 9 19:40:26.426946 systemd[1]: Started systemd-udevd.service. Feb 9 19:40:26.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:26.430000 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 19:40:26.439585 dracut-pre-trigger[409]: rd.md=0: removing MD RAID activation Feb 9 19:40:26.464897 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 19:40:26.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:26.466906 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:40:26.505064 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:40:26.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:26.529616 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Feb 9 19:40:26.533097 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 19:40:26.533110 kernel: GPT:9289727 != 19775487 Feb 9 19:40:26.533128 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 19:40:26.533141 kernel: GPT:9289727 != 19775487 Feb 9 19:40:26.533149 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 19:40:26.533158 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 19:40:26.542616 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 19:40:26.558617 kernel: libata version 3.00 loaded. Feb 9 19:40:26.560629 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 19:40:26.560662 kernel: AES CTR mode by8 optimization enabled Feb 9 19:40:26.563962 kernel: ata_piix 0000:00:01.1: version 2.13 Feb 9 19:40:26.564126 kernel: scsi host0: ata_piix Feb 9 19:40:26.569842 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 19:40:26.570795 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (452) Feb 9 19:40:26.575111 kernel: scsi host1: ata_piix Feb 9 19:40:26.574720 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 19:40:26.578570 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0c0 irq 14 Feb 9 19:40:26.578611 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0c8 irq 15 Feb 9 19:40:26.576908 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 19:40:26.586697 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:40:26.590136 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 19:40:26.591454 systemd[1]: Starting disk-uuid.service... Feb 9 19:40:26.598591 disk-uuid[516]: Primary Header is updated. Feb 9 19:40:26.598591 disk-uuid[516]: Secondary Entries is updated. Feb 9 19:40:26.598591 disk-uuid[516]: Secondary Header is updated. Feb 9 19:40:26.602631 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 19:40:26.605625 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 19:40:26.736623 kernel: ata2.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Feb 9 19:40:26.736685 kernel: scsi 1:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Feb 9 19:40:26.769663 kernel: sr 1:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Feb 9 19:40:26.770025 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 9 19:40:26.786641 kernel: sr 1:0:0:0: Attached scsi CD-ROM sr0 Feb 9 19:40:27.617627 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 19:40:27.617888 disk-uuid[517]: The operation has completed successfully. Feb 9 19:40:27.634209 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 19:40:27.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:27.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:27.634287 systemd[1]: Finished disk-uuid.service. Feb 9 19:40:27.646198 systemd[1]: Starting verity-setup.service... Feb 9 19:40:27.659636 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Feb 9 19:40:27.675819 systemd[1]: Found device dev-mapper-usr.device. Feb 9 19:40:27.677381 systemd[1]: Mounting sysusr-usr.mount... Feb 9 19:40:27.679452 systemd[1]: Finished verity-setup.service. Feb 9 19:40:27.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:27.737565 systemd[1]: Mounted sysusr-usr.mount. Feb 9 19:40:27.738664 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 19:40:27.738781 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 19:40:27.739645 systemd[1]: Starting ignition-setup.service... Feb 9 19:40:27.740983 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 19:40:27.747757 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:40:27.747818 kernel: BTRFS info (device vda6): using free space tree Feb 9 19:40:27.747846 kernel: BTRFS info (device vda6): has skinny extents Feb 9 19:40:27.757193 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 19:40:27.801073 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 19:40:27.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:27.809000 audit: BPF prog-id=9 op=LOAD Feb 9 19:40:27.810480 systemd[1]: Starting systemd-networkd.service... Feb 9 19:40:27.830844 systemd-networkd[700]: lo: Link UP Feb 9 19:40:27.830858 systemd-networkd[700]: lo: Gained carrier Feb 9 19:40:27.833722 systemd-networkd[700]: Enumeration completed Feb 9 19:40:27.833806 systemd[1]: Started systemd-networkd.service. Feb 9 19:40:27.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:27.834218 systemd[1]: Reached target network.target. Feb 9 19:40:27.834954 systemd[1]: Starting iscsiuio.service... Feb 9 19:40:27.836981 systemd-networkd[700]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:40:27.838590 systemd-networkd[700]: eth0: Link UP Feb 9 19:40:27.838624 systemd-networkd[700]: eth0: Gained carrier Feb 9 19:40:27.849233 systemd[1]: Started iscsiuio.service. Feb 9 19:40:27.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:27.881548 systemd[1]: Starting iscsid.service... Feb 9 19:40:27.885466 iscsid[705]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:40:27.885466 iscsid[705]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 19:40:27.885466 iscsid[705]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 19:40:27.885466 iscsid[705]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 19:40:27.891256 iscsid[705]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:40:27.891256 iscsid[705]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 19:40:27.894563 systemd[1]: Started iscsid.service. Feb 9 19:40:27.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:27.895641 systemd[1]: Starting dracut-initqueue.service... Feb 9 19:40:27.898761 systemd-networkd[700]: eth0: DHCPv4 address 10.0.0.29/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 9 19:40:27.905561 systemd[1]: Finished dracut-initqueue.service. Feb 9 19:40:27.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:27.906036 systemd[1]: Reached target remote-fs-pre.target. Feb 9 19:40:27.907144 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:40:27.907411 systemd[1]: Reached target remote-fs.target. Feb 9 19:40:27.910883 systemd[1]: Starting dracut-pre-mount.service... Feb 9 19:40:27.917795 systemd[1]: Finished dracut-pre-mount.service. Feb 9 19:40:27.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:27.967635 systemd[1]: Finished ignition-setup.service. Feb 9 19:40:27.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:27.968580 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 19:40:28.013317 ignition[720]: Ignition 2.14.0 Feb 9 19:40:28.013327 ignition[720]: Stage: fetch-offline Feb 9 19:40:28.013377 ignition[720]: no configs at "/usr/lib/ignition/base.d" Feb 9 19:40:28.013386 ignition[720]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 19:40:28.013483 ignition[720]: parsed url from cmdline: "" Feb 9 19:40:28.013486 ignition[720]: no config URL provided Feb 9 19:40:28.013490 ignition[720]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 19:40:28.013497 ignition[720]: no config at "/usr/lib/ignition/user.ign" Feb 9 19:40:28.013514 ignition[720]: op(1): [started] loading QEMU firmware config module Feb 9 19:40:28.013519 ignition[720]: op(1): executing: "modprobe" "qemu_fw_cfg" Feb 9 19:40:28.021460 ignition[720]: op(1): [finished] loading QEMU firmware config module Feb 9 19:40:28.075900 ignition[720]: parsing config with SHA512: 691d72a18b9b25755f0fc60d83a24ce0854904c392bf8387c0502cd3faad39612c60dcbb6464002cdb3dc1342712372d2157820899c60350de7013ccdcb49dec Feb 9 19:40:28.114623 unknown[720]: fetched base config from "system" Feb 9 19:40:28.114633 unknown[720]: fetched user config from "qemu" Feb 9 19:40:28.116166 ignition[720]: fetch-offline: fetch-offline passed Feb 9 19:40:28.116729 ignition[720]: Ignition finished successfully Feb 9 19:40:28.118144 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 19:40:28.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:28.119593 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 9 19:40:28.120892 systemd[1]: Starting ignition-kargs.service... Feb 9 19:40:28.130209 ignition[728]: Ignition 2.14.0 Feb 9 19:40:28.130218 ignition[728]: Stage: kargs Feb 9 19:40:28.130303 ignition[728]: no configs at "/usr/lib/ignition/base.d" Feb 9 19:40:28.130311 ignition[728]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 19:40:28.133345 ignition[728]: kargs: kargs passed Feb 9 19:40:28.133388 ignition[728]: Ignition finished successfully Feb 9 19:40:28.134890 systemd[1]: Finished ignition-kargs.service. Feb 9 19:40:28.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:28.136509 systemd[1]: Starting ignition-disks.service... Feb 9 19:40:28.145891 ignition[734]: Ignition 2.14.0 Feb 9 19:40:28.145900 ignition[734]: Stage: disks Feb 9 19:40:28.145989 ignition[734]: no configs at "/usr/lib/ignition/base.d" Feb 9 19:40:28.145998 ignition[734]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 19:40:28.149052 ignition[734]: disks: disks passed Feb 9 19:40:28.149092 ignition[734]: Ignition finished successfully Feb 9 19:40:28.150542 systemd[1]: Finished ignition-disks.service. Feb 9 19:40:28.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:28.150962 systemd[1]: Reached target initrd-root-device.target. Feb 9 19:40:28.151863 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:40:28.152064 systemd[1]: Reached target local-fs.target. Feb 9 19:40:28.152284 systemd[1]: Reached target sysinit.target. Feb 9 19:40:28.152500 systemd[1]: Reached target basic.target. Feb 9 19:40:28.153521 systemd[1]: Starting systemd-fsck-root.service... Feb 9 19:40:28.175816 systemd-fsck[742]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 9 19:40:28.338062 systemd[1]: Finished systemd-fsck-root.service. Feb 9 19:40:28.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:28.339998 systemd[1]: Mounting sysroot.mount... Feb 9 19:40:28.352610 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 19:40:28.352924 systemd[1]: Mounted sysroot.mount. Feb 9 19:40:28.353314 systemd[1]: Reached target initrd-root-fs.target. Feb 9 19:40:28.354987 systemd[1]: Mounting sysroot-usr.mount... Feb 9 19:40:28.355652 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 9 19:40:28.355683 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 19:40:28.355702 systemd[1]: Reached target ignition-diskful.target. Feb 9 19:40:28.357950 systemd[1]: Mounted sysroot-usr.mount. Feb 9 19:40:28.358796 systemd[1]: Starting initrd-setup-root.service... Feb 9 19:40:28.363159 initrd-setup-root[752]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 19:40:28.366685 initrd-setup-root[760]: cut: /sysroot/etc/group: No such file or directory Feb 9 19:40:28.369886 initrd-setup-root[768]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 19:40:28.373000 initrd-setup-root[776]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 19:40:28.396090 systemd[1]: Finished initrd-setup-root.service. Feb 9 19:40:28.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:28.397690 systemd[1]: Starting ignition-mount.service... Feb 9 19:40:28.398944 systemd[1]: Starting sysroot-boot.service... Feb 9 19:40:28.402696 bash[793]: umount: /sysroot/usr/share/oem: not mounted. Feb 9 19:40:28.422809 ignition[794]: INFO : Ignition 2.14.0 Feb 9 19:40:28.422809 ignition[794]: INFO : Stage: mount Feb 9 19:40:28.424397 ignition[794]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 9 19:40:28.424397 ignition[794]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 19:40:28.425922 ignition[794]: INFO : mount: mount passed Feb 9 19:40:28.425922 ignition[794]: INFO : Ignition finished successfully Feb 9 19:40:28.427068 systemd[1]: Finished sysroot-boot.service. Feb 9 19:40:28.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:28.428880 systemd[1]: Finished ignition-mount.service. Feb 9 19:40:28.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:28.685689 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:40:28.696626 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (803) Feb 9 19:40:28.698019 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:40:28.698031 kernel: BTRFS info (device vda6): using free space tree Feb 9 19:40:28.698041 kernel: BTRFS info (device vda6): has skinny extents Feb 9 19:40:28.701096 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:40:28.702007 systemd[1]: Starting ignition-files.service... Feb 9 19:40:28.715233 ignition[823]: INFO : Ignition 2.14.0 Feb 9 19:40:28.715233 ignition[823]: INFO : Stage: files Feb 9 19:40:28.716891 ignition[823]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 9 19:40:28.716891 ignition[823]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 19:40:28.731702 ignition[823]: DEBUG : files: compiled without relabeling support, skipping Feb 9 19:40:28.732789 ignition[823]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 19:40:28.732789 ignition[823]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 19:40:28.734995 ignition[823]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 19:40:28.734995 ignition[823]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 19:40:28.734995 ignition[823]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 19:40:28.734529 unknown[823]: wrote ssh authorized keys file for user: core Feb 9 19:40:28.738900 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 19:40:28.738900 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 9 19:40:29.118723 systemd-networkd[700]: eth0: Gained IPv6LL Feb 9 19:40:29.225377 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 19:40:29.440788 ignition[823]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 9 19:40:29.440788 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 19:40:29.444277 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 19:40:29.444277 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 9 19:40:29.920554 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 19:40:30.084463 ignition[823]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 9 19:40:30.087089 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 19:40:30.087089 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 19:40:30.087089 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 9 19:40:30.107787 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 19:40:30.186662 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 19:40:30.188267 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:40:30.189622 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Feb 9 19:40:30.508296 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 19:40:36.786627 ignition[823]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Feb 9 19:40:36.789017 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:40:36.789017 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:40:36.789017 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Feb 9 19:40:37.054786 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 9 19:40:53.929998 ignition[823]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Feb 9 19:40:53.932319 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:40:53.932319 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Feb 9 19:40:53.932319 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubectl: attempt #1 Feb 9 19:40:54.098316 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 9 19:40:59.582682 ignition[823]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 857e67001e74840518413593d90c6e64ad3f00d55fa44ad9a8e2ed6135392c908caff7ec19af18cbe10784b8f83afe687a0bc3bacbc9eee984cdeb9c0749cb83 Feb 9 19:40:59.584973 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 9 19:40:59.584973 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:40:59.584973 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:40:59.584973 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 9 19:40:59.584973 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 19:40:59.584973 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 9 19:40:59.591855 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 9 19:40:59.591855 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 19:40:59.591855 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 19:40:59.591855 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 19:40:59.596586 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 19:40:59.597758 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:40:59.598940 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:40:59.600114 ignition[823]: INFO : files: op(f): [started] processing unit "prepare-helm.service" Feb 9 19:40:59.600979 ignition[823]: INFO : files: op(f): op(10): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 19:40:59.602383 ignition[823]: INFO : files: op(f): op(10): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 19:40:59.602383 ignition[823]: INFO : files: op(f): [finished] processing unit "prepare-helm.service" Feb 9 19:40:59.602383 ignition[823]: INFO : files: op(11): [started] processing unit "coreos-metadata.service" Feb 9 19:40:59.602383 ignition[823]: INFO : files: op(11): op(12): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 9 19:40:59.608257 ignition[823]: INFO : files: op(11): op(12): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 9 19:40:59.608257 ignition[823]: INFO : files: op(11): [finished] processing unit "coreos-metadata.service" Feb 9 19:40:59.608257 ignition[823]: INFO : files: op(13): [started] processing unit "prepare-cni-plugins.service" Feb 9 19:40:59.608257 ignition[823]: INFO : files: op(13): op(14): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:40:59.608257 ignition[823]: INFO : files: op(13): op(14): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:40:59.608257 ignition[823]: INFO : files: op(13): [finished] processing unit "prepare-cni-plugins.service" Feb 9 19:40:59.608257 ignition[823]: INFO : files: op(15): [started] processing unit "prepare-critools.service" Feb 9 19:40:59.608257 ignition[823]: INFO : files: op(15): op(16): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:40:59.608257 ignition[823]: INFO : files: op(15): op(16): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:40:59.608257 ignition[823]: INFO : files: op(15): [finished] processing unit "prepare-critools.service" Feb 9 19:40:59.608257 ignition[823]: INFO : files: op(17): [started] setting preset to enabled for "prepare-helm.service" Feb 9 19:40:59.608257 ignition[823]: INFO : files: op(17): [finished] setting preset to enabled for "prepare-helm.service" Feb 9 19:40:59.608257 ignition[823]: INFO : files: op(18): [started] setting preset to disabled for "coreos-metadata.service" Feb 9 19:40:59.608257 ignition[823]: INFO : files: op(18): op(19): [started] removing enablement symlink(s) for "coreos-metadata.service" Feb 9 19:40:59.630066 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 9 19:40:59.630101 kernel: audit: type=1130 audit(1707507659.625:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.630172 ignition[823]: INFO : files: op(18): op(19): [finished] removing enablement symlink(s) for "coreos-metadata.service" Feb 9 19:40:59.630172 ignition[823]: INFO : files: op(18): [finished] setting preset to disabled for "coreos-metadata.service" Feb 9 19:40:59.630172 ignition[823]: INFO : files: op(1a): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:40:59.630172 ignition[823]: INFO : files: op(1a): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:40:59.630172 ignition[823]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-critools.service" Feb 9 19:40:59.630172 ignition[823]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 19:40:59.630172 ignition[823]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:40:59.630172 ignition[823]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:40:59.630172 ignition[823]: INFO : files: files passed Feb 9 19:40:59.630172 ignition[823]: INFO : Ignition finished successfully Feb 9 19:40:59.648473 kernel: audit: type=1130 audit(1707507659.633:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.648501 kernel: audit: type=1130 audit(1707507659.638:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.648511 kernel: audit: type=1131 audit(1707507659.638:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.624138 systemd[1]: Finished ignition-files.service. Feb 9 19:40:59.626728 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 19:40:59.650077 initrd-setup-root-after-ignition[846]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Feb 9 19:40:59.630089 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 19:40:59.652580 initrd-setup-root-after-ignition[849]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 19:40:59.630769 systemd[1]: Starting ignition-quench.service... Feb 9 19:40:59.633056 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 19:40:59.634728 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 19:40:59.634794 systemd[1]: Finished ignition-quench.service. Feb 9 19:40:59.638225 systemd[1]: Reached target ignition-complete.target. Feb 9 19:40:59.644146 systemd[1]: Starting initrd-parse-etc.service... Feb 9 19:40:59.662792 kernel: audit: type=1130 audit(1707507659.657:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.662808 kernel: audit: type=1131 audit(1707507659.657:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.657062 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 19:40:59.657149 systemd[1]: Finished initrd-parse-etc.service. Feb 9 19:40:59.657872 systemd[1]: Reached target initrd-fs.target. Feb 9 19:40:59.662828 systemd[1]: Reached target initrd.target. Feb 9 19:40:59.663521 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 19:40:59.664491 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 19:40:59.673958 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 19:40:59.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.675836 systemd[1]: Starting initrd-cleanup.service... Feb 9 19:40:59.678133 kernel: audit: type=1130 audit(1707507659.674:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.683924 systemd[1]: Stopped target nss-lookup.target. Feb 9 19:40:59.684607 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 19:40:59.685733 systemd[1]: Stopped target timers.target. Feb 9 19:40:59.686999 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 19:40:59.691151 kernel: audit: type=1131 audit(1707507659.687:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.687091 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 19:40:59.688193 systemd[1]: Stopped target initrd.target. Feb 9 19:40:59.691232 systemd[1]: Stopped target basic.target. Feb 9 19:40:59.692340 systemd[1]: Stopped target ignition-complete.target. Feb 9 19:40:59.693494 systemd[1]: Stopped target ignition-diskful.target. Feb 9 19:40:59.694586 systemd[1]: Stopped target initrd-root-device.target. Feb 9 19:40:59.695943 systemd[1]: Stopped target remote-fs.target. Feb 9 19:40:59.697138 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 19:40:59.698331 systemd[1]: Stopped target sysinit.target. Feb 9 19:40:59.699354 systemd[1]: Stopped target local-fs.target. Feb 9 19:40:59.700522 systemd[1]: Stopped target local-fs-pre.target. Feb 9 19:40:59.701641 systemd[1]: Stopped target swap.target. Feb 9 19:40:59.706692 kernel: audit: type=1131 audit(1707507659.703:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.702658 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 19:40:59.702808 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 19:40:59.710949 kernel: audit: type=1131 audit(1707507659.707:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.703866 systemd[1]: Stopped target cryptsetup.target. Feb 9 19:40:59.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.706739 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 19:40:59.706833 systemd[1]: Stopped dracut-initqueue.service. Feb 9 19:40:59.708054 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 19:40:59.708160 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 19:40:59.711086 systemd[1]: Stopped target paths.target. Feb 9 19:40:59.712056 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 19:40:59.715669 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 19:40:59.716655 systemd[1]: Stopped target slices.target. Feb 9 19:40:59.717737 systemd[1]: Stopped target sockets.target. Feb 9 19:40:59.718753 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 19:40:59.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.718846 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 19:40:59.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.719944 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 19:40:59.720032 systemd[1]: Stopped ignition-files.service. Feb 9 19:40:59.724024 iscsid[705]: iscsid shutting down. Feb 9 19:40:59.722036 systemd[1]: Stopping ignition-mount.service... Feb 9 19:40:59.723285 systemd[1]: Stopping iscsid.service... Feb 9 19:40:59.724889 systemd[1]: Stopping sysroot-boot.service... Feb 9 19:40:59.725852 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 19:40:59.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.726084 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 19:40:59.727213 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 19:40:59.727320 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 19:40:59.731411 ignition[863]: INFO : Ignition 2.14.0 Feb 9 19:40:59.731411 ignition[863]: INFO : Stage: umount Feb 9 19:40:59.731411 ignition[863]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 9 19:40:59.731411 ignition[863]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 19:40:59.730000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.730337 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 19:40:59.736210 ignition[863]: INFO : umount: umount passed Feb 9 19:40:59.736210 ignition[863]: INFO : Ignition finished successfully Feb 9 19:40:59.730429 systemd[1]: Stopped iscsid.service. Feb 9 19:40:59.737000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.732587 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 19:40:59.732682 systemd[1]: Finished initrd-cleanup.service. Feb 9 19:40:59.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.734227 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 19:40:59.734295 systemd[1]: Stopped ignition-mount.service. Feb 9 19:40:59.736171 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 19:40:59.736204 systemd[1]: Closed iscsid.socket. Feb 9 19:40:59.737347 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 19:40:59.737381 systemd[1]: Stopped ignition-disks.service. Feb 9 19:40:59.738562 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 19:40:59.738592 systemd[1]: Stopped ignition-kargs.service. Feb 9 19:40:59.739806 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 19:40:59.739849 systemd[1]: Stopped ignition-setup.service. Feb 9 19:40:59.741070 systemd[1]: Stopping iscsiuio.service... Feb 9 19:40:59.749391 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 19:40:59.750358 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 19:40:59.751023 systemd[1]: Stopped iscsiuio.service. Feb 9 19:40:59.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.752188 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 19:40:59.752997 systemd[1]: Stopped sysroot-boot.service. Feb 9 19:40:59.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.754172 systemd[1]: Stopped target network.target. Feb 9 19:40:59.755255 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 19:40:59.755288 systemd[1]: Closed iscsiuio.socket. Feb 9 19:40:59.756767 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 19:40:59.756807 systemd[1]: Stopped initrd-setup-root.service. Feb 9 19:40:59.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.758798 systemd[1]: Stopping systemd-networkd.service... Feb 9 19:40:59.759992 systemd[1]: Stopping systemd-resolved.service... Feb 9 19:40:59.763666 systemd-networkd[700]: eth0: DHCPv6 lease lost Feb 9 19:40:59.765075 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 19:40:59.765189 systemd[1]: Stopped systemd-networkd.service. Feb 9 19:40:59.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.765703 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 19:40:59.765731 systemd[1]: Closed systemd-networkd.socket. Feb 9 19:40:59.767942 systemd[1]: Stopping network-cleanup.service... Feb 9 19:40:59.768374 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 19:40:59.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.768419 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 19:40:59.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.769706 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 19:40:59.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.772000 audit: BPF prog-id=9 op=UNLOAD Feb 9 19:40:59.769768 systemd[1]: Stopped systemd-sysctl.service. Feb 9 19:40:59.771700 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 19:40:59.771778 systemd[1]: Stopped systemd-modules-load.service. Feb 9 19:40:59.772575 systemd[1]: Stopping systemd-udevd.service... Feb 9 19:40:59.774415 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 19:40:59.777013 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 19:40:59.777754 systemd[1]: Stopped systemd-resolved.service. Feb 9 19:40:59.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.779624 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 19:40:59.780361 systemd[1]: Stopped systemd-udevd.service. Feb 9 19:40:59.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.781834 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 19:40:59.781913 systemd[1]: Stopped network-cleanup.service. Feb 9 19:40:59.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.783000 audit: BPF prog-id=6 op=UNLOAD Feb 9 19:40:59.783868 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 19:40:59.783903 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 19:40:59.785694 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 19:40:59.785725 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 19:40:59.787058 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 19:40:59.788000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.787092 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 19:40:59.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.788867 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 19:40:59.790000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.788899 systemd[1]: Stopped dracut-cmdline.service. Feb 9 19:40:59.790057 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 19:40:59.790091 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 19:40:59.793583 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 19:40:59.794773 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 9 19:40:59.794817 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 9 19:40:59.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.796821 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 19:40:59.796859 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 19:40:59.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.798611 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 19:40:59.798645 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 19:40:59.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.801252 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 9 19:40:59.802620 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 19:40:59.803417 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 19:40:59.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.804790 systemd[1]: Reached target initrd-switch-root.target. Feb 9 19:40:59.806540 systemd[1]: Starting initrd-switch-root.service... Feb 9 19:40:59.822097 systemd[1]: Switching root. Feb 9 19:40:59.840931 systemd-journald[197]: Journal stopped Feb 9 19:41:02.249711 systemd-journald[197]: Received SIGTERM from PID 1 (systemd). Feb 9 19:41:02.249789 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 19:41:02.249811 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 19:41:02.249826 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 19:41:02.249843 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 19:41:02.249856 kernel: SELinux: policy capability open_perms=1 Feb 9 19:41:02.249874 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 19:41:02.249886 kernel: SELinux: policy capability always_check_network=0 Feb 9 19:41:02.249902 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 19:41:02.249924 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 19:41:02.249937 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 19:41:02.249950 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 19:41:02.249964 systemd[1]: Successfully loaded SELinux policy in 42.008ms. Feb 9 19:41:02.250004 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 9.436ms. Feb 9 19:41:02.250024 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:41:02.250040 systemd[1]: Detected virtualization kvm. Feb 9 19:41:02.250076 systemd[1]: Detected architecture x86-64. Feb 9 19:41:02.250093 systemd[1]: Detected first boot. Feb 9 19:41:02.250108 systemd[1]: Initializing machine ID from VM UUID. Feb 9 19:41:02.250123 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 19:41:02.250138 systemd[1]: Populated /etc with preset unit settings. Feb 9 19:41:02.250160 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:41:02.250180 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:41:02.250197 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:41:02.250213 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 19:41:02.250240 systemd[1]: Stopped initrd-switch-root.service. Feb 9 19:41:02.250256 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 19:41:02.250272 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 19:41:02.250287 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 19:41:02.250301 systemd[1]: Created slice system-getty.slice. Feb 9 19:41:02.250316 systemd[1]: Created slice system-modprobe.slice. Feb 9 19:41:02.250331 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 19:41:02.250346 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 19:41:02.250361 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 19:41:02.250387 systemd[1]: Created slice user.slice. Feb 9 19:41:02.250404 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:41:02.250418 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 19:41:02.250434 systemd[1]: Set up automount boot.automount. Feb 9 19:41:02.250448 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 19:41:02.250463 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 19:41:02.250478 systemd[1]: Stopped target initrd-fs.target. Feb 9 19:41:02.250502 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 19:41:02.250520 systemd[1]: Reached target integritysetup.target. Feb 9 19:41:02.250535 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:41:02.250550 systemd[1]: Reached target remote-fs.target. Feb 9 19:41:02.250564 systemd[1]: Reached target slices.target. Feb 9 19:41:02.250579 systemd[1]: Reached target swap.target. Feb 9 19:41:02.250593 systemd[1]: Reached target torcx.target. Feb 9 19:41:02.250634 systemd[1]: Reached target veritysetup.target. Feb 9 19:41:02.250651 systemd[1]: Listening on systemd-coredump.socket. Feb 9 19:41:02.250665 systemd[1]: Listening on systemd-initctl.socket. Feb 9 19:41:02.250691 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:41:02.250706 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:41:02.250721 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:41:02.250735 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 19:41:02.250749 systemd[1]: Mounting dev-hugepages.mount... Feb 9 19:41:02.250764 systemd[1]: Mounting dev-mqueue.mount... Feb 9 19:41:02.250778 systemd[1]: Mounting media.mount... Feb 9 19:41:02.251416 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:41:02.251437 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 19:41:02.251465 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 19:41:02.251480 systemd[1]: Mounting tmp.mount... Feb 9 19:41:02.251495 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 19:41:02.251512 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 19:41:02.251528 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:41:02.251542 systemd[1]: Starting modprobe@configfs.service... Feb 9 19:41:02.251557 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 19:41:02.251572 systemd[1]: Starting modprobe@drm.service... Feb 9 19:41:02.251586 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 19:41:02.251636 systemd[1]: Starting modprobe@fuse.service... Feb 9 19:41:02.251655 systemd[1]: Starting modprobe@loop.service... Feb 9 19:41:02.251671 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 19:41:02.251688 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 19:41:02.251725 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 19:41:02.251755 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 19:41:02.251771 kernel: loop: module loaded Feb 9 19:41:02.251786 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 19:41:02.251801 systemd[1]: Stopped systemd-journald.service. Feb 9 19:41:02.251816 systemd[1]: Starting systemd-journald.service... Feb 9 19:41:02.251830 kernel: fuse: init (API version 7.34) Feb 9 19:41:02.251844 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:41:02.251859 systemd[1]: Starting systemd-network-generator.service... Feb 9 19:41:02.251874 systemd[1]: Starting systemd-remount-fs.service... Feb 9 19:41:02.251900 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:41:02.251918 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 19:41:02.251933 systemd[1]: Stopped verity-setup.service. Feb 9 19:41:02.251948 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:41:02.251963 systemd[1]: Mounted dev-hugepages.mount. Feb 9 19:41:02.251977 systemd[1]: Mounted dev-mqueue.mount. Feb 9 19:41:02.251992 systemd[1]: Mounted media.mount. Feb 9 19:41:02.252007 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 19:41:02.252026 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 19:41:02.252057 systemd[1]: Mounted tmp.mount. Feb 9 19:41:02.252075 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:41:02.252089 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 19:41:02.252106 systemd-journald[973]: Journal started Feb 9 19:41:02.252160 systemd-journald[973]: Runtime Journal (/run/log/journal/4ada407305e746f98e3b0cd2547a66a9) is 6.0M, max 48.4M, 42.4M free. Feb 9 19:40:59.902000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 19:40:59.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:40:59.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:40:59.937000 audit: BPF prog-id=10 op=LOAD Feb 9 19:40:59.937000 audit: BPF prog-id=10 op=UNLOAD Feb 9 19:40:59.937000 audit: BPF prog-id=11 op=LOAD Feb 9 19:40:59.937000 audit: BPF prog-id=11 op=UNLOAD Feb 9 19:40:59.970000 audit[896]: AVC avc: denied { associate } for pid=896 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 19:40:59.970000 audit[896]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001858e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=879 pid=896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:59.970000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:40:59.971000 audit[896]: AVC avc: denied { associate } for pid=896 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 19:40:59.971000 audit[896]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001859b9 a2=1ed a3=0 items=2 ppid=879 pid=896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:59.971000 audit: CWD cwd="/" Feb 9 19:40:59.971000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:40:59.971000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:40:59.971000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:41:02.137000 audit: BPF prog-id=12 op=LOAD Feb 9 19:41:02.137000 audit: BPF prog-id=3 op=UNLOAD Feb 9 19:41:02.137000 audit: BPF prog-id=13 op=LOAD Feb 9 19:41:02.137000 audit: BPF prog-id=14 op=LOAD Feb 9 19:41:02.138000 audit: BPF prog-id=4 op=UNLOAD Feb 9 19:41:02.138000 audit: BPF prog-id=5 op=UNLOAD Feb 9 19:41:02.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:02.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:02.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:02.147000 audit: BPF prog-id=12 op=UNLOAD Feb 9 19:41:02.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:02.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:02.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:02.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:02.221000 audit: BPF prog-id=15 op=LOAD Feb 9 19:41:02.221000 audit: BPF prog-id=16 op=LOAD Feb 9 19:41:02.221000 audit: BPF prog-id=17 op=LOAD Feb 9 19:41:02.221000 audit: BPF prog-id=13 op=UNLOAD Feb 9 19:41:02.221000 audit: BPF prog-id=14 op=UNLOAD Feb 9 19:41:02.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:02.246000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 19:41:02.246000 audit[973]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffceae37910 a2=4000 a3=7ffceae379ac items=0 ppid=1 pid=973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:02.254269 systemd[1]: Finished modprobe@configfs.service. Feb 9 19:41:02.246000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 19:41:02.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:02.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:02.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.969248 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T19:40:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:41:02.136547 systemd[1]: Queued start job for default target multi-user.target. Feb 9 19:40:59.969498 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T19:40:59Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:41:02.136558 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 9 19:40:59.969516 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T19:40:59Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:41:02.139203 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 19:40:59.969547 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T19:40:59Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 19:41:02.255799 systemd[1]: Started systemd-journald.service. Feb 9 19:41:02.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.969557 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T19:40:59Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 19:40:59.969590 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T19:40:59Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 19:41:02.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:59.969614 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T19:40:59Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 19:41:02.256192 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 19:40:59.969810 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T19:40:59Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 19:40:59.969861 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T19:40:59Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:40:59.969874 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T19:40:59Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:41:02.257232 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 19:40:59.970179 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T19:40:59Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 19:41:02.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:02.257000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:02.257398 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 19:40:59.970215 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T19:40:59Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 19:40:59.970245 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T19:40:59Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 19:40:59.970269 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T19:40:59Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 19:40:59.970291 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T19:40:59Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 19:41:02.258434 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 19:40:59.970307 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T19:40:59Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 19:41:01.827957 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T19:41:01Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:41:02.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:02.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:02.258615 systemd[1]: Finished modprobe@drm.service. Feb 9 19:41:01.828212 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T19:41:01Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:41:01.828299 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T19:41:01Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:41:01.828444 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T19:41:01Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:41:01.828488 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T19:41:01Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 19:41:01.828541 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T19:41:01Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 19:41:02.259805 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 19:41:02.259987 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 19:41:02.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:02.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:02.260989 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 19:41:02.261170 systemd[1]: Finished modprobe@fuse.service. Feb 9 19:41:02.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:02.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:02.262067 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 19:41:02.262252 systemd[1]: Finished modprobe@loop.service. Feb 9 19:41:02.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:02.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:02.263185 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:41:02.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:02.264145 systemd[1]: Finished systemd-network-generator.service. Feb 9 19:41:02.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:02.265114 systemd[1]: Finished systemd-remount-fs.service. Feb 9 19:41:02.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:02.266195 systemd[1]: Reached target network-pre.target. Feb 9 19:41:02.267939 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 19:41:02.270031 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 19:41:02.270705 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 19:41:02.272584 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 19:41:02.274174 systemd[1]: Starting systemd-journal-flush.service... Feb 9 19:41:02.274938 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 19:41:02.276272 systemd[1]: Starting systemd-random-seed.service... Feb 9 19:41:02.277056 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 19:41:02.281888 systemd-journald[973]: Time spent on flushing to /var/log/journal/4ada407305e746f98e3b0cd2547a66a9 is 16.957ms for 1185 entries. Feb 9 19:41:02.281888 systemd-journald[973]: System Journal (/var/log/journal/4ada407305e746f98e3b0cd2547a66a9) is 8.0M, max 195.6M, 187.6M free. Feb 9 19:41:02.313285 systemd-journald[973]: Received client request to flush runtime journal. Feb 9 19:41:02.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:02.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:02.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:02.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:02.278239 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:41:02.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:02.280506 systemd[1]: Starting systemd-sysusers.service... Feb 9 19:41:02.283418 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 19:41:02.284634 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 19:41:02.315372 udevadm[1002]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 9 19:41:02.285491 systemd[1]: Finished systemd-random-seed.service. Feb 9 19:41:02.286252 systemd[1]: Reached target first-boot-complete.target. Feb 9 19:41:02.297456 systemd[1]: Finished systemd-sysusers.service. Feb 9 19:41:02.298349 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:41:02.299900 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 19:41:02.302750 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:41:02.304267 systemd[1]: Starting systemd-udev-settle.service... Feb 9 19:41:02.314164 systemd[1]: Finished systemd-journal-flush.service. Feb 9 19:41:02.323650 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 19:41:02.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:02.882758 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 19:41:02.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:02.883000 audit: BPF prog-id=18 op=LOAD Feb 9 19:41:02.883000 audit: BPF prog-id=19 op=LOAD Feb 9 19:41:02.883000 audit: BPF prog-id=7 op=UNLOAD Feb 9 19:41:02.883000 audit: BPF prog-id=8 op=UNLOAD Feb 9 19:41:02.884932 systemd[1]: Starting systemd-udevd.service... Feb 9 19:41:02.901241 systemd-udevd[1004]: Using default interface naming scheme 'v252'. Feb 9 19:41:02.914371 systemd[1]: Started systemd-udevd.service. Feb 9 19:41:02.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:02.915000 audit: BPF prog-id=20 op=LOAD Feb 9 19:41:02.916811 systemd[1]: Starting systemd-networkd.service... Feb 9 19:41:02.922000 audit: BPF prog-id=21 op=LOAD Feb 9 19:41:02.922000 audit: BPF prog-id=22 op=LOAD Feb 9 19:41:02.922000 audit: BPF prog-id=23 op=LOAD Feb 9 19:41:02.923946 systemd[1]: Starting systemd-userdbd.service... Feb 9 19:41:02.962046 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 9 19:41:02.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:02.969905 systemd[1]: Started systemd-userdbd.service. Feb 9 19:41:03.011000 audit[1017]: AVC avc: denied { confidentiality } for pid=1017 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 19:41:03.022761 systemd-networkd[1012]: lo: Link UP Feb 9 19:41:03.022770 systemd-networkd[1012]: lo: Gained carrier Feb 9 19:41:03.023183 systemd-networkd[1012]: Enumeration completed Feb 9 19:41:03.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:03.023281 systemd[1]: Started systemd-networkd.service. Feb 9 19:41:03.023284 systemd-networkd[1012]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:41:03.024749 systemd-networkd[1012]: eth0: Link UP Feb 9 19:41:03.024758 systemd-networkd[1012]: eth0: Gained carrier Feb 9 19:41:03.028310 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 9 19:41:03.027959 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:41:03.011000 audit[1017]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=560082ba28e0 a1=32194 a2=7faf69c74bc5 a3=5 items=108 ppid=1004 pid=1017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:03.011000 audit: CWD cwd="/" Feb 9 19:41:03.011000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=1 name=(null) inode=13101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=2 name=(null) inode=13101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=3 name=(null) inode=13102 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=4 name=(null) inode=13101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=5 name=(null) inode=13103 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=6 name=(null) inode=13101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=7 name=(null) inode=13104 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=8 name=(null) inode=13104 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=9 name=(null) inode=13105 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=10 name=(null) inode=13104 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=11 name=(null) inode=13106 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=12 name=(null) inode=13104 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=13 name=(null) inode=13107 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=14 name=(null) inode=13104 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=15 name=(null) inode=13108 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=16 name=(null) inode=13104 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=17 name=(null) inode=13109 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=18 name=(null) inode=13101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=19 name=(null) inode=13110 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=20 name=(null) inode=13110 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=21 name=(null) inode=13111 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=22 name=(null) inode=13110 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=23 name=(null) inode=13112 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=24 name=(null) inode=13110 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=25 name=(null) inode=13113 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=26 name=(null) inode=13110 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=27 name=(null) inode=13114 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=28 name=(null) inode=13110 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=29 name=(null) inode=13115 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=30 name=(null) inode=13101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=31 name=(null) inode=13116 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=32 name=(null) inode=13116 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=33 name=(null) inode=13117 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=34 name=(null) inode=13116 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=35 name=(null) inode=13118 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=36 name=(null) inode=13116 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=37 name=(null) inode=13119 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=38 name=(null) inode=13116 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=39 name=(null) inode=13120 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=40 name=(null) inode=13116 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=41 name=(null) inode=13121 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=42 name=(null) inode=13101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=43 name=(null) inode=13122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=44 name=(null) inode=13122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=45 name=(null) inode=13123 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=46 name=(null) inode=13122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=47 name=(null) inode=13124 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=48 name=(null) inode=13122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=49 name=(null) inode=13125 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=50 name=(null) inode=13122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=51 name=(null) inode=13126 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=52 name=(null) inode=13122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.041618 kernel: ACPI: button: Power Button [PWRF] Feb 9 19:41:03.011000 audit: PATH item=53 name=(null) inode=13127 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=55 name=(null) inode=13128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=56 name=(null) inode=13128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=57 name=(null) inode=13129 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=58 name=(null) inode=13128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=59 name=(null) inode=13130 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=60 name=(null) inode=13128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=61 name=(null) inode=13131 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=62 name=(null) inode=13131 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=63 name=(null) inode=13132 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=64 name=(null) inode=13131 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=65 name=(null) inode=13133 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=66 name=(null) inode=13131 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=67 name=(null) inode=13134 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=68 name=(null) inode=13131 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=69 name=(null) inode=13135 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=70 name=(null) inode=13131 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=71 name=(null) inode=13136 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=72 name=(null) inode=13128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=73 name=(null) inode=13137 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=74 name=(null) inode=13137 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=75 name=(null) inode=13138 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=76 name=(null) inode=13137 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=77 name=(null) inode=13139 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=78 name=(null) inode=13137 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=79 name=(null) inode=13140 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=80 name=(null) inode=13137 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.040736 systemd-networkd[1012]: eth0: DHCPv4 address 10.0.0.29/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 9 19:41:03.011000 audit: PATH item=81 name=(null) inode=13141 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=82 name=(null) inode=13137 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=83 name=(null) inode=13142 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=84 name=(null) inode=13128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=85 name=(null) inode=13143 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=86 name=(null) inode=13143 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=87 name=(null) inode=13144 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=88 name=(null) inode=13143 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=89 name=(null) inode=13145 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=90 name=(null) inode=13143 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=91 name=(null) inode=13146 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=92 name=(null) inode=13143 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=93 name=(null) inode=13147 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=94 name=(null) inode=13143 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=95 name=(null) inode=13148 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=96 name=(null) inode=13128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=97 name=(null) inode=13149 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=98 name=(null) inode=13149 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=99 name=(null) inode=13150 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=100 name=(null) inode=13149 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=101 name=(null) inode=13151 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=102 name=(null) inode=13149 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=103 name=(null) inode=13152 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=104 name=(null) inode=13149 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=105 name=(null) inode=13153 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=106 name=(null) inode=13149 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PATH item=107 name=(null) inode=13154 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:03.011000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 19:41:03.054627 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Feb 9 19:41:03.056627 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 0 Feb 9 19:41:03.074645 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 19:41:03.115084 kernel: kvm: Nested Virtualization enabled Feb 9 19:41:03.115202 kernel: SVM: kvm: Nested Paging enabled Feb 9 19:41:03.115223 kernel: SVM: Virtual VMLOAD VMSAVE supported Feb 9 19:41:03.115244 kernel: SVM: Virtual GIF supported Feb 9 19:41:03.132641 kernel: EDAC MC: Ver: 3.0.0 Feb 9 19:41:03.151064 systemd[1]: Finished systemd-udev-settle.service. Feb 9 19:41:03.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:03.153004 systemd[1]: Starting lvm2-activation-early.service... Feb 9 19:41:03.160393 lvm[1041]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:41:03.187623 systemd[1]: Finished lvm2-activation-early.service. Feb 9 19:41:03.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:03.188367 systemd[1]: Reached target cryptsetup.target. Feb 9 19:41:03.189960 systemd[1]: Starting lvm2-activation.service... Feb 9 19:41:03.194558 lvm[1042]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:41:03.223495 systemd[1]: Finished lvm2-activation.service. Feb 9 19:41:03.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:03.224200 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:41:03.224824 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 19:41:03.224847 systemd[1]: Reached target local-fs.target. Feb 9 19:41:03.225405 systemd[1]: Reached target machines.target. Feb 9 19:41:03.227000 systemd[1]: Starting ldconfig.service... Feb 9 19:41:03.227820 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 19:41:03.227874 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:41:03.228763 systemd[1]: Starting systemd-boot-update.service... Feb 9 19:41:03.230339 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 19:41:03.232120 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 19:41:03.233430 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:41:03.233473 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:41:03.234341 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 19:41:03.235884 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1044 (bootctl) Feb 9 19:41:03.236947 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 19:41:03.243942 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 19:41:03.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:03.245844 systemd-tmpfiles[1047]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 19:41:03.247059 systemd-tmpfiles[1047]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 19:41:03.248923 systemd-tmpfiles[1047]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 19:41:03.276236 systemd-fsck[1053]: fsck.fat 4.2 (2021-01-31) Feb 9 19:41:03.276236 systemd-fsck[1053]: /dev/vda1: 790 files, 115362/258078 clusters Feb 9 19:41:03.280547 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 19:41:03.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:03.283013 systemd[1]: Mounting boot.mount... Feb 9 19:41:03.291653 systemd[1]: Mounted boot.mount. Feb 9 19:41:03.302575 systemd[1]: Finished systemd-boot-update.service. Feb 9 19:41:03.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:03.883025 ldconfig[1043]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 19:41:03.883536 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 19:41:03.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:03.886359 systemd[1]: Starting audit-rules.service... Feb 9 19:41:03.888348 systemd[1]: Starting clean-ca-certificates.service... Feb 9 19:41:03.890335 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 19:41:03.892000 audit: BPF prog-id=24 op=LOAD Feb 9 19:41:03.893833 systemd[1]: Starting systemd-resolved.service... Feb 9 19:41:03.894000 audit: BPF prog-id=25 op=LOAD Feb 9 19:41:03.897745 systemd[1]: Starting systemd-timesyncd.service... Feb 9 19:41:03.899656 systemd[1]: Starting systemd-update-utmp.service... Feb 9 19:41:03.902440 systemd[1]: Finished clean-ca-certificates.service. Feb 9 19:41:03.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:03.903585 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 19:41:04.151000 audit[1068]: SYSTEM_BOOT pid=1068 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 19:41:04.153898 systemd[1]: Started systemd-timesyncd.service. Feb 9 19:41:04.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:04.154807 systemd[1]: Reached target time-set.target. Feb 9 19:41:04.154865 systemd-timesyncd[1066]: Contacted time server 10.0.0.1:123 (10.0.0.1). Feb 9 19:41:04.154904 systemd-timesyncd[1066]: Initial clock synchronization to Fri 2024-02-09 19:41:03.908581 UTC. Feb 9 19:41:04.157167 systemd[1]: Finished systemd-update-utmp.service. Feb 9 19:41:04.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:04.158448 systemd-resolved[1065]: Positive Trust Anchors: Feb 9 19:41:04.158460 systemd-resolved[1065]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:41:04.158486 systemd-resolved[1065]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:41:04.173000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 19:41:04.173000 audit[1077]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd3a742660 a2=420 a3=0 items=0 ppid=1056 pid=1077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:04.173000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 19:41:04.174128 augenrules[1077]: No rules Feb 9 19:41:04.174783 systemd[1]: Finished audit-rules.service. Feb 9 19:41:04.195108 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 19:41:04.200134 systemd-resolved[1065]: Defaulting to hostname 'linux'. Feb 9 19:41:04.201683 systemd[1]: Started systemd-resolved.service. Feb 9 19:41:04.202279 systemd[1]: Reached target network.target. Feb 9 19:41:04.202809 systemd[1]: Reached target nss-lookup.target. Feb 9 19:41:04.254706 systemd-networkd[1012]: eth0: Gained IPv6LL Feb 9 19:41:04.448632 systemd[1]: Finished ldconfig.service. Feb 9 19:41:04.450765 systemd[1]: Starting systemd-update-done.service... Feb 9 19:41:04.484453 systemd[1]: Finished systemd-update-done.service. Feb 9 19:41:04.485220 systemd[1]: Reached target sysinit.target. Feb 9 19:41:04.485862 systemd[1]: Started motdgen.path. Feb 9 19:41:04.486376 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 19:41:04.487280 systemd[1]: Started logrotate.timer. Feb 9 19:41:04.487873 systemd[1]: Started mdadm.timer. Feb 9 19:41:04.488356 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 19:41:04.488951 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 19:41:04.488980 systemd[1]: Reached target paths.target. Feb 9 19:41:04.489500 systemd[1]: Reached target timers.target. Feb 9 19:41:04.490284 systemd[1]: Listening on dbus.socket. Feb 9 19:41:04.491896 systemd[1]: Starting docker.socket... Feb 9 19:41:04.495875 systemd[1]: Listening on sshd.socket. Feb 9 19:41:04.496540 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:41:04.496909 systemd[1]: Listening on docker.socket. Feb 9 19:41:04.497508 systemd[1]: Reached target sockets.target. Feb 9 19:41:04.498083 systemd[1]: Reached target basic.target. Feb 9 19:41:04.498657 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:41:04.498681 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:41:04.499661 systemd[1]: Starting containerd.service... Feb 9 19:41:04.501216 systemd[1]: Starting dbus.service... Feb 9 19:41:04.502685 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 19:41:04.504425 systemd[1]: Starting extend-filesystems.service... Feb 9 19:41:04.505124 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 19:41:04.506145 systemd[1]: Starting motdgen.service... Feb 9 19:41:04.507364 jq[1087]: false Feb 9 19:41:04.510721 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 19:41:04.512523 systemd[1]: Starting prepare-critools.service... Feb 9 19:41:04.514256 systemd[1]: Starting prepare-helm.service... Feb 9 19:41:04.516502 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 19:41:04.518501 systemd[1]: Starting sshd-keygen.service... Feb 9 19:41:04.521094 extend-filesystems[1088]: Found sr0 Feb 9 19:41:04.521094 extend-filesystems[1088]: Found vda Feb 9 19:41:04.521094 extend-filesystems[1088]: Found vda1 Feb 9 19:41:04.521094 extend-filesystems[1088]: Found vda2 Feb 9 19:41:04.521094 extend-filesystems[1088]: Found vda3 Feb 9 19:41:04.521094 extend-filesystems[1088]: Found usr Feb 9 19:41:04.521094 extend-filesystems[1088]: Found vda4 Feb 9 19:41:04.521094 extend-filesystems[1088]: Found vda6 Feb 9 19:41:04.521094 extend-filesystems[1088]: Found vda7 Feb 9 19:41:04.521094 extend-filesystems[1088]: Found vda9 Feb 9 19:41:04.521094 extend-filesystems[1088]: Checking size of /dev/vda9 Feb 9 19:41:04.522654 systemd[1]: Starting systemd-logind.service... Feb 9 19:41:04.523282 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:41:04.523367 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 19:41:04.523881 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 19:41:04.529786 jq[1105]: true Feb 9 19:41:04.524540 systemd[1]: Starting update-engine.service... Feb 9 19:41:04.526298 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 19:41:04.529339 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 19:41:04.529521 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 19:41:04.529976 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 19:41:04.530116 systemd[1]: Finished motdgen.service. Feb 9 19:41:04.577610 tar[1107]: ./ Feb 9 19:41:04.577610 tar[1107]: ./loopback Feb 9 19:41:04.578056 jq[1110]: true Feb 9 19:41:04.567821 dbus-daemon[1086]: [system] SELinux support is enabled Feb 9 19:41:04.579268 tar[1108]: crictl Feb 9 19:41:04.579475 tar[1109]: linux-amd64/helm Feb 9 19:41:04.564056 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 19:41:04.564204 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 19:41:04.567934 systemd[1]: Started dbus.service. Feb 9 19:41:04.570146 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 19:41:04.570163 systemd[1]: Reached target system-config.target. Feb 9 19:41:04.570934 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 19:41:04.570948 systemd[1]: Reached target user-config.target. Feb 9 19:41:04.616435 extend-filesystems[1088]: Resized partition /dev/vda9 Feb 9 19:41:04.620510 extend-filesystems[1127]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 19:41:04.621379 systemd-logind[1103]: Watching system buttons on /dev/input/event1 (Power Button) Feb 9 19:41:04.634781 tar[1107]: ./bandwidth Feb 9 19:41:04.621395 systemd-logind[1103]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 19:41:04.634463 systemd-logind[1103]: New seat seat0. Feb 9 19:41:04.636878 systemd[1]: Started systemd-logind.service. Feb 9 19:41:04.684636 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Feb 9 19:41:04.709100 tar[1107]: ./ptp Feb 9 19:41:04.921906 env[1111]: time="2024-02-09T19:41:04.921843376Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 19:41:04.932435 tar[1107]: ./vlan Feb 9 19:41:04.965493 env[1111]: time="2024-02-09T19:41:04.965389205Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 19:41:04.965634 env[1111]: time="2024-02-09T19:41:04.965534357Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:41:04.974976 env[1111]: time="2024-02-09T19:41:04.974941756Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:41:04.974976 env[1111]: time="2024-02-09T19:41:04.974970319Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:41:04.975201 env[1111]: time="2024-02-09T19:41:04.975179832Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:41:04.975201 env[1111]: time="2024-02-09T19:41:04.975199289Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 19:41:04.975287 env[1111]: time="2024-02-09T19:41:04.975210069Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 19:41:04.975287 env[1111]: time="2024-02-09T19:41:04.975219226Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 19:41:04.975340 env[1111]: time="2024-02-09T19:41:04.975287013Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:41:04.975508 env[1111]: time="2024-02-09T19:41:04.975488461Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:41:04.975714 env[1111]: time="2024-02-09T19:41:04.975615268Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:41:04.975714 env[1111]: time="2024-02-09T19:41:04.975629064Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 19:41:04.975714 env[1111]: time="2024-02-09T19:41:04.975676824Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 19:41:04.975714 env[1111]: time="2024-02-09T19:41:04.975686602Z" level=info msg="metadata content store policy set" policy=shared Feb 9 19:41:04.982405 tar[1107]: ./host-device Feb 9 19:41:05.017372 update_engine[1104]: I0209 19:41:05.017107 1104 main.cc:92] Flatcar Update Engine starting Feb 9 19:41:05.018613 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Feb 9 19:41:05.019901 systemd[1]: Started update-engine.service. Feb 9 19:41:05.542273 update_engine[1104]: I0209 19:41:05.034674 1104 update_check_scheduler.cc:74] Next update check in 9m47s Feb 9 19:41:05.036047 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 19:41:05.038427 systemd[1]: Started locksmithd.service. Feb 9 19:41:05.119153 locksmithd[1150]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 19:41:05.542762 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 19:41:05.543559 extend-filesystems[1127]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 9 19:41:05.543559 extend-filesystems[1127]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 9 19:41:05.543559 extend-filesystems[1127]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Feb 9 19:41:05.547760 extend-filesystems[1088]: Resized filesystem in /dev/vda9 Feb 9 19:41:05.544588 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 19:41:05.544729 systemd[1]: Finished extend-filesystems.service. Feb 9 19:41:05.550206 tar[1107]: ./tuning Feb 9 19:41:05.571440 sshd_keygen[1118]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 19:41:05.592963 tar[1107]: ./vrf Feb 9 19:41:05.596102 systemd[1]: Finished sshd-keygen.service. Feb 9 19:41:05.598159 systemd[1]: Starting issuegen.service... Feb 9 19:41:05.602873 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 19:41:05.603059 systemd[1]: Finished issuegen.service. Feb 9 19:41:05.605166 systemd[1]: Starting systemd-user-sessions.service... Feb 9 19:41:05.623462 systemd[1]: Finished systemd-user-sessions.service. Feb 9 19:41:05.625446 systemd[1]: Started getty@tty1.service. Feb 9 19:41:05.626971 systemd[1]: Started serial-getty@ttyS0.service. Feb 9 19:41:05.627777 systemd[1]: Reached target getty.target. Feb 9 19:41:05.634860 tar[1107]: ./sbr Feb 9 19:41:05.673114 tar[1107]: ./tap Feb 9 19:41:05.697134 bash[1138]: Updated "/home/core/.ssh/authorized_keys" Feb 9 19:41:05.696719 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 19:41:05.698682 env[1111]: time="2024-02-09T19:41:05.697917591Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 19:41:05.698682 env[1111]: time="2024-02-09T19:41:05.698007762Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 19:41:05.698682 env[1111]: time="2024-02-09T19:41:05.698050119Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 19:41:05.698682 env[1111]: time="2024-02-09T19:41:05.698092894Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 19:41:05.698682 env[1111]: time="2024-02-09T19:41:05.698125540Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 19:41:05.698682 env[1111]: time="2024-02-09T19:41:05.698141806Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 19:41:05.698682 env[1111]: time="2024-02-09T19:41:05.698158594Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 19:41:05.698682 env[1111]: time="2024-02-09T19:41:05.698176870Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 19:41:05.698682 env[1111]: time="2024-02-09T19:41:05.698202087Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 19:41:05.698682 env[1111]: time="2024-02-09T19:41:05.698213779Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 19:41:05.698682 env[1111]: time="2024-02-09T19:41:05.698230986Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 19:41:05.698682 env[1111]: time="2024-02-09T19:41:05.698242318Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 19:41:05.698682 env[1111]: time="2024-02-09T19:41:05.698380507Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 19:41:05.698682 env[1111]: time="2024-02-09T19:41:05.698478456Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 19:41:05.698996 env[1111]: time="2024-02-09T19:41:05.698827751Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 19:41:05.698996 env[1111]: time="2024-02-09T19:41:05.698881479Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 19:41:05.698996 env[1111]: time="2024-02-09T19:41:05.698893616Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 19:41:05.698996 env[1111]: time="2024-02-09T19:41:05.698940596Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 19:41:05.698996 env[1111]: time="2024-02-09T19:41:05.698951568Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 19:41:05.698996 env[1111]: time="2024-02-09T19:41:05.698962561Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 19:41:05.698996 env[1111]: time="2024-02-09T19:41:05.698972980Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 19:41:05.698996 env[1111]: time="2024-02-09T19:41:05.698983680Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 19:41:05.698996 env[1111]: time="2024-02-09T19:41:05.698995566Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 19:41:05.699159 env[1111]: time="2024-02-09T19:41:05.699006539Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 19:41:05.699159 env[1111]: time="2024-02-09T19:41:05.699016812Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 19:41:05.699159 env[1111]: time="2024-02-09T19:41:05.699029747Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 19:41:05.699224 env[1111]: time="2024-02-09T19:41:05.699188930Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 19:41:05.699224 env[1111]: time="2024-02-09T19:41:05.699202787Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 19:41:05.699224 env[1111]: time="2024-02-09T19:41:05.699213469Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 19:41:05.699285 env[1111]: time="2024-02-09T19:41:05.699224238Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 19:41:05.699285 env[1111]: time="2024-02-09T19:41:05.699238230Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 19:41:05.699285 env[1111]: time="2024-02-09T19:41:05.699248553Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 19:41:05.699285 env[1111]: time="2024-02-09T19:41:05.699264488Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 19:41:05.699364 env[1111]: time="2024-02-09T19:41:05.699296784Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 19:41:05.700644 env[1111]: time="2024-02-09T19:41:05.699463998Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 19:41:05.700644 env[1111]: time="2024-02-09T19:41:05.699530699Z" level=info msg="Connect containerd service" Feb 9 19:41:05.700644 env[1111]: time="2024-02-09T19:41:05.699563218Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 19:41:05.700644 env[1111]: time="2024-02-09T19:41:05.700109936Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:41:05.700644 env[1111]: time="2024-02-09T19:41:05.700225665Z" level=info msg="Start subscribing containerd event" Feb 9 19:41:05.700644 env[1111]: time="2024-02-09T19:41:05.700287151Z" level=info msg="Start recovering state" Feb 9 19:41:05.700644 env[1111]: time="2024-02-09T19:41:05.700336150Z" level=info msg="Start event monitor" Feb 9 19:41:05.700644 env[1111]: time="2024-02-09T19:41:05.700364631Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 19:41:05.700644 env[1111]: time="2024-02-09T19:41:05.700369563Z" level=info msg="Start snapshots syncer" Feb 9 19:41:05.700644 env[1111]: time="2024-02-09T19:41:05.700425972Z" level=info msg="Start cni network conf syncer for default" Feb 9 19:41:05.700644 env[1111]: time="2024-02-09T19:41:05.700452462Z" level=info msg="Start streaming server" Feb 9 19:41:05.700644 env[1111]: time="2024-02-09T19:41:05.700529466Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 19:41:05.700644 env[1111]: time="2024-02-09T19:41:05.700583844Z" level=info msg="containerd successfully booted in 0.978284s" Feb 9 19:41:05.700650 systemd[1]: Started containerd.service. Feb 9 19:41:05.730374 tar[1107]: ./dhcp Feb 9 19:41:05.849427 systemd[1]: Finished prepare-critools.service. Feb 9 19:41:05.851786 tar[1107]: ./static Feb 9 19:41:05.870365 tar[1109]: linux-amd64/LICENSE Feb 9 19:41:05.870640 tar[1109]: linux-amd64/README.md Feb 9 19:41:05.872294 tar[1107]: ./firewall Feb 9 19:41:05.874619 systemd[1]: Finished prepare-helm.service. Feb 9 19:41:05.908771 tar[1107]: ./macvlan Feb 9 19:41:05.940419 tar[1107]: ./dummy Feb 9 19:41:05.971432 tar[1107]: ./bridge Feb 9 19:41:06.002403 tar[1107]: ./ipvlan Feb 9 19:41:06.033226 tar[1107]: ./portmap Feb 9 19:41:06.060860 tar[1107]: ./host-local Feb 9 19:41:06.096595 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 19:41:06.097627 systemd[1]: Reached target multi-user.target. Feb 9 19:41:06.099344 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 19:41:06.105995 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 19:41:06.106118 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 19:41:06.107020 systemd[1]: Startup finished in 713ms (kernel) + 34.085s (initrd) + 6.247s (userspace) = 41.046s. Feb 9 19:41:13.292285 systemd[1]: Created slice system-sshd.slice. Feb 9 19:41:13.293353 systemd[1]: Started sshd@0-10.0.0.29:22-10.0.0.1:35128.service. Feb 9 19:41:13.335994 sshd[1177]: Accepted publickey for core from 10.0.0.1 port 35128 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:41:13.337656 sshd[1177]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:41:13.346353 systemd[1]: Created slice user-500.slice. Feb 9 19:41:13.347837 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 19:41:13.349658 systemd-logind[1103]: New session 1 of user core. Feb 9 19:41:13.355925 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 19:41:13.357765 systemd[1]: Starting user@500.service... Feb 9 19:41:13.360113 (systemd)[1180]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:41:13.428402 systemd[1180]: Queued start job for default target default.target. Feb 9 19:41:13.428934 systemd[1180]: Reached target paths.target. Feb 9 19:41:13.428954 systemd[1180]: Reached target sockets.target. Feb 9 19:41:13.428965 systemd[1180]: Reached target timers.target. Feb 9 19:41:13.428976 systemd[1180]: Reached target basic.target. Feb 9 19:41:13.429012 systemd[1180]: Reached target default.target. Feb 9 19:41:13.429034 systemd[1180]: Startup finished in 63ms. Feb 9 19:41:13.429159 systemd[1]: Started user@500.service. Feb 9 19:41:13.430295 systemd[1]: Started session-1.scope. Feb 9 19:41:13.483152 systemd[1]: Started sshd@1-10.0.0.29:22-10.0.0.1:35134.service. Feb 9 19:41:13.525451 sshd[1189]: Accepted publickey for core from 10.0.0.1 port 35134 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:41:13.526931 sshd[1189]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:41:13.530970 systemd-logind[1103]: New session 2 of user core. Feb 9 19:41:13.531888 systemd[1]: Started session-2.scope. Feb 9 19:41:13.587373 sshd[1189]: pam_unix(sshd:session): session closed for user core Feb 9 19:41:13.590245 systemd[1]: sshd@1-10.0.0.29:22-10.0.0.1:35134.service: Deactivated successfully. Feb 9 19:41:13.590804 systemd[1]: session-2.scope: Deactivated successfully. Feb 9 19:41:13.591305 systemd-logind[1103]: Session 2 logged out. Waiting for processes to exit. Feb 9 19:41:13.592446 systemd[1]: Started sshd@2-10.0.0.29:22-10.0.0.1:35138.service. Feb 9 19:41:13.593191 systemd-logind[1103]: Removed session 2. Feb 9 19:41:13.631597 sshd[1195]: Accepted publickey for core from 10.0.0.1 port 35138 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:41:13.632954 sshd[1195]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:41:13.636675 systemd-logind[1103]: New session 3 of user core. Feb 9 19:41:13.637499 systemd[1]: Started session-3.scope. Feb 9 19:41:13.687697 sshd[1195]: pam_unix(sshd:session): session closed for user core Feb 9 19:41:13.690650 systemd[1]: sshd@2-10.0.0.29:22-10.0.0.1:35138.service: Deactivated successfully. Feb 9 19:41:13.691181 systemd[1]: session-3.scope: Deactivated successfully. Feb 9 19:41:13.691668 systemd-logind[1103]: Session 3 logged out. Waiting for processes to exit. Feb 9 19:41:13.692753 systemd[1]: Started sshd@3-10.0.0.29:22-10.0.0.1:35150.service. Feb 9 19:41:13.693687 systemd-logind[1103]: Removed session 3. Feb 9 19:41:13.729047 sshd[1201]: Accepted publickey for core from 10.0.0.1 port 35150 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:41:13.730115 sshd[1201]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:41:13.734024 systemd-logind[1103]: New session 4 of user core. Feb 9 19:41:13.735222 systemd[1]: Started session-4.scope. Feb 9 19:41:13.789727 sshd[1201]: pam_unix(sshd:session): session closed for user core Feb 9 19:41:13.792493 systemd[1]: sshd@3-10.0.0.29:22-10.0.0.1:35150.service: Deactivated successfully. Feb 9 19:41:13.792984 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 19:41:13.793516 systemd-logind[1103]: Session 4 logged out. Waiting for processes to exit. Feb 9 19:41:13.795028 systemd[1]: Started sshd@4-10.0.0.29:22-10.0.0.1:35156.service. Feb 9 19:41:13.795711 systemd-logind[1103]: Removed session 4. Feb 9 19:41:13.838545 sshd[1208]: Accepted publickey for core from 10.0.0.1 port 35156 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:41:13.839849 sshd[1208]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:41:13.843578 systemd-logind[1103]: New session 5 of user core. Feb 9 19:41:13.844350 systemd[1]: Started session-5.scope. Feb 9 19:41:13.901838 sudo[1211]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 19:41:13.902031 sudo[1211]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:41:13.912906 dbus-daemon[1086]: \xd0\xedo\xe4\u007fU: received setenforce notice (enforcing=-1516406016) Feb 9 19:41:13.915553 sudo[1211]: pam_unix(sudo:session): session closed for user root Feb 9 19:41:13.917410 sshd[1208]: pam_unix(sshd:session): session closed for user core Feb 9 19:41:13.920328 systemd[1]: sshd@4-10.0.0.29:22-10.0.0.1:35156.service: Deactivated successfully. Feb 9 19:41:13.920927 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 19:41:13.921438 systemd-logind[1103]: Session 5 logged out. Waiting for processes to exit. Feb 9 19:41:13.922529 systemd[1]: Started sshd@5-10.0.0.29:22-10.0.0.1:35170.service. Feb 9 19:41:13.923187 systemd-logind[1103]: Removed session 5. Feb 9 19:41:13.962544 sshd[1215]: Accepted publickey for core from 10.0.0.1 port 35170 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:41:13.963863 sshd[1215]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:41:13.967251 systemd-logind[1103]: New session 6 of user core. Feb 9 19:41:13.968036 systemd[1]: Started session-6.scope. Feb 9 19:41:14.021028 sudo[1219]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 19:41:14.021214 sudo[1219]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:41:14.023533 sudo[1219]: pam_unix(sudo:session): session closed for user root Feb 9 19:41:14.027751 sudo[1218]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 19:41:14.027922 sudo[1218]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:41:14.036153 systemd[1]: Stopping audit-rules.service... Feb 9 19:41:14.036000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:41:14.037573 auditctl[1222]: No rules Feb 9 19:41:14.037824 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 19:41:14.037951 systemd[1]: Stopped audit-rules.service. Feb 9 19:41:14.038115 kernel: kauditd_printk_skb: 235 callbacks suppressed Feb 9 19:41:14.038212 kernel: audit: type=1305 audit(1707507674.036:157): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:41:14.036000 audit[1222]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd5ffb1620 a2=420 a3=0 items=0 ppid=1 pid=1222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:14.039169 systemd[1]: Starting audit-rules.service... Feb 9 19:41:14.042703 kernel: audit: type=1300 audit(1707507674.036:157): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd5ffb1620 a2=420 a3=0 items=0 ppid=1 pid=1222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:14.042759 kernel: audit: type=1327 audit(1707507674.036:157): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:41:14.036000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:41:14.043619 kernel: audit: type=1131 audit(1707507674.037:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:14.037000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:14.054760 augenrules[1239]: No rules Feb 9 19:41:14.055451 systemd[1]: Finished audit-rules.service. Feb 9 19:41:14.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:14.056321 sudo[1218]: pam_unix(sudo:session): session closed for user root Feb 9 19:41:14.055000 audit[1218]: USER_END pid=1218 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:41:14.057753 sshd[1215]: pam_unix(sshd:session): session closed for user core Feb 9 19:41:14.060454 kernel: audit: type=1130 audit(1707507674.055:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:14.060503 kernel: audit: type=1106 audit(1707507674.055:160): pid=1218 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:41:14.060527 kernel: audit: type=1104 audit(1707507674.055:161): pid=1218 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:41:14.055000 audit[1218]: CRED_DISP pid=1218 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:41:14.061090 systemd[1]: Started sshd@6-10.0.0.29:22-10.0.0.1:35180.service. Feb 9 19:41:14.061507 systemd[1]: sshd@5-10.0.0.29:22-10.0.0.1:35170.service: Deactivated successfully. Feb 9 19:41:14.061980 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 19:41:14.062715 systemd-logind[1103]: Session 6 logged out. Waiting for processes to exit. Feb 9 19:41:14.057000 audit[1215]: USER_END pid=1215 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:41:14.063691 systemd-logind[1103]: Removed session 6. Feb 9 19:41:14.065585 kernel: audit: type=1106 audit(1707507674.057:162): pid=1215 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:41:14.065647 kernel: audit: type=1104 audit(1707507674.057:163): pid=1215 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:41:14.057000 audit[1215]: CRED_DISP pid=1215 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:41:14.067992 kernel: audit: type=1130 audit(1707507674.060:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.29:22-10.0.0.1:35180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:14.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.29:22-10.0.0.1:35180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:14.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.29:22-10.0.0.1:35170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:14.098000 audit[1244]: USER_ACCT pid=1244 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:41:14.100082 sshd[1244]: Accepted publickey for core from 10.0.0.1 port 35180 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:41:14.099000 audit[1244]: CRED_ACQ pid=1244 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:41:14.099000 audit[1244]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee2ced010 a2=3 a3=0 items=0 ppid=1 pid=1244 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:14.099000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:41:14.101787 sshd[1244]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:41:14.106132 systemd-logind[1103]: New session 7 of user core. Feb 9 19:41:14.106947 systemd[1]: Started session-7.scope. Feb 9 19:41:14.108000 audit[1244]: USER_START pid=1244 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:41:14.109000 audit[1247]: CRED_ACQ pid=1247 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:41:14.158000 audit[1248]: USER_ACCT pid=1248 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:41:14.159545 sudo[1248]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 19:41:14.159000 audit[1248]: CRED_REFR pid=1248 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:41:14.159771 sudo[1248]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:41:14.160000 audit[1248]: USER_START pid=1248 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:41:15.350425 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 19:41:15.354952 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 19:41:15.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:15.355257 systemd[1]: Reached target network-online.target. Feb 9 19:41:15.356525 systemd[1]: Starting docker.service... Feb 9 19:41:15.387296 env[1266]: time="2024-02-09T19:41:15.387240832Z" level=info msg="Starting up" Feb 9 19:41:15.388606 env[1266]: time="2024-02-09T19:41:15.388560256Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 19:41:15.388606 env[1266]: time="2024-02-09T19:41:15.388580827Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 19:41:15.388685 env[1266]: time="2024-02-09T19:41:15.388629868Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 19:41:15.388685 env[1266]: time="2024-02-09T19:41:15.388642499Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 19:41:15.390118 env[1266]: time="2024-02-09T19:41:15.390086591Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 19:41:15.390118 env[1266]: time="2024-02-09T19:41:15.390104808Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 19:41:15.390118 env[1266]: time="2024-02-09T19:41:15.390115818Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 19:41:15.390240 env[1266]: time="2024-02-09T19:41:15.390124186Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 19:41:15.529830 env[1266]: time="2024-02-09T19:41:15.529769086Z" level=info msg="Loading containers: start." Feb 9 19:41:15.567000 audit[1300]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1300 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:15.567000 audit[1300]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff84382270 a2=0 a3=7fff8438225c items=0 ppid=1266 pid=1300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:15.567000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 19:41:15.568000 audit[1302]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1302 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:15.568000 audit[1302]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc907417a0 a2=0 a3=7ffc9074178c items=0 ppid=1266 pid=1302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:15.568000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 19:41:15.570000 audit[1304]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1304 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:15.570000 audit[1304]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffa5b54050 a2=0 a3=7fffa5b5403c items=0 ppid=1266 pid=1304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:15.570000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 19:41:15.571000 audit[1306]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1306 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:15.571000 audit[1306]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe641def30 a2=0 a3=7ffe641def1c items=0 ppid=1266 pid=1306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:15.571000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 19:41:15.573000 audit[1308]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1308 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:15.573000 audit[1308]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff8a60d560 a2=0 a3=7fff8a60d54c items=0 ppid=1266 pid=1308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:15.573000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 9 19:41:15.589000 audit[1313]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1313 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:15.589000 audit[1313]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffedf7cb5e0 a2=0 a3=7ffedf7cb5cc items=0 ppid=1266 pid=1313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:15.589000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 9 19:41:15.598000 audit[1315]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1315 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:15.598000 audit[1315]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff791ca260 a2=0 a3=7fff791ca24c items=0 ppid=1266 pid=1315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:15.598000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 9 19:41:15.600000 audit[1317]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1317 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:15.600000 audit[1317]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffe38ba9f10 a2=0 a3=7ffe38ba9efc items=0 ppid=1266 pid=1317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:15.600000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 9 19:41:15.601000 audit[1319]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1319 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:15.601000 audit[1319]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffcaf0763d0 a2=0 a3=7ffcaf0763bc items=0 ppid=1266 pid=1319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:15.601000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:41:15.610000 audit[1323]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1323 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:15.610000 audit[1323]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffefb7c9390 a2=0 a3=7ffefb7c937c items=0 ppid=1266 pid=1323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:15.610000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:41:15.611000 audit[1324]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1324 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:15.611000 audit[1324]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc43ec7240 a2=0 a3=7ffc43ec722c items=0 ppid=1266 pid=1324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:15.611000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:41:15.618638 kernel: Initializing XFRM netlink socket Feb 9 19:41:15.644563 env[1266]: time="2024-02-09T19:41:15.644517469Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 19:41:15.661000 audit[1332]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1332 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:15.661000 audit[1332]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffe28fe05c0 a2=0 a3=7ffe28fe05ac items=0 ppid=1266 pid=1332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:15.661000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 9 19:41:15.670000 audit[1335]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1335 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:15.670000 audit[1335]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffeffa372e0 a2=0 a3=7ffeffa372cc items=0 ppid=1266 pid=1335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:15.670000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 9 19:41:15.673000 audit[1338]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1338 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:15.673000 audit[1338]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff1cc76e80 a2=0 a3=7fff1cc76e6c items=0 ppid=1266 pid=1338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:15.673000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 9 19:41:15.674000 audit[1340]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1340 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:15.674000 audit[1340]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff142990f0 a2=0 a3=7fff142990dc items=0 ppid=1266 pid=1340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:15.674000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 9 19:41:15.676000 audit[1342]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1342 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:15.676000 audit[1342]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fffcf28a2e0 a2=0 a3=7fffcf28a2cc items=0 ppid=1266 pid=1342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:15.676000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 9 19:41:15.678000 audit[1344]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1344 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:15.678000 audit[1344]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd08d0e170 a2=0 a3=7ffd08d0e15c items=0 ppid=1266 pid=1344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:15.678000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 9 19:41:15.679000 audit[1346]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1346 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:15.679000 audit[1346]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd616bacb0 a2=0 a3=7ffd616bac9c items=0 ppid=1266 pid=1346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:15.679000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 9 19:41:15.686000 audit[1349]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1349 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:15.686000 audit[1349]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc49f78c20 a2=0 a3=7ffc49f78c0c items=0 ppid=1266 pid=1349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:15.686000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 9 19:41:15.688000 audit[1351]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1351 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:15.688000 audit[1351]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffdb2939700 a2=0 a3=7ffdb29396ec items=0 ppid=1266 pid=1351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:15.688000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 19:41:15.690000 audit[1353]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1353 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:15.690000 audit[1353]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffc392ca630 a2=0 a3=7ffc392ca61c items=0 ppid=1266 pid=1353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:15.690000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 19:41:15.691000 audit[1355]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1355 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:15.691000 audit[1355]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe0c92ee10 a2=0 a3=7ffe0c92edfc items=0 ppid=1266 pid=1355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:15.691000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 9 19:41:15.693569 systemd-networkd[1012]: docker0: Link UP Feb 9 19:41:15.862000 audit[1360]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1360 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:15.862000 audit[1360]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd3e301150 a2=0 a3=7ffd3e30113c items=0 ppid=1266 pid=1360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:15.862000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:41:15.863000 audit[1361]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1361 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:15.863000 audit[1361]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffb0b2d4a0 a2=0 a3=7fffb0b2d48c items=0 ppid=1266 pid=1361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:15.863000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:41:15.864811 env[1266]: time="2024-02-09T19:41:15.864767008Z" level=info msg="Loading containers: done." Feb 9 19:41:15.872972 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2472485527-merged.mount: Deactivated successfully. Feb 9 19:41:15.995860 env[1266]: time="2024-02-09T19:41:15.995801775Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 19:41:15.996052 env[1266]: time="2024-02-09T19:41:15.996037973Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 19:41:15.996157 env[1266]: time="2024-02-09T19:41:15.996143680Z" level=info msg="Daemon has completed initialization" Feb 9 19:41:16.354812 systemd[1]: Started docker.service. Feb 9 19:41:16.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:16.358141 env[1266]: time="2024-02-09T19:41:16.358091916Z" level=info msg="API listen on /run/docker.sock" Feb 9 19:41:16.376375 systemd[1]: Reloading. Feb 9 19:41:16.439659 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-02-09T19:41:16Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:41:16.439689 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-02-09T19:41:16Z" level=info msg="torcx already run" Feb 9 19:41:16.502132 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:41:16.502148 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:41:16.520562 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:41:16.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.572000 audit: BPF prog-id=31 op=LOAD Feb 9 19:41:16.572000 audit: BPF prog-id=20 op=UNLOAD Feb 9 19:41:16.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.572000 audit: BPF prog-id=32 op=LOAD Feb 9 19:41:16.572000 audit: BPF prog-id=21 op=UNLOAD Feb 9 19:41:16.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.572000 audit: BPF prog-id=33 op=LOAD Feb 9 19:41:16.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.573000 audit: BPF prog-id=34 op=LOAD Feb 9 19:41:16.573000 audit: BPF prog-id=22 op=UNLOAD Feb 9 19:41:16.573000 audit: BPF prog-id=23 op=UNLOAD Feb 9 19:41:16.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit: BPF prog-id=35 op=LOAD Feb 9 19:41:16.574000 audit: BPF prog-id=26 op=UNLOAD Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit: BPF prog-id=36 op=LOAD Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit: BPF prog-id=37 op=LOAD Feb 9 19:41:16.574000 audit: BPF prog-id=27 op=UNLOAD Feb 9 19:41:16.574000 audit: BPF prog-id=28 op=UNLOAD Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit: BPF prog-id=38 op=LOAD Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.574000 audit: BPF prog-id=39 op=LOAD Feb 9 19:41:16.574000 audit: BPF prog-id=18 op=UNLOAD Feb 9 19:41:16.575000 audit: BPF prog-id=19 op=UNLOAD Feb 9 19:41:16.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.575000 audit: BPF prog-id=40 op=LOAD Feb 9 19:41:16.575000 audit: BPF prog-id=25 op=UNLOAD Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit: BPF prog-id=41 op=LOAD Feb 9 19:41:16.577000 audit: BPF prog-id=15 op=UNLOAD Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit: BPF prog-id=42 op=LOAD Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit: BPF prog-id=43 op=LOAD Feb 9 19:41:16.577000 audit: BPF prog-id=16 op=UNLOAD Feb 9 19:41:16.577000 audit: BPF prog-id=17 op=UNLOAD Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.577000 audit: BPF prog-id=44 op=LOAD Feb 9 19:41:16.577000 audit: BPF prog-id=29 op=UNLOAD Feb 9 19:41:16.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:16.579000 audit: BPF prog-id=45 op=LOAD Feb 9 19:41:16.579000 audit: BPF prog-id=24 op=UNLOAD Feb 9 19:41:16.587295 systemd[1]: Started kubelet.service. Feb 9 19:41:16.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:16.633826 kubelet[1450]: E0209 19:41:16.633557 1450 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 19:41:16.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:41:16.635893 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:41:16.636013 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:41:17.365540 env[1111]: time="2024-02-09T19:41:17.365475406Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\"" Feb 9 19:41:19.285750 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2844883335.mount: Deactivated successfully. Feb 9 19:41:21.676083 env[1111]: time="2024-02-09T19:41:21.676007660Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:21.717455 env[1111]: time="2024-02-09T19:41:21.717379012Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7968fc5c824ed95404f421a90882835f250220c0fd799b4fceef340dd5585ed5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:21.730994 env[1111]: time="2024-02-09T19:41:21.730927926Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:21.774133 env[1111]: time="2024-02-09T19:41:21.774066000Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:cfcebda74d6e665b68931d3589ee69fde81cd503ff3169888e4502af65579d98,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:21.775135 env[1111]: time="2024-02-09T19:41:21.775052309Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\" returns image reference \"sha256:7968fc5c824ed95404f421a90882835f250220c0fd799b4fceef340dd5585ed5\"" Feb 9 19:41:21.786879 env[1111]: time="2024-02-09T19:41:21.786839192Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\"" Feb 9 19:41:24.713567 env[1111]: time="2024-02-09T19:41:24.713482004Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:24.715502 env[1111]: time="2024-02-09T19:41:24.715448262Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c8134be729ba23c6e0c3e5dd52c393fc8d3cfc688bcec33540f64bb0137b67e0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:24.717300 env[1111]: time="2024-02-09T19:41:24.717270390Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:24.718891 env[1111]: time="2024-02-09T19:41:24.718864906Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fa168ebca1f6dbfe86ef0a690e007531c1f53569274fc7dc2774fe228b6ce8c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:24.719711 env[1111]: time="2024-02-09T19:41:24.719652715Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\" returns image reference \"sha256:c8134be729ba23c6e0c3e5dd52c393fc8d3cfc688bcec33540f64bb0137b67e0\"" Feb 9 19:41:24.730504 env[1111]: time="2024-02-09T19:41:24.730464782Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\"" Feb 9 19:41:26.795414 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 9 19:41:26.795626 systemd[1]: Stopped kubelet.service. Feb 9 19:41:26.797272 systemd[1]: Started kubelet.service. Feb 9 19:41:26.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:26.800321 kernel: kauditd_printk_skb: 259 callbacks suppressed Feb 9 19:41:26.800379 kernel: audit: type=1130 audit(1707507686.794:374): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:26.800400 kernel: audit: type=1131 audit(1707507686.794:375): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:26.794000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:26.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:26.804529 kernel: audit: type=1130 audit(1707507686.795:376): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:26.881366 kubelet[1486]: E0209 19:41:26.881299 1486 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 19:41:26.884638 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:41:26.884772 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:41:26.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:41:26.887616 kernel: audit: type=1131 audit(1707507686.883:377): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:41:27.494914 env[1111]: time="2024-02-09T19:41:27.494832022Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:27.521252 env[1111]: time="2024-02-09T19:41:27.521189998Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5eed9876e7181341b7015e3486dfd234f8e0d0d7d3d19b1bb971d720cd320975,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:27.523938 env[1111]: time="2024-02-09T19:41:27.523908523Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:27.537300 env[1111]: time="2024-02-09T19:41:27.537237083Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09294de61e63987f181077cbc2f5c82463878af9cd8ecc6110c54150c9ae3143,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:27.537937 env[1111]: time="2024-02-09T19:41:27.537902325Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\" returns image reference \"sha256:5eed9876e7181341b7015e3486dfd234f8e0d0d7d3d19b1bb971d720cd320975\"" Feb 9 19:41:27.554191 env[1111]: time="2024-02-09T19:41:27.554138407Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\"" Feb 9 19:41:28.622685 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount448054833.mount: Deactivated successfully. Feb 9 19:41:29.662063 env[1111]: time="2024-02-09T19:41:29.661950620Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:29.663977 env[1111]: time="2024-02-09T19:41:29.663923678Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:29.665235 env[1111]: time="2024-02-09T19:41:29.665202850Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:29.666654 env[1111]: time="2024-02-09T19:41:29.666556349Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:29.667195 env[1111]: time="2024-02-09T19:41:29.667145748Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\" returns image reference \"sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae\"" Feb 9 19:41:29.680213 env[1111]: time="2024-02-09T19:41:29.680134144Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 9 19:41:30.182180 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1040906718.mount: Deactivated successfully. Feb 9 19:41:30.187193 env[1111]: time="2024-02-09T19:41:30.187131504Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:30.188681 env[1111]: time="2024-02-09T19:41:30.188638014Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:30.190011 env[1111]: time="2024-02-09T19:41:30.189972099Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:30.191333 env[1111]: time="2024-02-09T19:41:30.191302992Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:30.191751 env[1111]: time="2024-02-09T19:41:30.191728065Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 9 19:41:30.202749 env[1111]: time="2024-02-09T19:41:30.202717153Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Feb 9 19:41:31.058756 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount746912987.mount: Deactivated successfully. Feb 9 19:41:37.045380 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Feb 9 19:41:37.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:37.045631 systemd[1]: Stopped kubelet.service. Feb 9 19:41:37.047438 systemd[1]: Started kubelet.service. Feb 9 19:41:37.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:37.050049 kernel: audit: type=1130 audit(1707507697.044:378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:37.050096 kernel: audit: type=1131 audit(1707507697.044:379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:37.050121 kernel: audit: type=1130 audit(1707507697.045:380): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:37.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:37.099784 kubelet[1514]: E0209 19:41:37.099718 1514 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 19:41:37.101898 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:41:37.102028 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:41:37.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:41:37.124628 kernel: audit: type=1131 audit(1707507697.100:381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:41:38.220582 env[1111]: time="2024-02-09T19:41:38.220514564Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:38.247530 env[1111]: time="2024-02-09T19:41:38.247451574Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:38.256527 env[1111]: time="2024-02-09T19:41:38.256482075Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:38.275397 env[1111]: time="2024-02-09T19:41:38.275365209Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:38.276024 env[1111]: time="2024-02-09T19:41:38.276001063Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681\"" Feb 9 19:41:38.307228 env[1111]: time="2024-02-09T19:41:38.307184483Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 9 19:41:38.894290 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount817694478.mount: Deactivated successfully. Feb 9 19:41:39.665522 env[1111]: time="2024-02-09T19:41:39.665435744Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:39.667272 env[1111]: time="2024-02-09T19:41:39.667211655Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:39.668506 env[1111]: time="2024-02-09T19:41:39.668468396Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:39.669968 env[1111]: time="2024-02-09T19:41:39.669933717Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:39.670399 env[1111]: time="2024-02-09T19:41:39.670365065Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Feb 9 19:41:41.848738 systemd[1]: Stopped kubelet.service. Feb 9 19:41:41.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:41.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:41.853729 kernel: audit: type=1130 audit(1707507701.848:382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:41.853791 kernel: audit: type=1131 audit(1707507701.848:383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:41.860555 systemd[1]: Reloading. Feb 9 19:41:41.921209 /usr/lib/systemd/system-generators/torcx-generator[1626]: time="2024-02-09T19:41:41Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:41:41.921664 /usr/lib/systemd/system-generators/torcx-generator[1626]: time="2024-02-09T19:41:41Z" level=info msg="torcx already run" Feb 9 19:41:42.223242 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:41:42.223271 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:41:42.243994 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:41:42.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.309945 kernel: audit: type=1400 audit(1707507702.304:384): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.310008 kernel: audit: type=1400 audit(1707507702.304:385): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.310031 kernel: audit: type=1400 audit(1707507702.305:386): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.314736 kernel: audit: type=1400 audit(1707507702.305:387): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.314783 kernel: audit: type=1400 audit(1707507702.305:388): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.318745 kernel: audit: type=1400 audit(1707507702.305:389): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.318792 kernel: audit: type=1400 audit(1707507702.305:390): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.322944 kernel: audit: type=1400 audit(1707507702.305:391): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.323004 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:41:42.323034 kernel: audit: type=1400 audit(1707507702.305:392): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.309000 audit: BPF prog-id=46 op=LOAD Feb 9 19:41:42.309000 audit: BPF prog-id=31 op=UNLOAD Feb 9 19:41:42.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.311000 audit: BPF prog-id=47 op=LOAD Feb 9 19:41:42.311000 audit: BPF prog-id=32 op=UNLOAD Feb 9 19:41:42.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.314000 audit: BPF prog-id=48 op=LOAD Feb 9 19:41:42.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.316000 audit: BPF prog-id=49 op=LOAD Feb 9 19:41:42.316000 audit: BPF prog-id=33 op=UNLOAD Feb 9 19:41:42.316000 audit: BPF prog-id=34 op=UNLOAD Feb 9 19:41:42.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.318000 audit: BPF prog-id=50 op=LOAD Feb 9 19:41:42.318000 audit: BPF prog-id=35 op=UNLOAD Feb 9 19:41:42.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.320000 audit: BPF prog-id=51 op=LOAD Feb 9 19:41:42.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.325000 audit: BPF prog-id=52 op=LOAD Feb 9 19:41:42.325000 audit: BPF prog-id=36 op=UNLOAD Feb 9 19:41:42.325000 audit: BPF prog-id=37 op=UNLOAD Feb 9 19:41:42.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.325000 audit: BPF prog-id=53 op=LOAD Feb 9 19:41:42.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.325000 audit: BPF prog-id=54 op=LOAD Feb 9 19:41:42.325000 audit: BPF prog-id=38 op=UNLOAD Feb 9 19:41:42.325000 audit: BPF prog-id=39 op=UNLOAD Feb 9 19:41:42.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.326000 audit: BPF prog-id=55 op=LOAD Feb 9 19:41:42.326000 audit: BPF prog-id=40 op=UNLOAD Feb 9 19:41:42.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.328000 audit: BPF prog-id=56 op=LOAD Feb 9 19:41:42.328000 audit: BPF prog-id=41 op=UNLOAD Feb 9 19:41:42.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.328000 audit: BPF prog-id=57 op=LOAD Feb 9 19:41:42.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.328000 audit: BPF prog-id=58 op=LOAD Feb 9 19:41:42.328000 audit: BPF prog-id=42 op=UNLOAD Feb 9 19:41:42.328000 audit: BPF prog-id=43 op=UNLOAD Feb 9 19:41:42.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.329000 audit: BPF prog-id=59 op=LOAD Feb 9 19:41:42.329000 audit: BPF prog-id=44 op=UNLOAD Feb 9 19:41:42.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.330000 audit: BPF prog-id=60 op=LOAD Feb 9 19:41:42.330000 audit: BPF prog-id=45 op=UNLOAD Feb 9 19:41:42.344574 systemd[1]: Started kubelet.service. Feb 9 19:41:42.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:42.386730 kubelet[1667]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:41:42.386730 kubelet[1667]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 19:41:42.386730 kubelet[1667]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:41:42.387161 kubelet[1667]: I0209 19:41:42.386759 1667 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 19:41:42.698831 kubelet[1667]: I0209 19:41:42.698773 1667 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 9 19:41:42.698831 kubelet[1667]: I0209 19:41:42.698809 1667 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 19:41:42.699113 kubelet[1667]: I0209 19:41:42.699033 1667 server.go:837] "Client rotation is on, will bootstrap in background" Feb 9 19:41:42.702356 kubelet[1667]: I0209 19:41:42.702323 1667 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:41:42.703156 kubelet[1667]: E0209 19:41:42.703134 1667 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.29:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.29:6443: connect: connection refused Feb 9 19:41:42.706323 kubelet[1667]: I0209 19:41:42.706298 1667 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 19:41:42.706563 kubelet[1667]: I0209 19:41:42.706541 1667 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 19:41:42.706660 kubelet[1667]: I0209 19:41:42.706641 1667 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 19:41:42.706660 kubelet[1667]: I0209 19:41:42.706662 1667 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 19:41:42.706793 kubelet[1667]: I0209 19:41:42.706671 1667 container_manager_linux.go:302] "Creating device plugin manager" Feb 9 19:41:42.706793 kubelet[1667]: I0209 19:41:42.706761 1667 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:41:42.711755 kubelet[1667]: I0209 19:41:42.711722 1667 kubelet.go:405] "Attempting to sync node with API server" Feb 9 19:41:42.711755 kubelet[1667]: I0209 19:41:42.711747 1667 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 19:41:42.711928 kubelet[1667]: I0209 19:41:42.711779 1667 kubelet.go:309] "Adding apiserver pod source" Feb 9 19:41:42.711928 kubelet[1667]: I0209 19:41:42.711798 1667 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 19:41:42.712568 kubelet[1667]: W0209 19:41:42.712518 1667 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.0.0.29:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.29:6443: connect: connection refused Feb 9 19:41:42.712824 kubelet[1667]: I0209 19:41:42.712772 1667 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 19:41:42.713130 kubelet[1667]: E0209 19:41:42.712828 1667 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.29:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.29:6443: connect: connection refused Feb 9 19:41:42.713130 kubelet[1667]: W0209 19:41:42.712669 1667 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.0.0.29:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.29:6443: connect: connection refused Feb 9 19:41:42.713226 kubelet[1667]: E0209 19:41:42.713134 1667 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.29:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.29:6443: connect: connection refused Feb 9 19:41:42.713274 kubelet[1667]: W0209 19:41:42.713266 1667 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 19:41:42.714308 kubelet[1667]: I0209 19:41:42.714284 1667 server.go:1168] "Started kubelet" Feb 9 19:41:42.716055 kubelet[1667]: I0209 19:41:42.716029 1667 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 19:41:42.716269 kubelet[1667]: I0209 19:41:42.716248 1667 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 19:41:42.717414 kubelet[1667]: E0209 19:41:42.716504 1667 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.17b249357786a5a9", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 41, 42, 714246569, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 41, 42, 714246569, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.0.0.29:6443/api/v1/namespaces/default/events": dial tcp 10.0.0.29:6443: connect: connection refused'(may retry after sleeping) Feb 9 19:41:42.717000 audit[1667]: AVC avc: denied { mac_admin } for pid=1667 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.717000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:41:42.717000 audit[1667]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b703f0 a1=c0004da810 a2=c000b703c0 a3=25 items=0 ppid=1 pid=1667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:42.717000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:41:42.717000 audit[1667]: AVC avc: denied { mac_admin } for pid=1667 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.717000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:41:42.717000 audit[1667]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b5c440 a1=c0004da828 a2=c000b704b0 a3=25 items=0 ppid=1 pid=1667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:42.717000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:41:42.718580 kubelet[1667]: I0209 19:41:42.718205 1667 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 19:41:42.718580 kubelet[1667]: I0209 19:41:42.718239 1667 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 19:41:42.718580 kubelet[1667]: I0209 19:41:42.718314 1667 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 19:41:42.718677 kubelet[1667]: I0209 19:41:42.718659 1667 server.go:461] "Adding debug handlers to kubelet server" Feb 9 19:41:42.719876 kubelet[1667]: I0209 19:41:42.719848 1667 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 9 19:41:42.719973 kubelet[1667]: I0209 19:41:42.719948 1667 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 9 19:41:42.720247 kubelet[1667]: E0209 19:41:42.720215 1667 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.29:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.29:6443: connect: connection refused" interval="200ms" Feb 9 19:41:42.720354 kubelet[1667]: W0209 19:41:42.720314 1667 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.0.0.29:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.29:6443: connect: connection refused Feb 9 19:41:42.720354 kubelet[1667]: E0209 19:41:42.720353 1667 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.29:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.29:6443: connect: connection refused Feb 9 19:41:42.722810 kubelet[1667]: E0209 19:41:42.722784 1667 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 19:41:42.722892 kubelet[1667]: E0209 19:41:42.722823 1667 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 19:41:42.723000 audit[1680]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1680 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:42.723000 audit[1680]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffeb98c1be0 a2=0 a3=7ffeb98c1bcc items=0 ppid=1667 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:42.723000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:41:42.724000 audit[1681]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1681 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:42.724000 audit[1681]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff671dd860 a2=0 a3=7fff671dd84c items=0 ppid=1667 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:42.724000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:41:42.726000 audit[1683]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1683 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:42.726000 audit[1683]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd0fe3cad0 a2=0 a3=7ffd0fe3cabc items=0 ppid=1667 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:42.726000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:41:42.728000 audit[1685]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1685 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:42.728000 audit[1685]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc73b51060 a2=0 a3=7ffc73b5104c items=0 ppid=1667 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:42.728000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:41:42.733000 audit[1688]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1688 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:42.733000 audit[1688]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffca27af150 a2=0 a3=7ffca27af13c items=0 ppid=1667 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:42.733000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 19:41:42.734831 kubelet[1667]: I0209 19:41:42.734763 1667 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 19:41:42.734000 audit[1689]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1689 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:41:42.734000 audit[1689]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc80bae2a0 a2=0 a3=7ffc80bae28c items=0 ppid=1667 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:42.734000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:41:42.735868 kubelet[1667]: I0209 19:41:42.735568 1667 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 19:41:42.735868 kubelet[1667]: I0209 19:41:42.735595 1667 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 9 19:41:42.735868 kubelet[1667]: I0209 19:41:42.735640 1667 kubelet.go:2257] "Starting kubelet main sync loop" Feb 9 19:41:42.735868 kubelet[1667]: E0209 19:41:42.735716 1667 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 19:41:42.736000 audit[1691]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1691 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:42.736000 audit[1691]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff5b2d03a0 a2=0 a3=7fff5b2d038c items=0 ppid=1667 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:42.736000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:41:42.737766 kubelet[1667]: W0209 19:41:42.737732 1667 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.0.0.29:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.29:6443: connect: connection refused Feb 9 19:41:42.737874 kubelet[1667]: E0209 19:41:42.737859 1667 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.29:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.29:6443: connect: connection refused Feb 9 19:41:42.738000 audit[1692]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1692 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:42.738000 audit[1692]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd47278540 a2=0 a3=7ffd4727852c items=0 ppid=1667 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:42.738000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:41:42.738000 audit[1694]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1694 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:41:42.738000 audit[1694]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd50409500 a2=0 a3=7ffd504094ec items=0 ppid=1667 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:42.738000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:41:42.740000 audit[1696]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1696 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:41:42.740000 audit[1696]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe7d208bb0 a2=0 a3=7ffe7d208b9c items=0 ppid=1667 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:42.740000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:41:42.740000 audit[1695]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=1695 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:42.740000 audit[1695]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc4f1f9bb0 a2=0 a3=7ffc4f1f9b9c items=0 ppid=1667 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:42.740000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:41:42.740000 audit[1697]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1697 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:41:42.740000 audit[1697]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff182f9880 a2=0 a3=7fff182f986c items=0 ppid=1667 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:42.740000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:41:42.745554 kubelet[1667]: I0209 19:41:42.745529 1667 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 19:41:42.745554 kubelet[1667]: I0209 19:41:42.745553 1667 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 19:41:42.745724 kubelet[1667]: I0209 19:41:42.745570 1667 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:41:42.768068 kubelet[1667]: I0209 19:41:42.768008 1667 policy_none.go:49] "None policy: Start" Feb 9 19:41:42.768879 kubelet[1667]: I0209 19:41:42.768847 1667 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 19:41:42.768879 kubelet[1667]: I0209 19:41:42.768870 1667 state_mem.go:35] "Initializing new in-memory state store" Feb 9 19:41:42.774533 systemd[1]: Created slice kubepods.slice. Feb 9 19:41:42.777932 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 19:41:42.788619 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 19:41:42.789752 kubelet[1667]: I0209 19:41:42.789714 1667 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 19:41:42.789000 audit[1667]: AVC avc: denied { mac_admin } for pid=1667 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.789000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:41:42.789000 audit[1667]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b710b0 a1=c00110a048 a2=c000b71080 a3=25 items=0 ppid=1 pid=1667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:42.789000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:41:42.790093 kubelet[1667]: I0209 19:41:42.789819 1667 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 19:41:42.790093 kubelet[1667]: I0209 19:41:42.790031 1667 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 19:41:42.790610 kubelet[1667]: E0209 19:41:42.790577 1667 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Feb 9 19:41:42.821452 kubelet[1667]: I0209 19:41:42.821419 1667 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 9 19:41:42.821898 kubelet[1667]: E0209 19:41:42.821865 1667 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.29:6443/api/v1/nodes\": dial tcp 10.0.0.29:6443: connect: connection refused" node="localhost" Feb 9 19:41:42.836130 kubelet[1667]: I0209 19:41:42.836076 1667 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:41:42.837541 kubelet[1667]: I0209 19:41:42.837503 1667 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:41:42.838415 kubelet[1667]: I0209 19:41:42.838379 1667 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:41:42.843832 systemd[1]: Created slice kubepods-burstable-podc9a584a4788dcad6b6b9b68e752b907f.slice. Feb 9 19:41:42.852950 systemd[1]: Created slice kubepods-burstable-pod7709ea05d7cdf82b0d7e594b61a10331.slice. Feb 9 19:41:42.856198 systemd[1]: Created slice kubepods-burstable-pod2b0e94b38682f4e439413801d3cc54db.slice. Feb 9 19:41:42.920949 kubelet[1667]: E0209 19:41:42.920906 1667 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.29:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.29:6443: connect: connection refused" interval="400ms" Feb 9 19:41:43.021295 kubelet[1667]: I0209 19:41:43.021154 1667 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 19:41:43.021295 kubelet[1667]: I0209 19:41:43.021200 1667 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2b0e94b38682f4e439413801d3cc54db-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2b0e94b38682f4e439413801d3cc54db\") " pod="kube-system/kube-scheduler-localhost" Feb 9 19:41:43.021295 kubelet[1667]: I0209 19:41:43.021223 1667 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 19:41:43.021295 kubelet[1667]: I0209 19:41:43.021271 1667 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/c9a584a4788dcad6b6b9b68e752b907f-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"c9a584a4788dcad6b6b9b68e752b907f\") " pod="kube-system/kube-apiserver-localhost" Feb 9 19:41:43.021558 kubelet[1667]: I0209 19:41:43.021372 1667 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/c9a584a4788dcad6b6b9b68e752b907f-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"c9a584a4788dcad6b6b9b68e752b907f\") " pod="kube-system/kube-apiserver-localhost" Feb 9 19:41:43.021678 kubelet[1667]: I0209 19:41:43.021636 1667 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 19:41:43.021714 kubelet[1667]: I0209 19:41:43.021696 1667 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 19:41:43.021747 kubelet[1667]: I0209 19:41:43.021722 1667 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 19:41:43.021888 kubelet[1667]: I0209 19:41:43.021861 1667 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/c9a584a4788dcad6b6b9b68e752b907f-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"c9a584a4788dcad6b6b9b68e752b907f\") " pod="kube-system/kube-apiserver-localhost" Feb 9 19:41:43.023298 kubelet[1667]: I0209 19:41:43.023256 1667 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 9 19:41:43.023672 kubelet[1667]: E0209 19:41:43.023644 1667 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.29:6443/api/v1/nodes\": dial tcp 10.0.0.29:6443: connect: connection refused" node="localhost" Feb 9 19:41:43.152346 kubelet[1667]: E0209 19:41:43.152292 1667 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:41:43.153126 env[1111]: time="2024-02-09T19:41:43.153066321Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:c9a584a4788dcad6b6b9b68e752b907f,Namespace:kube-system,Attempt:0,}" Feb 9 19:41:43.155212 kubelet[1667]: E0209 19:41:43.155183 1667 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:41:43.155641 env[1111]: time="2024-02-09T19:41:43.155587672Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:7709ea05d7cdf82b0d7e594b61a10331,Namespace:kube-system,Attempt:0,}" Feb 9 19:41:43.157799 kubelet[1667]: E0209 19:41:43.157778 1667 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:41:43.158093 env[1111]: time="2024-02-09T19:41:43.158063004Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2b0e94b38682f4e439413801d3cc54db,Namespace:kube-system,Attempt:0,}" Feb 9 19:41:43.322121 kubelet[1667]: E0209 19:41:43.322093 1667 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.29:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.29:6443: connect: connection refused" interval="800ms" Feb 9 19:41:43.425292 kubelet[1667]: I0209 19:41:43.425268 1667 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 9 19:41:43.425561 kubelet[1667]: E0209 19:41:43.425526 1667 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.29:6443/api/v1/nodes\": dial tcp 10.0.0.29:6443: connect: connection refused" node="localhost" Feb 9 19:41:43.591481 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount892802836.mount: Deactivated successfully. Feb 9 19:41:43.596650 env[1111]: time="2024-02-09T19:41:43.596590154Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:43.598042 env[1111]: time="2024-02-09T19:41:43.598016211Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:43.598785 env[1111]: time="2024-02-09T19:41:43.598759769Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:43.599631 env[1111]: time="2024-02-09T19:41:43.599594535Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:43.601701 env[1111]: time="2024-02-09T19:41:43.601656081Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:43.602923 env[1111]: time="2024-02-09T19:41:43.602890756Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:43.604254 env[1111]: time="2024-02-09T19:41:43.604222911Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:43.606215 env[1111]: time="2024-02-09T19:41:43.606189131Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:43.608019 env[1111]: time="2024-02-09T19:41:43.607994627Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:43.608740 env[1111]: time="2024-02-09T19:41:43.608708808Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:43.610156 env[1111]: time="2024-02-09T19:41:43.610123064Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:43.611737 env[1111]: time="2024-02-09T19:41:43.611712169Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:43.637517 env[1111]: time="2024-02-09T19:41:43.637283498Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:41:43.637517 env[1111]: time="2024-02-09T19:41:43.637336530Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:41:43.637517 env[1111]: time="2024-02-09T19:41:43.637350769Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:41:43.637740 env[1111]: time="2024-02-09T19:41:43.637576518Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a2192335b85851deeefd1175b9723031573dc27fc7ca69ee651332d92814d45a pid=1706 runtime=io.containerd.runc.v2 Feb 9 19:41:43.637740 env[1111]: time="2024-02-09T19:41:43.637647907Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:41:43.637740 env[1111]: time="2024-02-09T19:41:43.637701482Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:41:43.637740 env[1111]: time="2024-02-09T19:41:43.637728344Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:41:43.641274 env[1111]: time="2024-02-09T19:41:43.641192722Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/683e73e6d3c06c9bf21198203545adbea48b55bbffb20a036a8b4e61dcad9fb2 pid=1723 runtime=io.containerd.runc.v2 Feb 9 19:41:43.645450 env[1111]: time="2024-02-09T19:41:43.644861148Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:41:43.645450 env[1111]: time="2024-02-09T19:41:43.644893380Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:41:43.645450 env[1111]: time="2024-02-09T19:41:43.644902829Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:41:43.645450 env[1111]: time="2024-02-09T19:41:43.645013134Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a3e98138eab5df56ddbc385bf1223b5fea53832f3f68bec61e571dbd6f432c78 pid=1743 runtime=io.containerd.runc.v2 Feb 9 19:41:43.652727 systemd[1]: Started cri-containerd-a2192335b85851deeefd1175b9723031573dc27fc7ca69ee651332d92814d45a.scope. Feb 9 19:41:43.679641 systemd[1]: Started cri-containerd-683e73e6d3c06c9bf21198203545adbea48b55bbffb20a036a8b4e61dcad9fb2.scope. Feb 9 19:41:43.685668 systemd[1]: Started cri-containerd-a3e98138eab5df56ddbc385bf1223b5fea53832f3f68bec61e571dbd6f432c78.scope. Feb 9 19:41:43.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.723000 audit: BPF prog-id=61 op=LOAD Feb 9 19:41:43.724000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.724000 audit[1733]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1706 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:43.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132313932333335623835383531646565656664313137356239373233 Feb 9 19:41:43.724000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.724000 audit[1733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1706 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:43.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132313932333335623835383531646565656664313137356239373233 Feb 9 19:41:43.724000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.724000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.724000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.724000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.724000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.724000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.724000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.724000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.724000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.724000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.724000 audit: BPF prog-id=62 op=LOAD Feb 9 19:41:43.724000 audit[1733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003dca30 items=0 ppid=1706 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:43.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132313932333335623835383531646565656664313137356239373233 Feb 9 19:41:43.724000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.724000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.724000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.724000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.724000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.724000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.724000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.724000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.724000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.724000 audit: BPF prog-id=63 op=LOAD Feb 9 19:41:43.724000 audit[1733]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003dca78 items=0 ppid=1706 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:43.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132313932333335623835383531646565656664313137356239373233 Feb 9 19:41:43.725000 audit: BPF prog-id=63 op=UNLOAD Feb 9 19:41:43.725000 audit: BPF prog-id=62 op=UNLOAD Feb 9 19:41:43.725000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.725000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.725000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.725000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.725000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.725000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.725000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.725000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.725000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.725000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.725000 audit: BPF prog-id=64 op=LOAD Feb 9 19:41:43.725000 audit[1733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003dce88 items=0 ppid=1706 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:43.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132313932333335623835383531646565656664313137356239373233 Feb 9 19:41:43.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.727000 audit: BPF prog-id=65 op=LOAD Feb 9 19:41:43.727000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.727000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1743 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:43.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133653938313338656162356466353664646263333835626631323233 Feb 9 19:41:43.727000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.727000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1743 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:43.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133653938313338656162356466353664646263333835626631323233 Feb 9 19:41:43.728000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.728000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.728000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.728000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.728000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.728000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.728000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.728000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.728000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.728000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.728000 audit: BPF prog-id=66 op=LOAD Feb 9 19:41:43.728000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0002927e0 items=0 ppid=1743 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:43.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133653938313338656162356466353664646263333835626631323233 Feb 9 19:41:43.729000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.729000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.729000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.729000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.729000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.729000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.729000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.729000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.729000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.729000 audit: BPF prog-id=67 op=LOAD Feb 9 19:41:43.729000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000292828 items=0 ppid=1743 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:43.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133653938313338656162356466353664646263333835626631323233 Feb 9 19:41:43.730000 audit: BPF prog-id=67 op=UNLOAD Feb 9 19:41:43.730000 audit: BPF prog-id=66 op=UNLOAD Feb 9 19:41:43.730000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.730000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.730000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.730000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.730000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.730000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.730000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.730000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.730000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.730000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.730000 audit: BPF prog-id=68 op=LOAD Feb 9 19:41:43.730000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000292c38 items=0 ppid=1743 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:43.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133653938313338656162356466353664646263333835626631323233 Feb 9 19:41:43.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.733000 audit: BPF prog-id=69 op=LOAD Feb 9 19:41:43.733000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.733000 audit[1748]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1723 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:43.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638336537336536643363303663396266323131393832303335343561 Feb 9 19:41:43.734000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.734000 audit[1748]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=1723 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:43.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638336537336536643363303663396266323131393832303335343561 Feb 9 19:41:43.734000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.734000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.734000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.734000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.734000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.734000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.734000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.734000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.734000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.734000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.734000 audit: BPF prog-id=70 op=LOAD Feb 9 19:41:43.734000 audit[1748]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003d6660 items=0 ppid=1723 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:43.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638336537336536643363303663396266323131393832303335343561 Feb 9 19:41:43.736000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.736000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.736000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.736000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.736000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.736000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.736000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.736000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.736000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.736000 audit: BPF prog-id=71 op=LOAD Feb 9 19:41:43.736000 audit[1748]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003d66a8 items=0 ppid=1723 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:43.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638336537336536643363303663396266323131393832303335343561 Feb 9 19:41:43.736000 audit: BPF prog-id=71 op=UNLOAD Feb 9 19:41:43.737000 audit: BPF prog-id=70 op=UNLOAD Feb 9 19:41:43.737000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.737000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.737000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.737000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.737000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.737000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.737000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.737000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.737000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.737000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:43.737000 audit: BPF prog-id=72 op=LOAD Feb 9 19:41:43.737000 audit[1748]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003d6ab8 items=0 ppid=1723 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:43.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638336537336536643363303663396266323131393832303335343561 Feb 9 19:41:43.765542 env[1111]: time="2024-02-09T19:41:43.765500423Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:7709ea05d7cdf82b0d7e594b61a10331,Namespace:kube-system,Attempt:0,} returns sandbox id \"a3e98138eab5df56ddbc385bf1223b5fea53832f3f68bec61e571dbd6f432c78\"" Feb 9 19:41:43.766726 kubelet[1667]: E0209 19:41:43.766706 1667 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:41:43.768966 env[1111]: time="2024-02-09T19:41:43.768937208Z" level=info msg="CreateContainer within sandbox \"a3e98138eab5df56ddbc385bf1223b5fea53832f3f68bec61e571dbd6f432c78\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 9 19:41:43.773014 env[1111]: time="2024-02-09T19:41:43.772982136Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:c9a584a4788dcad6b6b9b68e752b907f,Namespace:kube-system,Attempt:0,} returns sandbox id \"a2192335b85851deeefd1175b9723031573dc27fc7ca69ee651332d92814d45a\"" Feb 9 19:41:43.773450 kubelet[1667]: E0209 19:41:43.773413 1667 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:41:43.774944 env[1111]: time="2024-02-09T19:41:43.774916474Z" level=info msg="CreateContainer within sandbox \"a2192335b85851deeefd1175b9723031573dc27fc7ca69ee651332d92814d45a\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 9 19:41:43.781862 env[1111]: time="2024-02-09T19:41:43.781827917Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2b0e94b38682f4e439413801d3cc54db,Namespace:kube-system,Attempt:0,} returns sandbox id \"683e73e6d3c06c9bf21198203545adbea48b55bbffb20a036a8b4e61dcad9fb2\"" Feb 9 19:41:43.782418 kubelet[1667]: E0209 19:41:43.782404 1667 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:41:43.783828 env[1111]: time="2024-02-09T19:41:43.783806821Z" level=info msg="CreateContainer within sandbox \"683e73e6d3c06c9bf21198203545adbea48b55bbffb20a036a8b4e61dcad9fb2\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 9 19:41:43.803532 kubelet[1667]: W0209 19:41:43.803474 1667 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.0.0.29:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.29:6443: connect: connection refused Feb 9 19:41:43.803621 kubelet[1667]: E0209 19:41:43.803539 1667 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.29:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.29:6443: connect: connection refused Feb 9 19:41:43.847535 kubelet[1667]: W0209 19:41:43.847384 1667 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.0.0.29:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.29:6443: connect: connection refused Feb 9 19:41:43.847535 kubelet[1667]: E0209 19:41:43.847462 1667 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.29:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.29:6443: connect: connection refused Feb 9 19:41:44.122924 kubelet[1667]: E0209 19:41:44.122788 1667 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.29:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.29:6443: connect: connection refused" interval="1.6s" Feb 9 19:41:44.163372 kubelet[1667]: W0209 19:41:44.163286 1667 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.0.0.29:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.29:6443: connect: connection refused Feb 9 19:41:44.163372 kubelet[1667]: E0209 19:41:44.163358 1667 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.29:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.29:6443: connect: connection refused Feb 9 19:41:44.226639 kubelet[1667]: I0209 19:41:44.226588 1667 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 9 19:41:44.226918 kubelet[1667]: E0209 19:41:44.226892 1667 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.29:6443/api/v1/nodes\": dial tcp 10.0.0.29:6443: connect: connection refused" node="localhost" Feb 9 19:41:44.229227 kubelet[1667]: W0209 19:41:44.229175 1667 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.0.0.29:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.29:6443: connect: connection refused Feb 9 19:41:44.229281 kubelet[1667]: E0209 19:41:44.229234 1667 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.29:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.29:6443: connect: connection refused Feb 9 19:41:44.449633 env[1111]: time="2024-02-09T19:41:44.449480332Z" level=info msg="CreateContainer within sandbox \"a3e98138eab5df56ddbc385bf1223b5fea53832f3f68bec61e571dbd6f432c78\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"de210a4abcb2ecd4e6bf8b1f3a92aa756dfec4d7fa478bd9de0c10b6153d0c30\"" Feb 9 19:41:44.450293 env[1111]: time="2024-02-09T19:41:44.450261951Z" level=info msg="StartContainer for \"de210a4abcb2ecd4e6bf8b1f3a92aa756dfec4d7fa478bd9de0c10b6153d0c30\"" Feb 9 19:41:44.457377 env[1111]: time="2024-02-09T19:41:44.457325584Z" level=info msg="CreateContainer within sandbox \"a2192335b85851deeefd1175b9723031573dc27fc7ca69ee651332d92814d45a\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"037b8ace2b42182394f024a1cd882820f7405bab7f4bc0eba39630ee847b5c5c\"" Feb 9 19:41:44.457699 env[1111]: time="2024-02-09T19:41:44.457661176Z" level=info msg="StartContainer for \"037b8ace2b42182394f024a1cd882820f7405bab7f4bc0eba39630ee847b5c5c\"" Feb 9 19:41:44.464849 systemd[1]: Started cri-containerd-de210a4abcb2ecd4e6bf8b1f3a92aa756dfec4d7fa478bd9de0c10b6153d0c30.scope. Feb 9 19:41:44.466960 env[1111]: time="2024-02-09T19:41:44.466918532Z" level=info msg="CreateContainer within sandbox \"683e73e6d3c06c9bf21198203545adbea48b55bbffb20a036a8b4e61dcad9fb2\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"6cb7bf413c6717d5b1b3f72dfe380be5168440eb8c20a1085fc683376ac149b9\"" Feb 9 19:41:44.467411 env[1111]: time="2024-02-09T19:41:44.467373687Z" level=info msg="StartContainer for \"6cb7bf413c6717d5b1b3f72dfe380be5168440eb8c20a1085fc683376ac149b9\"" Feb 9 19:41:44.472637 systemd[1]: Started cri-containerd-037b8ace2b42182394f024a1cd882820f7405bab7f4bc0eba39630ee847b5c5c.scope. Feb 9 19:41:44.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.475000 audit: BPF prog-id=73 op=LOAD Feb 9 19:41:44.476000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.476000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1743 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:44.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465323130613461626362326563643465366266386231663361393261 Feb 9 19:41:44.476000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.476000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1743 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:44.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465323130613461626362326563643465366266386231663361393261 Feb 9 19:41:44.476000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.476000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.476000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.476000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.476000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.476000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.476000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.476000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.476000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.476000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.476000 audit: BPF prog-id=74 op=LOAD Feb 9 19:41:44.476000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000388b20 items=0 ppid=1743 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:44.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465323130613461626362326563643465366266386231663361393261 Feb 9 19:41:44.476000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.476000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.476000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.476000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.476000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.476000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.476000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.476000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.476000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.476000 audit: BPF prog-id=75 op=LOAD Feb 9 19:41:44.476000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000388b68 items=0 ppid=1743 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:44.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465323130613461626362326563643465366266386231663361393261 Feb 9 19:41:44.476000 audit: BPF prog-id=75 op=UNLOAD Feb 9 19:41:44.476000 audit: BPF prog-id=74 op=UNLOAD Feb 9 19:41:44.476000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.476000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.476000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.476000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.476000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.476000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.476000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.476000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.476000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.476000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.476000 audit: BPF prog-id=76 op=LOAD Feb 9 19:41:44.476000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000388f78 items=0 ppid=1743 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:44.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465323130613461626362326563643465366266386231663361393261 Feb 9 19:41:44.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.486000 audit: BPF prog-id=77 op=LOAD Feb 9 19:41:44.486000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.486000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1706 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:44.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033376238616365326234323138323339346630323461316364383832 Feb 9 19:41:44.486000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.486000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1706 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:44.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033376238616365326234323138323339346630323461316364383832 Feb 9 19:41:44.486000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.486000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.486000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.486000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.486000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.486000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.486000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.486000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.486000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.486000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.486000 audit: BPF prog-id=78 op=LOAD Feb 9 19:41:44.486000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00022a360 items=0 ppid=1706 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:44.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033376238616365326234323138323339346630323461316364383832 Feb 9 19:41:44.487000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.487000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.487000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.487000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.487000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.487000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.487000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.487000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.487000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.487000 audit: BPF prog-id=79 op=LOAD Feb 9 19:41:44.487000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00022a3a8 items=0 ppid=1706 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:44.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033376238616365326234323138323339346630323461316364383832 Feb 9 19:41:44.487000 audit: BPF prog-id=79 op=UNLOAD Feb 9 19:41:44.487000 audit: BPF prog-id=78 op=UNLOAD Feb 9 19:41:44.487000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.487000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.487000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.487000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.487000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.487000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.487000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.487000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.487000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.487000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.487000 audit: BPF prog-id=80 op=LOAD Feb 9 19:41:44.487000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00022a7b8 items=0 ppid=1706 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:44.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033376238616365326234323138323339346630323461316364383832 Feb 9 19:41:44.493795 systemd[1]: Started cri-containerd-6cb7bf413c6717d5b1b3f72dfe380be5168440eb8c20a1085fc683376ac149b9.scope. Feb 9 19:41:44.522014 env[1111]: time="2024-02-09T19:41:44.521970653Z" level=info msg="StartContainer for \"de210a4abcb2ecd4e6bf8b1f3a92aa756dfec4d7fa478bd9de0c10b6153d0c30\" returns successfully" Feb 9 19:41:44.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit: BPF prog-id=81 op=LOAD Feb 9 19:41:44.528000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit[1887]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1723 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:44.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663623762663431336336373137643562316233663732646665333830 Feb 9 19:41:44.528000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit[1887]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1723 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:44.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663623762663431336336373137643562316233663732646665333830 Feb 9 19:41:44.528000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit: BPF prog-id=82 op=LOAD Feb 9 19:41:44.528000 audit[1887]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000024ca0 items=0 ppid=1723 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:44.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663623762663431336336373137643562316233663732646665333830 Feb 9 19:41:44.528000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit: BPF prog-id=83 op=LOAD Feb 9 19:41:44.528000 audit[1887]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000024ce8 items=0 ppid=1723 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:44.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663623762663431336336373137643562316233663732646665333830 Feb 9 19:41:44.528000 audit: BPF prog-id=83 op=UNLOAD Feb 9 19:41:44.528000 audit: BPF prog-id=82 op=UNLOAD Feb 9 19:41:44.528000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:44.528000 audit: BPF prog-id=84 op=LOAD Feb 9 19:41:44.528000 audit[1887]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000250f8 items=0 ppid=1723 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:44.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663623762663431336336373137643562316233663732646665333830 Feb 9 19:41:44.533249 env[1111]: time="2024-02-09T19:41:44.533199932Z" level=info msg="StartContainer for \"037b8ace2b42182394f024a1cd882820f7405bab7f4bc0eba39630ee847b5c5c\" returns successfully" Feb 9 19:41:44.560678 env[1111]: time="2024-02-09T19:41:44.560637150Z" level=info msg="StartContainer for \"6cb7bf413c6717d5b1b3f72dfe380be5168440eb8c20a1085fc683376ac149b9\" returns successfully" Feb 9 19:41:44.745632 kubelet[1667]: E0209 19:41:44.742145 1667 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:41:44.748249 kubelet[1667]: E0209 19:41:44.748173 1667 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:41:44.750341 kubelet[1667]: E0209 19:41:44.750330 1667 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:41:45.450000 audit[1865]: AVC avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c314,c980 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:41:45.450000 audit[1865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0002a5ce0 a2=fc6 a3=0 items=0 ppid=1743 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c314,c980 key=(null) Feb 9 19:41:45.450000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:41:45.450000 audit[1865]: AVC avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c314,c980 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:41:45.450000 audit[1865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0000afb60 a2=fc6 a3=0 items=0 ppid=1743 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c314,c980 key=(null) Feb 9 19:41:45.450000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:41:45.752086 kubelet[1667]: E0209 19:41:45.751993 1667 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:41:45.828573 kubelet[1667]: I0209 19:41:45.828531 1667 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 9 19:41:45.948000 audit[1881]: AVC avc: denied { watch } for pid=1881 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c530,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:41:45.948000 audit[1881]: AVC avc: denied { watch } for pid=1881 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c530,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:41:45.948000 audit[1881]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c00471f3b0 a2=fc6 a3=0 items=0 ppid=1706 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c530,c739 key=(null) Feb 9 19:41:45.948000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 9 19:41:45.948000 audit[1881]: AVC avc: denied { watch } for pid=1881 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520995 scontext=system_u:system_r:svirt_lxc_net_t:s0:c530,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:41:45.948000 audit[1881]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c001234780 a2=fc6 a3=0 items=0 ppid=1706 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c530,c739 key=(null) Feb 9 19:41:45.948000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 9 19:41:45.948000 audit[1881]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0050d9e40 a2=fc6 a3=0 items=0 ppid=1706 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c530,c739 key=(null) Feb 9 19:41:45.948000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 9 19:41:45.950000 audit[1881]: AVC avc: denied { watch } for pid=1881 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c530,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:41:45.950000 audit[1881]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c0045c85c0 a2=fc6 a3=0 items=0 ppid=1706 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c530,c739 key=(null) Feb 9 19:41:45.950000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 9 19:41:45.952000 audit[1881]: AVC avc: denied { watch } for pid=1881 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c530,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:41:45.952000 audit[1881]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00127cea0 a2=fc6 a3=0 items=0 ppid=1706 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c530,c739 key=(null) Feb 9 19:41:45.952000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 9 19:41:45.957000 audit[1881]: AVC avc: denied { watch } for pid=1881 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c530,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:41:45.957000 audit[1881]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c002e79080 a2=fc6 a3=0 items=0 ppid=1706 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c530,c739 key=(null) Feb 9 19:41:45.957000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 9 19:41:45.990118 kubelet[1667]: E0209 19:41:45.990049 1667 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Feb 9 19:41:46.070343 kubelet[1667]: I0209 19:41:46.070293 1667 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Feb 9 19:41:46.076875 kubelet[1667]: E0209 19:41:46.076847 1667 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Feb 9 19:41:46.716726 kubelet[1667]: I0209 19:41:46.716684 1667 apiserver.go:52] "Watching apiserver" Feb 9 19:41:46.720917 kubelet[1667]: I0209 19:41:46.720895 1667 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 9 19:41:46.814620 kubelet[1667]: I0209 19:41:46.814514 1667 reconciler.go:41] "Reconciler: start to sync state" Feb 9 19:41:48.970990 systemd[1]: Reloading. Feb 9 19:41:49.046159 /usr/lib/systemd/system-generators/torcx-generator[1969]: time="2024-02-09T19:41:49Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:41:49.046206 /usr/lib/systemd/system-generators/torcx-generator[1969]: time="2024-02-09T19:41:49Z" level=info msg="torcx already run" Feb 9 19:41:49.105412 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:41:49.105429 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:41:49.124105 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:41:49.199609 kernel: kauditd_printk_skb: 581 callbacks suppressed Feb 9 19:41:49.199724 kernel: audit: type=1400 audit(1707507709.187:686): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.199750 kernel: audit: type=1400 audit(1707507709.187:687): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.199765 kernel: audit: type=1400 audit(1707507709.187:688): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.199779 kernel: audit: type=1400 audit(1707507709.187:689): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.199793 kernel: audit: type=1400 audit(1707507709.187:690): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.203870 kernel: audit: type=1400 audit(1707507709.187:691): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.203918 kernel: audit: type=1400 audit(1707507709.187:692): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.203939 kernel: audit: type=1400 audit(1707507709.187:693): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.203953 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:41:49.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.205801 kernel: audit: type=1400 audit(1707507709.187:694): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.190000 audit: BPF prog-id=85 op=LOAD Feb 9 19:41:49.190000 audit: BPF prog-id=46 op=UNLOAD Feb 9 19:41:49.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.192000 audit: BPF prog-id=86 op=LOAD Feb 9 19:41:49.192000 audit: BPF prog-id=47 op=UNLOAD Feb 9 19:41:49.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.194000 audit: BPF prog-id=87 op=LOAD Feb 9 19:41:49.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.197000 audit: BPF prog-id=88 op=LOAD Feb 9 19:41:49.198000 audit: BPF prog-id=48 op=UNLOAD Feb 9 19:41:49.198000 audit: BPF prog-id=49 op=UNLOAD Feb 9 19:41:49.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.200000 audit: BPF prog-id=89 op=LOAD Feb 9 19:41:49.200000 audit: BPF prog-id=50 op=UNLOAD Feb 9 19:41:49.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.202000 audit: BPF prog-id=90 op=LOAD Feb 9 19:41:49.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.206000 audit: BPF prog-id=91 op=LOAD Feb 9 19:41:49.206000 audit: BPF prog-id=51 op=UNLOAD Feb 9 19:41:49.206000 audit: BPF prog-id=52 op=UNLOAD Feb 9 19:41:49.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.207000 audit: BPF prog-id=92 op=LOAD Feb 9 19:41:49.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.207000 audit: BPF prog-id=93 op=LOAD Feb 9 19:41:49.207000 audit: BPF prog-id=53 op=UNLOAD Feb 9 19:41:49.207000 audit: BPF prog-id=54 op=UNLOAD Feb 9 19:41:49.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.208000 audit: BPF prog-id=94 op=LOAD Feb 9 19:41:49.208000 audit: BPF prog-id=61 op=UNLOAD Feb 9 19:41:49.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.209000 audit: BPF prog-id=95 op=LOAD Feb 9 19:41:49.209000 audit: BPF prog-id=55 op=UNLOAD Feb 9 19:41:49.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.209000 audit: BPF prog-id=96 op=LOAD Feb 9 19:41:49.209000 audit: BPF prog-id=69 op=UNLOAD Feb 9 19:41:49.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.210000 audit: BPF prog-id=97 op=LOAD Feb 9 19:41:49.210000 audit: BPF prog-id=65 op=UNLOAD Feb 9 19:41:49.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.211000 audit: BPF prog-id=98 op=LOAD Feb 9 19:41:49.211000 audit: BPF prog-id=77 op=UNLOAD Feb 9 19:41:49.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.212000 audit: BPF prog-id=99 op=LOAD Feb 9 19:41:49.212000 audit: BPF prog-id=56 op=UNLOAD Feb 9 19:41:49.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.212000 audit: BPF prog-id=100 op=LOAD Feb 9 19:41:49.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.212000 audit: BPF prog-id=101 op=LOAD Feb 9 19:41:49.212000 audit: BPF prog-id=57 op=UNLOAD Feb 9 19:41:49.212000 audit: BPF prog-id=58 op=UNLOAD Feb 9 19:41:49.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.212000 audit: BPF prog-id=102 op=LOAD Feb 9 19:41:49.212000 audit: BPF prog-id=59 op=UNLOAD Feb 9 19:41:49.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.213000 audit: BPF prog-id=103 op=LOAD Feb 9 19:41:49.213000 audit: BPF prog-id=81 op=UNLOAD Feb 9 19:41:49.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.214000 audit: BPF prog-id=104 op=LOAD Feb 9 19:41:49.214000 audit: BPF prog-id=60 op=UNLOAD Feb 9 19:41:49.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.215000 audit: BPF prog-id=105 op=LOAD Feb 9 19:41:49.215000 audit: BPF prog-id=73 op=UNLOAD Feb 9 19:41:49.227816 kubelet[1667]: I0209 19:41:49.227523 1667 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:41:49.227586 systemd[1]: Stopping kubelet.service... Feb 9 19:41:49.246898 systemd[1]: kubelet.service: Deactivated successfully. Feb 9 19:41:49.247070 systemd[1]: Stopped kubelet.service. Feb 9 19:41:49.245000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:49.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:49.248761 systemd[1]: Started kubelet.service. Feb 9 19:41:49.302517 kubelet[2010]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:41:49.302517 kubelet[2010]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 19:41:49.302517 kubelet[2010]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:41:49.302924 kubelet[2010]: I0209 19:41:49.302553 2010 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 19:41:49.306248 kubelet[2010]: I0209 19:41:49.306222 2010 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 9 19:41:49.306248 kubelet[2010]: I0209 19:41:49.306247 2010 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 19:41:49.306442 kubelet[2010]: I0209 19:41:49.306420 2010 server.go:837] "Client rotation is on, will bootstrap in background" Feb 9 19:41:49.307763 kubelet[2010]: I0209 19:41:49.307739 2010 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 9 19:41:49.308617 kubelet[2010]: I0209 19:41:49.308583 2010 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:41:49.313213 kubelet[2010]: I0209 19:41:49.313195 2010 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 19:41:49.313428 kubelet[2010]: I0209 19:41:49.313415 2010 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 19:41:49.313715 kubelet[2010]: I0209 19:41:49.313702 2010 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 19:41:49.313801 kubelet[2010]: I0209 19:41:49.313724 2010 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 19:41:49.313801 kubelet[2010]: I0209 19:41:49.313733 2010 container_manager_linux.go:302] "Creating device plugin manager" Feb 9 19:41:49.313801 kubelet[2010]: I0209 19:41:49.313759 2010 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:41:49.320229 kubelet[2010]: I0209 19:41:49.320204 2010 kubelet.go:405] "Attempting to sync node with API server" Feb 9 19:41:49.320229 kubelet[2010]: I0209 19:41:49.320226 2010 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 19:41:49.320328 kubelet[2010]: I0209 19:41:49.320243 2010 kubelet.go:309] "Adding apiserver pod source" Feb 9 19:41:49.320328 kubelet[2010]: I0209 19:41:49.320253 2010 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 19:41:49.323943 kubelet[2010]: I0209 19:41:49.323926 2010 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 19:41:49.324806 kubelet[2010]: I0209 19:41:49.324792 2010 server.go:1168] "Started kubelet" Feb 9 19:41:49.326018 kubelet[2010]: I0209 19:41:49.325996 2010 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 19:41:49.326280 kubelet[2010]: I0209 19:41:49.326261 2010 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 19:41:49.325000 audit[2010]: AVC avc: denied { mac_admin } for pid=2010 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.325000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:41:49.325000 audit[2010]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000824a50 a1=c000d38570 a2=c000824a20 a3=25 items=0 ppid=1 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:49.325000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:41:49.325000 audit[2010]: AVC avc: denied { mac_admin } for pid=2010 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.325000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:41:49.325000 audit[2010]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000207e00 a1=c000d38588 a2=c000824ae0 a3=25 items=0 ppid=1 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:49.325000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:41:49.327463 kubelet[2010]: I0209 19:41:49.327153 2010 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 19:41:49.327463 kubelet[2010]: I0209 19:41:49.327195 2010 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 19:41:49.327463 kubelet[2010]: I0209 19:41:49.327217 2010 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 19:41:49.327994 kubelet[2010]: I0209 19:41:49.327977 2010 server.go:461] "Adding debug handlers to kubelet server" Feb 9 19:41:49.328333 kubelet[2010]: E0209 19:41:49.328319 2010 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 19:41:49.328764 kubelet[2010]: E0209 19:41:49.328743 2010 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 19:41:49.330836 kubelet[2010]: I0209 19:41:49.330817 2010 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 9 19:41:49.331102 kubelet[2010]: I0209 19:41:49.331083 2010 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 9 19:41:49.354410 kubelet[2010]: I0209 19:41:49.354388 2010 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 19:41:49.355801 kubelet[2010]: I0209 19:41:49.355786 2010 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 19:41:49.355913 kubelet[2010]: I0209 19:41:49.355899 2010 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 9 19:41:49.355997 kubelet[2010]: I0209 19:41:49.355983 2010 kubelet.go:2257] "Starting kubelet main sync loop" Feb 9 19:41:49.356107 kubelet[2010]: E0209 19:41:49.356094 2010 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 19:41:49.383273 kubelet[2010]: I0209 19:41:49.383246 2010 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 19:41:49.383452 kubelet[2010]: I0209 19:41:49.383437 2010 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 19:41:49.383532 kubelet[2010]: I0209 19:41:49.383519 2010 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:41:49.383774 kubelet[2010]: I0209 19:41:49.383762 2010 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 9 19:41:49.383870 kubelet[2010]: I0209 19:41:49.383856 2010 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 9 19:41:49.383942 kubelet[2010]: I0209 19:41:49.383928 2010 policy_none.go:49] "None policy: Start" Feb 9 19:41:49.384567 kubelet[2010]: I0209 19:41:49.384555 2010 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 19:41:49.384675 kubelet[2010]: I0209 19:41:49.384662 2010 state_mem.go:35] "Initializing new in-memory state store" Feb 9 19:41:49.384854 kubelet[2010]: I0209 19:41:49.384837 2010 state_mem.go:75] "Updated machine memory state" Feb 9 19:41:49.387842 kubelet[2010]: I0209 19:41:49.387829 2010 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 19:41:49.386000 audit[2010]: AVC avc: denied { mac_admin } for pid=2010 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.386000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:41:49.386000 audit[2010]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00111ade0 a1=c000eb3338 a2=c00111adb0 a3=25 items=0 ppid=1 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:49.386000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:41:49.388244 kubelet[2010]: I0209 19:41:49.388229 2010 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 19:41:49.388484 kubelet[2010]: I0209 19:41:49.388471 2010 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 19:41:49.449912 kubelet[2010]: I0209 19:41:49.449874 2010 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Feb 9 19:41:49.456735 kubelet[2010]: I0209 19:41:49.456690 2010 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:41:49.456896 kubelet[2010]: I0209 19:41:49.456816 2010 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:41:49.456896 kubelet[2010]: I0209 19:41:49.456863 2010 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:41:49.458013 kubelet[2010]: I0209 19:41:49.457990 2010 kubelet_node_status.go:108] "Node was previously registered" node="localhost" Feb 9 19:41:49.458087 kubelet[2010]: I0209 19:41:49.458071 2010 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Feb 9 19:41:49.533483 kubelet[2010]: I0209 19:41:49.533369 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2b0e94b38682f4e439413801d3cc54db-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2b0e94b38682f4e439413801d3cc54db\") " pod="kube-system/kube-scheduler-localhost" Feb 9 19:41:49.533483 kubelet[2010]: I0209 19:41:49.533408 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/c9a584a4788dcad6b6b9b68e752b907f-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"c9a584a4788dcad6b6b9b68e752b907f\") " pod="kube-system/kube-apiserver-localhost" Feb 9 19:41:49.533483 kubelet[2010]: I0209 19:41:49.533427 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/c9a584a4788dcad6b6b9b68e752b907f-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"c9a584a4788dcad6b6b9b68e752b907f\") " pod="kube-system/kube-apiserver-localhost" Feb 9 19:41:49.533483 kubelet[2010]: I0209 19:41:49.533442 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 19:41:49.533690 kubelet[2010]: I0209 19:41:49.533539 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 19:41:49.533690 kubelet[2010]: I0209 19:41:49.533576 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 19:41:49.533690 kubelet[2010]: I0209 19:41:49.533634 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 19:41:49.533768 kubelet[2010]: I0209 19:41:49.533728 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/c9a584a4788dcad6b6b9b68e752b907f-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"c9a584a4788dcad6b6b9b68e752b907f\") " pod="kube-system/kube-apiserver-localhost" Feb 9 19:41:49.533768 kubelet[2010]: I0209 19:41:49.533756 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7709ea05d7cdf82b0d7e594b61a10331-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7709ea05d7cdf82b0d7e594b61a10331\") " pod="kube-system/kube-controller-manager-localhost" Feb 9 19:41:49.764139 kubelet[2010]: E0209 19:41:49.764101 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:41:49.764510 kubelet[2010]: E0209 19:41:49.764471 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:41:49.764828 kubelet[2010]: E0209 19:41:49.764805 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:41:50.062184 update_engine[1104]: I0209 19:41:50.062125 1104 update_attempter.cc:509] Updating boot flags... Feb 9 19:41:50.322050 kubelet[2010]: I0209 19:41:50.321924 2010 apiserver.go:52] "Watching apiserver" Feb 9 19:41:50.331431 kubelet[2010]: I0209 19:41:50.331405 2010 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 9 19:41:50.338562 kubelet[2010]: I0209 19:41:50.338527 2010 reconciler.go:41] "Reconciler: start to sync state" Feb 9 19:41:50.365570 kubelet[2010]: E0209 19:41:50.365157 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:41:50.370011 kubelet[2010]: E0209 19:41:50.369974 2010 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Feb 9 19:41:50.370438 kubelet[2010]: E0209 19:41:50.370422 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:41:50.370890 kubelet[2010]: E0209 19:41:50.370872 2010 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" Feb 9 19:41:50.371230 kubelet[2010]: E0209 19:41:50.371196 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:41:50.385083 kubelet[2010]: I0209 19:41:50.385038 2010 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.384708553 podCreationTimestamp="2024-02-09 19:41:49 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:41:50.379740197 +0000 UTC m=+1.127219213" watchObservedRunningTime="2024-02-09 19:41:50.384708553 +0000 UTC m=+1.132187569" Feb 9 19:41:50.385265 kubelet[2010]: I0209 19:41:50.385107 2010 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.38509141 podCreationTimestamp="2024-02-09 19:41:49 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:41:50.385079346 +0000 UTC m=+1.132558363" watchObservedRunningTime="2024-02-09 19:41:50.38509141 +0000 UTC m=+1.132570426" Feb 9 19:41:50.390276 kubelet[2010]: I0209 19:41:50.390246 2010 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.39020177 podCreationTimestamp="2024-02-09 19:41:49 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:41:50.390117377 +0000 UTC m=+1.137596413" watchObservedRunningTime="2024-02-09 19:41:50.39020177 +0000 UTC m=+1.137680786" Feb 9 19:41:50.792000 audit[1865]: AVC avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c314,c980 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:41:50.792000 audit[1865]: AVC avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c314,c980 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:41:50.792000 audit[1865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00117ad20 a2=fc6 a3=0 items=0 ppid=1743 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c314,c980 key=(null) Feb 9 19:41:50.792000 audit[1865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000dcf380 a2=fc6 a3=0 items=0 ppid=1743 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c314,c980 key=(null) Feb 9 19:41:50.792000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:41:50.792000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:41:50.793000 audit[1865]: AVC avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c314,c980 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:41:50.793000 audit[1865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000dcf3c0 a2=fc6 a3=0 items=0 ppid=1743 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c314,c980 key=(null) Feb 9 19:41:50.793000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:41:50.794000 audit[1865]: AVC avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c314,c980 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:41:50.794000 audit[1865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c56b60 a2=fc6 a3=0 items=0 ppid=1743 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c314,c980 key=(null) Feb 9 19:41:50.794000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:41:51.366416 kubelet[2010]: E0209 19:41:51.366372 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:41:51.367111 kubelet[2010]: E0209 19:41:51.367085 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:41:54.678276 sudo[1248]: pam_unix(sudo:session): session closed for user root Feb 9 19:41:54.676000 audit[1248]: USER_END pid=1248 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:41:54.679257 kernel: kauditd_printk_skb: 264 callbacks suppressed Feb 9 19:41:54.679362 kernel: audit: type=1106 audit(1707507714.676:937): pid=1248 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:41:54.676000 audit[1248]: CRED_DISP pid=1248 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:41:54.689283 kernel: audit: type=1104 audit(1707507714.676:938): pid=1248 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:41:54.693347 sshd[1244]: pam_unix(sshd:session): session closed for user core Feb 9 19:41:54.692000 audit[1244]: USER_END pid=1244 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:41:54.695176 systemd[1]: sshd@6-10.0.0.29:22-10.0.0.1:35180.service: Deactivated successfully. Feb 9 19:41:54.695829 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 19:41:54.695956 systemd[1]: session-7.scope: Consumed 3.638s CPU time. Feb 9 19:41:54.696386 systemd-logind[1103]: Session 7 logged out. Waiting for processes to exit. Feb 9 19:41:54.696976 systemd-logind[1103]: Removed session 7. Feb 9 19:41:54.692000 audit[1244]: CRED_DISP pid=1244 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:41:54.699914 kernel: audit: type=1106 audit(1707507714.692:939): pid=1244 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:41:54.699952 kernel: audit: type=1104 audit(1707507714.692:940): pid=1244 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:41:54.699986 kernel: audit: type=1131 audit(1707507714.693:941): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.29:22-10.0.0.1:35180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:54.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.29:22-10.0.0.1:35180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:41:55.057399 kubelet[2010]: E0209 19:41:55.057348 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:41:55.371480 kubelet[2010]: E0209 19:41:55.371367 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:41:57.902694 kubelet[2010]: E0209 19:41:57.902643 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:41:58.375349 kubelet[2010]: E0209 19:41:58.375328 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:42:00.051092 kubelet[2010]: E0209 19:42:00.051041 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:42:00.378961 kubelet[2010]: E0209 19:42:00.378844 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:42:02.637000 audit[1865]: AVC avc: denied { watch } for pid=1865 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521026 scontext=system_u:system_r:svirt_lxc_net_t:s0:c314,c980 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 19:42:02.647339 kernel: audit: type=1400 audit(1707507722.637:942): avc: denied { watch } for pid=1865 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521026 scontext=system_u:system_r:svirt_lxc_net_t:s0:c314,c980 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 19:42:02.647470 kernel: audit: type=1300 audit(1707507722.637:942): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001212700 a2=fc6 a3=0 items=0 ppid=1743 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c314,c980 key=(null) Feb 9 19:42:02.647499 kernel: audit: type=1327 audit(1707507722.637:942): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:42:02.637000 audit[1865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001212700 a2=fc6 a3=0 items=0 ppid=1743 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c314,c980 key=(null) Feb 9 19:42:02.637000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:42:02.922996 kubelet[2010]: I0209 19:42:02.922841 2010 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 9 19:42:02.923368 env[1111]: time="2024-02-09T19:42:02.923219858Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 19:42:02.923651 kubelet[2010]: I0209 19:42:02.923404 2010 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 9 19:42:03.354148 kubelet[2010]: I0209 19:42:03.354100 2010 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:42:03.361186 systemd[1]: Created slice kubepods-besteffort-podeb098c6b_31fd_44ea_ae71_8c176842dba9.slice. Feb 9 19:42:03.424114 kubelet[2010]: I0209 19:42:03.424074 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/eb098c6b-31fd-44ea-ae71-8c176842dba9-xtables-lock\") pod \"kube-proxy-jzppl\" (UID: \"eb098c6b-31fd-44ea-ae71-8c176842dba9\") " pod="kube-system/kube-proxy-jzppl" Feb 9 19:42:03.424280 kubelet[2010]: I0209 19:42:03.424139 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/eb098c6b-31fd-44ea-ae71-8c176842dba9-lib-modules\") pod \"kube-proxy-jzppl\" (UID: \"eb098c6b-31fd-44ea-ae71-8c176842dba9\") " pod="kube-system/kube-proxy-jzppl" Feb 9 19:42:03.424280 kubelet[2010]: I0209 19:42:03.424168 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kpqww\" (UniqueName: \"kubernetes.io/projected/eb098c6b-31fd-44ea-ae71-8c176842dba9-kube-api-access-kpqww\") pod \"kube-proxy-jzppl\" (UID: \"eb098c6b-31fd-44ea-ae71-8c176842dba9\") " pod="kube-system/kube-proxy-jzppl" Feb 9 19:42:03.424280 kubelet[2010]: I0209 19:42:03.424189 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/eb098c6b-31fd-44ea-ae71-8c176842dba9-kube-proxy\") pod \"kube-proxy-jzppl\" (UID: \"eb098c6b-31fd-44ea-ae71-8c176842dba9\") " pod="kube-system/kube-proxy-jzppl" Feb 9 19:42:03.513687 kubelet[2010]: I0209 19:42:03.513638 2010 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:42:03.518651 systemd[1]: Created slice kubepods-besteffort-pod4b0f3bae_6c3f_4382_a1af_beffea74557f.slice. Feb 9 19:42:03.625782 kubelet[2010]: I0209 19:42:03.625666 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s8nsh\" (UniqueName: \"kubernetes.io/projected/4b0f3bae-6c3f-4382-a1af-beffea74557f-kube-api-access-s8nsh\") pod \"tigera-operator-7ff8dc855-4dhld\" (UID: \"4b0f3bae-6c3f-4382-a1af-beffea74557f\") " pod="tigera-operator/tigera-operator-7ff8dc855-4dhld" Feb 9 19:42:03.625782 kubelet[2010]: I0209 19:42:03.625728 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4b0f3bae-6c3f-4382-a1af-beffea74557f-var-lib-calico\") pod \"tigera-operator-7ff8dc855-4dhld\" (UID: \"4b0f3bae-6c3f-4382-a1af-beffea74557f\") " pod="tigera-operator/tigera-operator-7ff8dc855-4dhld" Feb 9 19:42:03.670180 kubelet[2010]: E0209 19:42:03.670152 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:42:03.670640 env[1111]: time="2024-02-09T19:42:03.670592018Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-jzppl,Uid:eb098c6b-31fd-44ea-ae71-8c176842dba9,Namespace:kube-system,Attempt:0,}" Feb 9 19:42:03.684016 env[1111]: time="2024-02-09T19:42:03.683957246Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:42:03.684016 env[1111]: time="2024-02-09T19:42:03.683998224Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:42:03.684016 env[1111]: time="2024-02-09T19:42:03.684008202Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:42:03.684263 env[1111]: time="2024-02-09T19:42:03.684194857Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/06fb0bf30073c0dee2a24c74206e272cd338721034bcc1f40c907e155a3695b5 pid=2120 runtime=io.containerd.runc.v2 Feb 9 19:42:03.697380 systemd[1]: run-containerd-runc-k8s.io-06fb0bf30073c0dee2a24c74206e272cd338721034bcc1f40c907e155a3695b5-runc.UosEex.mount: Deactivated successfully. Feb 9 19:42:03.699905 systemd[1]: Started cri-containerd-06fb0bf30073c0dee2a24c74206e272cd338721034bcc1f40c907e155a3695b5.scope. Feb 9 19:42:03.711920 kernel: audit: type=1400 audit(1707507723.706:943): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.711990 kernel: audit: type=1400 audit(1707507723.706:944): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.712019 kernel: audit: type=1400 audit(1707507723.706:945): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.716122 kernel: audit: type=1400 audit(1707507723.706:946): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.716242 kernel: audit: type=1400 audit(1707507723.706:947): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.718073 kernel: audit: type=1400 audit(1707507723.706:948): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.721951 kernel: audit: type=1400 audit(1707507723.706:949): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.711000 audit: BPF prog-id=106 op=LOAD Feb 9 19:42:03.712000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.712000 audit[2129]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2120 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036666230626633303037336330646565326132346337343230366532 Feb 9 19:42:03.712000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.712000 audit[2129]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2120 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036666230626633303037336330646565326132346337343230366532 Feb 9 19:42:03.712000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.712000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.712000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.712000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.712000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.712000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.712000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.712000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.712000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.712000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.712000 audit: BPF prog-id=107 op=LOAD Feb 9 19:42:03.712000 audit[2129]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0001ddb20 items=0 ppid=2120 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036666230626633303037336330646565326132346337343230366532 Feb 9 19:42:03.715000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.715000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.715000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.715000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.715000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.715000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.715000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.715000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.715000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.715000 audit: BPF prog-id=108 op=LOAD Feb 9 19:42:03.715000 audit[2129]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0001ddb68 items=0 ppid=2120 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036666230626633303037336330646565326132346337343230366532 Feb 9 19:42:03.717000 audit: BPF prog-id=108 op=UNLOAD Feb 9 19:42:03.717000 audit: BPF prog-id=107 op=UNLOAD Feb 9 19:42:03.717000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.717000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.717000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.717000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.717000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.717000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.717000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.717000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.717000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.717000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.717000 audit: BPF prog-id=109 op=LOAD Feb 9 19:42:03.717000 audit[2129]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0001ddf78 items=0 ppid=2120 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036666230626633303037336330646565326132346337343230366532 Feb 9 19:42:03.734121 env[1111]: time="2024-02-09T19:42:03.734073118Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-jzppl,Uid:eb098c6b-31fd-44ea-ae71-8c176842dba9,Namespace:kube-system,Attempt:0,} returns sandbox id \"06fb0bf30073c0dee2a24c74206e272cd338721034bcc1f40c907e155a3695b5\"" Feb 9 19:42:03.734862 kubelet[2010]: E0209 19:42:03.734838 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:42:03.739183 env[1111]: time="2024-02-09T19:42:03.739142707Z" level=info msg="CreateContainer within sandbox \"06fb0bf30073c0dee2a24c74206e272cd338721034bcc1f40c907e155a3695b5\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 19:42:03.753207 env[1111]: time="2024-02-09T19:42:03.753170024Z" level=info msg="CreateContainer within sandbox \"06fb0bf30073c0dee2a24c74206e272cd338721034bcc1f40c907e155a3695b5\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"642e614afaf2fa8804737aa7966481be9a73a4701f1b4139feff09b381453095\"" Feb 9 19:42:03.753612 env[1111]: time="2024-02-09T19:42:03.753577981Z" level=info msg="StartContainer for \"642e614afaf2fa8804737aa7966481be9a73a4701f1b4139feff09b381453095\"" Feb 9 19:42:03.767038 systemd[1]: Started cri-containerd-642e614afaf2fa8804737aa7966481be9a73a4701f1b4139feff09b381453095.scope. Feb 9 19:42:03.779000 audit[2161]: AVC avc: denied { perfmon } for pid=2161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.779000 audit[2161]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2120 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634326536313461666166326661383830343733376161373936363438 Feb 9 19:42:03.779000 audit[2161]: AVC avc: denied { bpf } for pid=2161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.779000 audit[2161]: AVC avc: denied { bpf } for pid=2161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.779000 audit[2161]: AVC avc: denied { bpf } for pid=2161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.779000 audit[2161]: AVC avc: denied { perfmon } for pid=2161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.779000 audit[2161]: AVC avc: denied { perfmon } for pid=2161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.779000 audit[2161]: AVC avc: denied { perfmon } for pid=2161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.779000 audit[2161]: AVC avc: denied { perfmon } for pid=2161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.779000 audit[2161]: AVC avc: denied { perfmon } for pid=2161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.779000 audit[2161]: AVC avc: denied { bpf } for pid=2161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.779000 audit[2161]: AVC avc: denied { bpf } for pid=2161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.779000 audit: BPF prog-id=110 op=LOAD Feb 9 19:42:03.779000 audit[2161]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002953b0 items=0 ppid=2120 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634326536313461666166326661383830343733376161373936363438 Feb 9 19:42:03.779000 audit[2161]: AVC avc: denied { bpf } for pid=2161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.779000 audit[2161]: AVC avc: denied { bpf } for pid=2161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.779000 audit[2161]: AVC avc: denied { perfmon } for pid=2161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.779000 audit[2161]: AVC avc: denied { perfmon } for pid=2161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.779000 audit[2161]: AVC avc: denied { perfmon } for pid=2161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.779000 audit[2161]: AVC avc: denied { perfmon } for pid=2161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.779000 audit[2161]: AVC avc: denied { perfmon } for pid=2161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.779000 audit[2161]: AVC avc: denied { bpf } for pid=2161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.779000 audit[2161]: AVC avc: denied { bpf } for pid=2161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.779000 audit: BPF prog-id=111 op=LOAD Feb 9 19:42:03.779000 audit[2161]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002953f8 items=0 ppid=2120 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634326536313461666166326661383830343733376161373936363438 Feb 9 19:42:03.779000 audit: BPF prog-id=111 op=UNLOAD Feb 9 19:42:03.779000 audit: BPF prog-id=110 op=UNLOAD Feb 9 19:42:03.779000 audit[2161]: AVC avc: denied { bpf } for pid=2161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.779000 audit[2161]: AVC avc: denied { bpf } for pid=2161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.779000 audit[2161]: AVC avc: denied { bpf } for pid=2161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.779000 audit[2161]: AVC avc: denied { perfmon } for pid=2161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.779000 audit[2161]: AVC avc: denied { perfmon } for pid=2161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.779000 audit[2161]: AVC avc: denied { perfmon } for pid=2161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.779000 audit[2161]: AVC avc: denied { perfmon } for pid=2161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.779000 audit[2161]: AVC avc: denied { perfmon } for pid=2161 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.779000 audit[2161]: AVC avc: denied { bpf } for pid=2161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.779000 audit[2161]: AVC avc: denied { bpf } for pid=2161 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.779000 audit: BPF prog-id=112 op=LOAD Feb 9 19:42:03.779000 audit[2161]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000295488 items=0 ppid=2120 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634326536313461666166326661383830343733376161373936363438 Feb 9 19:42:03.795124 env[1111]: time="2024-02-09T19:42:03.795077995Z" level=info msg="StartContainer for \"642e614afaf2fa8804737aa7966481be9a73a4701f1b4139feff09b381453095\" returns successfully" Feb 9 19:42:03.822486 env[1111]: time="2024-02-09T19:42:03.822432217Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-4dhld,Uid:4b0f3bae-6c3f-4382-a1af-beffea74557f,Namespace:tigera-operator,Attempt:0,}" Feb 9 19:42:03.836776 env[1111]: time="2024-02-09T19:42:03.836680596Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:42:03.836776 env[1111]: time="2024-02-09T19:42:03.836732825Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:42:03.836776 env[1111]: time="2024-02-09T19:42:03.836742954Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:42:03.837021 env[1111]: time="2024-02-09T19:42:03.836928859Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/268c5b0b9aa437b1167ff98d06244ac23eb2c28e7c68639aaa6d9326462fa497 pid=2204 runtime=io.containerd.runc.v2 Feb 9 19:42:03.848000 audit[2241]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:42:03.848000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff62306510 a2=0 a3=7fff623064fc items=0 ppid=2172 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.848000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:42:03.850000 audit[2242]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:42:03.850000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe38252970 a2=0 a3=7ffe3825295c items=0 ppid=2172 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.850000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:42:03.852773 systemd[1]: Started cri-containerd-268c5b0b9aa437b1167ff98d06244ac23eb2c28e7c68639aaa6d9326462fa497.scope. Feb 9 19:42:03.852000 audit[2243]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:42:03.852000 audit[2243]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff62f7d290 a2=0 a3=7fff62f7d27c items=0 ppid=2172 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.852000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:42:03.853000 audit[2245]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:42:03.853000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffa91c6e20 a2=0 a3=7fffa91c6e0c items=0 ppid=2172 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.853000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:42:03.853000 audit[2244]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:42:03.853000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9aad7f70 a2=0 a3=7ffc9aad7f5c items=0 ppid=2172 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.853000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:42:03.855000 audit[2253]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:42:03.855000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc070bd4b0 a2=0 a3=7ffc070bd49c items=0 ppid=2172 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.855000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:42:03.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.862000 audit: BPF prog-id=113 op=LOAD Feb 9 19:42:03.863000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.863000 audit[2223]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2204 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236386335623062396161343337623131363766663938643036323434 Feb 9 19:42:03.863000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.863000 audit[2223]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2204 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236386335623062396161343337623131363766663938643036323434 Feb 9 19:42:03.863000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.863000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.863000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.863000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.863000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.863000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.863000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.863000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.863000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.863000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.863000 audit: BPF prog-id=114 op=LOAD Feb 9 19:42:03.863000 audit[2223]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000243d0 items=0 ppid=2204 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236386335623062396161343337623131363766663938643036323434 Feb 9 19:42:03.863000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.863000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.863000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.863000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.863000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.863000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.863000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.863000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.863000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.863000 audit: BPF prog-id=115 op=LOAD Feb 9 19:42:03.863000 audit[2223]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000024418 items=0 ppid=2204 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236386335623062396161343337623131363766663938643036323434 Feb 9 19:42:03.863000 audit: BPF prog-id=115 op=UNLOAD Feb 9 19:42:03.863000 audit: BPF prog-id=114 op=UNLOAD Feb 9 19:42:03.863000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.863000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.863000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.863000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.863000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.863000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.863000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.863000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.863000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.863000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:03.863000 audit: BPF prog-id=116 op=LOAD Feb 9 19:42:03.863000 audit[2223]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000024828 items=0 ppid=2204 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236386335623062396161343337623131363766663938643036323434 Feb 9 19:42:03.885428 env[1111]: time="2024-02-09T19:42:03.885339055Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-4dhld,Uid:4b0f3bae-6c3f-4382-a1af-beffea74557f,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"268c5b0b9aa437b1167ff98d06244ac23eb2c28e7c68639aaa6d9326462fa497\"" Feb 9 19:42:03.888821 env[1111]: time="2024-02-09T19:42:03.888794471Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 9 19:42:03.959000 audit[2260]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:42:03.959000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe04992f80 a2=0 a3=7ffe04992f6c items=0 ppid=2172 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.959000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:42:03.962000 audit[2262]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2262 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:42:03.962000 audit[2262]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffab1ddf80 a2=0 a3=7fffab1ddf6c items=0 ppid=2172 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.962000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 19:42:03.965000 audit[2265]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2265 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:42:03.965000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff0e5eb2b0 a2=0 a3=7fff0e5eb29c items=0 ppid=2172 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.965000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 19:42:03.966000 audit[2266]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2266 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:42:03.966000 audit[2266]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee034ca10 a2=0 a3=7ffee034c9fc items=0 ppid=2172 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.966000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:42:03.969000 audit[2268]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2268 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:42:03.969000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff54933770 a2=0 a3=7fff5493375c items=0 ppid=2172 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.969000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:42:03.970000 audit[2269]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2269 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:42:03.970000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc68645bf0 a2=0 a3=7ffc68645bdc items=0 ppid=2172 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.970000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:42:03.972000 audit[2271]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2271 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:42:03.972000 audit[2271]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffc98463e0 a2=0 a3=7fffc98463cc items=0 ppid=2172 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.972000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:42:03.975000 audit[2274]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2274 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:42:03.975000 audit[2274]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff75b22a70 a2=0 a3=7fff75b22a5c items=0 ppid=2172 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.975000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 19:42:03.976000 audit[2275]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:42:03.976000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe4c4d720 a2=0 a3=7fffe4c4d70c items=0 ppid=2172 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.976000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:42:03.978000 audit[2277]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2277 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:42:03.978000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdc1991f90 a2=0 a3=7ffdc1991f7c items=0 ppid=2172 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.978000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:42:03.979000 audit[2278]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2278 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:42:03.979000 audit[2278]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdce13b460 a2=0 a3=7ffdce13b44c items=0 ppid=2172 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.979000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:42:03.982000 audit[2280]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2280 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:42:03.982000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdb8d21110 a2=0 a3=7ffdb8d210fc items=0 ppid=2172 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.982000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:42:03.985000 audit[2283]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2283 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:42:03.985000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffedb55b230 a2=0 a3=7ffedb55b21c items=0 ppid=2172 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.985000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:42:03.988000 audit[2286]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2286 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:42:03.988000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd3e517310 a2=0 a3=7ffd3e5172fc items=0 ppid=2172 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.988000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:42:03.989000 audit[2287]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2287 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:42:03.989000 audit[2287]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd9652ea20 a2=0 a3=7ffd9652ea0c items=0 ppid=2172 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.989000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:42:03.991000 audit[2289]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2289 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:42:03.991000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffcd7d763f0 a2=0 a3=7ffcd7d763dc items=0 ppid=2172 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.991000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:42:03.994000 audit[2292]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2292 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:42:03.994000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcb2251b40 a2=0 a3=7ffcb2251b2c items=0 ppid=2172 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.994000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:42:03.999000 audit[2297]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:42:03.999000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe24416eb0 a2=0 a3=7ffe24416e9c items=0 ppid=2172 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:03.999000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:42:04.001000 audit[2299]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2299 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:42:04.001000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffec9154130 a2=0 a3=7ffec915411c items=0 ppid=2172 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:04.001000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:42:04.010000 audit[2301]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:42:04.010000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffcd71cec80 a2=0 a3=7ffcd71cec6c items=0 ppid=2172 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:04.010000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:42:04.015000 audit[2301]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:42:04.015000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffcd71cec80 a2=0 a3=7ffcd71cec6c items=0 ppid=2172 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:04.015000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:42:04.016000 audit[2307]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:42:04.016000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffff33cfcc0 a2=0 a3=7ffff33cfcac items=0 ppid=2172 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:04.016000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:42:04.019000 audit[2309]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:42:04.019000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc2f48cb70 a2=0 a3=7ffc2f48cb5c items=0 ppid=2172 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:04.019000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 19:42:04.022000 audit[2312]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:42:04.022000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc59a951e0 a2=0 a3=7ffc59a951cc items=0 ppid=2172 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:04.022000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 19:42:04.023000 audit[2313]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:42:04.023000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffead40b370 a2=0 a3=7ffead40b35c items=0 ppid=2172 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:04.023000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:42:04.025000 audit[2315]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2315 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:42:04.025000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdac4b0170 a2=0 a3=7ffdac4b015c items=0 ppid=2172 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:04.025000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:42:04.026000 audit[2316]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:42:04.026000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcdd283340 a2=0 a3=7ffcdd28332c items=0 ppid=2172 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:04.026000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:42:04.028000 audit[2318]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2318 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:42:04.028000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff070d8fb0 a2=0 a3=7fff070d8f9c items=0 ppid=2172 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:04.028000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 19:42:04.031000 audit[2321]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2321 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:42:04.031000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd61ee51d0 a2=0 a3=7ffd61ee51bc items=0 ppid=2172 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:04.031000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:42:04.032000 audit[2322]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2322 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:42:04.032000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0a714ea0 a2=0 a3=7ffe0a714e8c items=0 ppid=2172 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:04.032000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:42:04.034000 audit[2324]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2324 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:42:04.034000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd8c0e72c0 a2=0 a3=7ffd8c0e72ac items=0 ppid=2172 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:04.034000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:42:04.035000 audit[2325]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2325 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:42:04.035000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd529269e0 a2=0 a3=7ffd529269cc items=0 ppid=2172 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:04.035000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:42:04.038000 audit[2327]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:42:04.038000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc2a5ad3c0 a2=0 a3=7ffc2a5ad3ac items=0 ppid=2172 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:04.038000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:42:04.041000 audit[2330]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:42:04.041000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd83649d60 a2=0 a3=7ffd83649d4c items=0 ppid=2172 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:04.041000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:42:04.044000 audit[2333]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2333 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:42:04.044000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd2a229040 a2=0 a3=7ffd2a22902c items=0 ppid=2172 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:04.044000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 19:42:04.045000 audit[2334]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2334 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:42:04.045000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffef69ba380 a2=0 a3=7ffef69ba36c items=0 ppid=2172 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:04.045000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:42:04.047000 audit[2336]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2336 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:42:04.047000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe9c735dc0 a2=0 a3=7ffe9c735dac items=0 ppid=2172 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:04.047000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:42:04.050000 audit[2339]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:42:04.050000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff884e26a0 a2=0 a3=7fff884e268c items=0 ppid=2172 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:04.050000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:42:04.051000 audit[2340]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_chain pid=2340 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:42:04.051000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeac940a80 a2=0 a3=7ffeac940a6c items=0 ppid=2172 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:04.051000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:42:04.053000 audit[2342]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=2342 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:42:04.053000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff12407a60 a2=0 a3=7fff12407a4c items=0 ppid=2172 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:04.053000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:42:04.056000 audit[2345]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_rule pid=2345 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:42:04.056000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff5a051170 a2=0 a3=7fff5a05115c items=0 ppid=2172 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:04.056000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:42:04.057000 audit[2346]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2346 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:42:04.057000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcfea92300 a2=0 a3=7ffcfea922ec items=0 ppid=2172 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:04.057000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:42:04.059000 audit[2348]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2348 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:42:04.059000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffdf839d70 a2=0 a3=7fffdf839d5c items=0 ppid=2172 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:04.059000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:42:04.061000 audit[2350]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2350 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:42:04.061000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffe18a38b80 a2=0 a3=7ffe18a38b6c items=0 ppid=2172 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:04.061000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:42:04.061000 audit[2350]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2350 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:42:04.061000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffe18a38b80 a2=0 a3=7ffe18a38b6c items=0 ppid=2172 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:04.061000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:42:04.386859 kubelet[2010]: E0209 19:42:04.386820 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:42:04.393581 kubelet[2010]: I0209 19:42:04.393551 2010 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-jzppl" podStartSLOduration=1.393516145 podCreationTimestamp="2024-02-09 19:42:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:42:04.392948986 +0000 UTC m=+15.140428002" watchObservedRunningTime="2024-02-09 19:42:04.393516145 +0000 UTC m=+15.140995161" Feb 9 19:42:04.984037 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2151211843.mount: Deactivated successfully. Feb 9 19:42:07.277800 env[1111]: time="2024-02-09T19:42:07.277737892Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:07.279531 env[1111]: time="2024-02-09T19:42:07.279490230Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:07.281105 env[1111]: time="2024-02-09T19:42:07.281079990Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:07.282906 env[1111]: time="2024-02-09T19:42:07.282873166Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:07.283500 env[1111]: time="2024-02-09T19:42:07.283467766Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 9 19:42:07.284973 env[1111]: time="2024-02-09T19:42:07.284949901Z" level=info msg="CreateContainer within sandbox \"268c5b0b9aa437b1167ff98d06244ac23eb2c28e7c68639aaa6d9326462fa497\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 9 19:42:07.296363 env[1111]: time="2024-02-09T19:42:07.296317703Z" level=info msg="CreateContainer within sandbox \"268c5b0b9aa437b1167ff98d06244ac23eb2c28e7c68639aaa6d9326462fa497\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"bc7cd317227235a3eb69fcbb838f87a239561a2ecf9e4ee720a3d6a146cba288\"" Feb 9 19:42:07.296836 env[1111]: time="2024-02-09T19:42:07.296804017Z" level=info msg="StartContainer for \"bc7cd317227235a3eb69fcbb838f87a239561a2ecf9e4ee720a3d6a146cba288\"" Feb 9 19:42:07.313676 systemd[1]: Started cri-containerd-bc7cd317227235a3eb69fcbb838f87a239561a2ecf9e4ee720a3d6a146cba288.scope. Feb 9 19:42:07.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit: BPF prog-id=117 op=LOAD Feb 9 19:42:07.324000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2204 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:07.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263376364333137323237323335613365623639666362623833386638 Feb 9 19:42:07.324000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2204 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:07.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263376364333137323237323335613365623639666362623833386638 Feb 9 19:42:07.324000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit: BPF prog-id=118 op=LOAD Feb 9 19:42:07.324000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000092de0 items=0 ppid=2204 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:07.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263376364333137323237323335613365623639666362623833386638 Feb 9 19:42:07.324000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit: BPF prog-id=119 op=LOAD Feb 9 19:42:07.324000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000092e28 items=0 ppid=2204 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:07.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263376364333137323237323335613365623639666362623833386638 Feb 9 19:42:07.324000 audit: BPF prog-id=119 op=UNLOAD Feb 9 19:42:07.324000 audit: BPF prog-id=118 op=UNLOAD Feb 9 19:42:07.324000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:07.324000 audit: BPF prog-id=120 op=LOAD Feb 9 19:42:07.324000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000093238 items=0 ppid=2204 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:07.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263376364333137323237323335613365623639666362623833386638 Feb 9 19:42:07.338109 env[1111]: time="2024-02-09T19:42:07.338069686Z" level=info msg="StartContainer for \"bc7cd317227235a3eb69fcbb838f87a239561a2ecf9e4ee720a3d6a146cba288\" returns successfully" Feb 9 19:42:07.399471 kubelet[2010]: I0209 19:42:07.399303 2010 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7ff8dc855-4dhld" podStartSLOduration=1.002553098 podCreationTimestamp="2024-02-09 19:42:03 +0000 UTC" firstStartedPulling="2024-02-09 19:42:03.887091991 +0000 UTC m=+14.634571007" lastFinishedPulling="2024-02-09 19:42:07.283805186 +0000 UTC m=+18.031284212" observedRunningTime="2024-02-09 19:42:07.399049401 +0000 UTC m=+18.146528417" watchObservedRunningTime="2024-02-09 19:42:07.399266303 +0000 UTC m=+18.146745309" Feb 9 19:42:09.044000 audit[2391]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:42:09.047010 kernel: kauditd_printk_skb: 360 callbacks suppressed Feb 9 19:42:09.047066 kernel: audit: type=1325 audit(1707507729.044:1054): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:42:09.047086 kernel: audit: type=1300 audit(1707507729.044:1054): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffc23f56770 a2=0 a3=7ffc23f5675c items=0 ppid=2172 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:09.044000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffc23f56770 a2=0 a3=7ffc23f5675c items=0 ppid=2172 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:09.050147 kernel: audit: type=1327 audit(1707507729.044:1054): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:42:09.044000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:42:09.044000 audit[2391]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:42:09.044000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffc23f56770 a2=0 a3=31030 items=0 ppid=2172 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:09.059177 kernel: audit: type=1325 audit(1707507729.044:1055): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:42:09.059259 kernel: audit: type=1300 audit(1707507729.044:1055): arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffc23f56770 a2=0 a3=31030 items=0 ppid=2172 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:09.059291 kernel: audit: type=1327 audit(1707507729.044:1055): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:42:09.044000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:42:09.054000 audit[2393]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2393 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:42:09.054000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7fff50ef9010 a2=0 a3=7fff50ef8ffc items=0 ppid=2172 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:09.071290 kernel: audit: type=1325 audit(1707507729.054:1056): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2393 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:42:09.071342 kernel: audit: type=1300 audit(1707507729.054:1056): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7fff50ef9010 a2=0 a3=7fff50ef8ffc items=0 ppid=2172 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:09.071367 kernel: audit: type=1327 audit(1707507729.054:1056): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:42:09.054000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:42:09.064000 audit[2393]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2393 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:42:09.064000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7fff50ef9010 a2=0 a3=31030 items=0 ppid=2172 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:09.064000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:42:09.077627 kernel: audit: type=1325 audit(1707507729.064:1057): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2393 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:42:09.164803 kubelet[2010]: I0209 19:42:09.164766 2010 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:42:09.169720 systemd[1]: Created slice kubepods-besteffort-podc730e823_b48e_495a_98e7_47813f12fb00.slice. Feb 9 19:42:09.207743 kubelet[2010]: I0209 19:42:09.207692 2010 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:42:09.212494 systemd[1]: Created slice kubepods-besteffort-pod0dc9b40f_2bda_4778_8bd6_1646ec6d7522.slice. Feb 9 19:42:09.268408 kubelet[2010]: I0209 19:42:09.268340 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/0dc9b40f-2bda-4778-8bd6-1646ec6d7522-var-run-calico\") pod \"calico-node-n5n72\" (UID: \"0dc9b40f-2bda-4778-8bd6-1646ec6d7522\") " pod="calico-system/calico-node-n5n72" Feb 9 19:42:09.268408 kubelet[2010]: I0209 19:42:09.268406 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/0dc9b40f-2bda-4778-8bd6-1646ec6d7522-node-certs\") pod \"calico-node-n5n72\" (UID: \"0dc9b40f-2bda-4778-8bd6-1646ec6d7522\") " pod="calico-system/calico-node-n5n72" Feb 9 19:42:09.268408 kubelet[2010]: I0209 19:42:09.268427 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/0dc9b40f-2bda-4778-8bd6-1646ec6d7522-flexvol-driver-host\") pod \"calico-node-n5n72\" (UID: \"0dc9b40f-2bda-4778-8bd6-1646ec6d7522\") " pod="calico-system/calico-node-n5n72" Feb 9 19:42:09.268780 kubelet[2010]: I0209 19:42:09.268447 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/c730e823-b48e-495a-98e7-47813f12fb00-typha-certs\") pod \"calico-typha-6ff8d895cc-bmrx7\" (UID: \"c730e823-b48e-495a-98e7-47813f12fb00\") " pod="calico-system/calico-typha-6ff8d895cc-bmrx7" Feb 9 19:42:09.268780 kubelet[2010]: I0209 19:42:09.268465 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/0dc9b40f-2bda-4778-8bd6-1646ec6d7522-var-lib-calico\") pod \"calico-node-n5n72\" (UID: \"0dc9b40f-2bda-4778-8bd6-1646ec6d7522\") " pod="calico-system/calico-node-n5n72" Feb 9 19:42:09.268780 kubelet[2010]: I0209 19:42:09.268482 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vlqxp\" (UniqueName: \"kubernetes.io/projected/0dc9b40f-2bda-4778-8bd6-1646ec6d7522-kube-api-access-vlqxp\") pod \"calico-node-n5n72\" (UID: \"0dc9b40f-2bda-4778-8bd6-1646ec6d7522\") " pod="calico-system/calico-node-n5n72" Feb 9 19:42:09.268780 kubelet[2010]: I0209 19:42:09.268498 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/0dc9b40f-2bda-4778-8bd6-1646ec6d7522-lib-modules\") pod \"calico-node-n5n72\" (UID: \"0dc9b40f-2bda-4778-8bd6-1646ec6d7522\") " pod="calico-system/calico-node-n5n72" Feb 9 19:42:09.268780 kubelet[2010]: I0209 19:42:09.268514 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/0dc9b40f-2bda-4778-8bd6-1646ec6d7522-policysync\") pod \"calico-node-n5n72\" (UID: \"0dc9b40f-2bda-4778-8bd6-1646ec6d7522\") " pod="calico-system/calico-node-n5n72" Feb 9 19:42:09.268921 kubelet[2010]: I0209 19:42:09.268531 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c730e823-b48e-495a-98e7-47813f12fb00-tigera-ca-bundle\") pod \"calico-typha-6ff8d895cc-bmrx7\" (UID: \"c730e823-b48e-495a-98e7-47813f12fb00\") " pod="calico-system/calico-typha-6ff8d895cc-bmrx7" Feb 9 19:42:09.268921 kubelet[2010]: I0209 19:42:09.268550 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gqg8b\" (UniqueName: \"kubernetes.io/projected/c730e823-b48e-495a-98e7-47813f12fb00-kube-api-access-gqg8b\") pod \"calico-typha-6ff8d895cc-bmrx7\" (UID: \"c730e823-b48e-495a-98e7-47813f12fb00\") " pod="calico-system/calico-typha-6ff8d895cc-bmrx7" Feb 9 19:42:09.268921 kubelet[2010]: I0209 19:42:09.268567 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/0dc9b40f-2bda-4778-8bd6-1646ec6d7522-xtables-lock\") pod \"calico-node-n5n72\" (UID: \"0dc9b40f-2bda-4778-8bd6-1646ec6d7522\") " pod="calico-system/calico-node-n5n72" Feb 9 19:42:09.268921 kubelet[2010]: I0209 19:42:09.268583 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/0dc9b40f-2bda-4778-8bd6-1646ec6d7522-cni-bin-dir\") pod \"calico-node-n5n72\" (UID: \"0dc9b40f-2bda-4778-8bd6-1646ec6d7522\") " pod="calico-system/calico-node-n5n72" Feb 9 19:42:09.268921 kubelet[2010]: I0209 19:42:09.268609 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0dc9b40f-2bda-4778-8bd6-1646ec6d7522-tigera-ca-bundle\") pod \"calico-node-n5n72\" (UID: \"0dc9b40f-2bda-4778-8bd6-1646ec6d7522\") " pod="calico-system/calico-node-n5n72" Feb 9 19:42:09.269068 kubelet[2010]: I0209 19:42:09.268629 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/0dc9b40f-2bda-4778-8bd6-1646ec6d7522-cni-net-dir\") pod \"calico-node-n5n72\" (UID: \"0dc9b40f-2bda-4778-8bd6-1646ec6d7522\") " pod="calico-system/calico-node-n5n72" Feb 9 19:42:09.269068 kubelet[2010]: I0209 19:42:09.268660 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/0dc9b40f-2bda-4778-8bd6-1646ec6d7522-cni-log-dir\") pod \"calico-node-n5n72\" (UID: \"0dc9b40f-2bda-4778-8bd6-1646ec6d7522\") " pod="calico-system/calico-node-n5n72" Feb 9 19:42:09.323588 kubelet[2010]: I0209 19:42:09.323448 2010 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:42:09.324710 kubelet[2010]: E0209 19:42:09.323849 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-n2n88" podUID=48e50443-4a64-49dd-8f80-7dc085e7a041 Feb 9 19:42:09.369827 kubelet[2010]: I0209 19:42:09.369769 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/48e50443-4a64-49dd-8f80-7dc085e7a041-socket-dir\") pod \"csi-node-driver-n2n88\" (UID: \"48e50443-4a64-49dd-8f80-7dc085e7a041\") " pod="calico-system/csi-node-driver-n2n88" Feb 9 19:42:09.369827 kubelet[2010]: I0209 19:42:09.369830 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nb7sx\" (UniqueName: \"kubernetes.io/projected/48e50443-4a64-49dd-8f80-7dc085e7a041-kube-api-access-nb7sx\") pod \"csi-node-driver-n2n88\" (UID: \"48e50443-4a64-49dd-8f80-7dc085e7a041\") " pod="calico-system/csi-node-driver-n2n88" Feb 9 19:42:09.370081 kubelet[2010]: I0209 19:42:09.369927 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/48e50443-4a64-49dd-8f80-7dc085e7a041-varrun\") pod \"csi-node-driver-n2n88\" (UID: \"48e50443-4a64-49dd-8f80-7dc085e7a041\") " pod="calico-system/csi-node-driver-n2n88" Feb 9 19:42:09.370081 kubelet[2010]: I0209 19:42:09.369957 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/48e50443-4a64-49dd-8f80-7dc085e7a041-kubelet-dir\") pod \"csi-node-driver-n2n88\" (UID: \"48e50443-4a64-49dd-8f80-7dc085e7a041\") " pod="calico-system/csi-node-driver-n2n88" Feb 9 19:42:09.370081 kubelet[2010]: I0209 19:42:09.369981 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/48e50443-4a64-49dd-8f80-7dc085e7a041-registration-dir\") pod \"csi-node-driver-n2n88\" (UID: \"48e50443-4a64-49dd-8f80-7dc085e7a041\") " pod="calico-system/csi-node-driver-n2n88" Feb 9 19:42:09.371492 kubelet[2010]: E0209 19:42:09.371447 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.371492 kubelet[2010]: W0209 19:42:09.371470 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.371492 kubelet[2010]: E0209 19:42:09.371491 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.371655 kubelet[2010]: E0209 19:42:09.371643 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.371655 kubelet[2010]: W0209 19:42:09.371651 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.371720 kubelet[2010]: E0209 19:42:09.371663 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.371808 kubelet[2010]: E0209 19:42:09.371785 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.371808 kubelet[2010]: W0209 19:42:09.371798 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.371808 kubelet[2010]: E0209 19:42:09.371810 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.371950 kubelet[2010]: E0209 19:42:09.371929 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.371950 kubelet[2010]: W0209 19:42:09.371936 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.371950 kubelet[2010]: E0209 19:42:09.371947 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.372081 kubelet[2010]: E0209 19:42:09.372053 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.372081 kubelet[2010]: W0209 19:42:09.372067 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.372081 kubelet[2010]: E0209 19:42:09.372078 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.372224 kubelet[2010]: E0209 19:42:09.372202 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.372224 kubelet[2010]: W0209 19:42:09.372208 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.372224 kubelet[2010]: E0209 19:42:09.372217 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.372394 kubelet[2010]: E0209 19:42:09.372371 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.372394 kubelet[2010]: W0209 19:42:09.372384 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.372394 kubelet[2010]: E0209 19:42:09.372396 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.372529 kubelet[2010]: E0209 19:42:09.372515 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.372529 kubelet[2010]: W0209 19:42:09.372521 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.372529 kubelet[2010]: E0209 19:42:09.372529 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.372708 kubelet[2010]: E0209 19:42:09.372685 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.372708 kubelet[2010]: W0209 19:42:09.372700 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.372708 kubelet[2010]: E0209 19:42:09.372711 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.372856 kubelet[2010]: E0209 19:42:09.372827 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.372856 kubelet[2010]: W0209 19:42:09.372833 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.372856 kubelet[2010]: E0209 19:42:09.372846 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.373063 kubelet[2010]: E0209 19:42:09.373031 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.373063 kubelet[2010]: W0209 19:42:09.373045 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.373156 kubelet[2010]: E0209 19:42:09.373136 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.373339 kubelet[2010]: E0209 19:42:09.373308 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.373339 kubelet[2010]: W0209 19:42:09.373329 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.373528 kubelet[2010]: E0209 19:42:09.373444 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.373595 kubelet[2010]: E0209 19:42:09.373577 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.373595 kubelet[2010]: W0209 19:42:09.373591 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.373724 kubelet[2010]: E0209 19:42:09.373702 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.373845 kubelet[2010]: E0209 19:42:09.373828 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.373915 kubelet[2010]: W0209 19:42:09.373848 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.373915 kubelet[2010]: E0209 19:42:09.373901 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.374112 kubelet[2010]: E0209 19:42:09.374074 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.374112 kubelet[2010]: W0209 19:42:09.374089 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.374245 kubelet[2010]: E0209 19:42:09.374228 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.374389 kubelet[2010]: E0209 19:42:09.374367 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.374389 kubelet[2010]: W0209 19:42:09.374380 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.374504 kubelet[2010]: E0209 19:42:09.374400 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.374595 kubelet[2010]: E0209 19:42:09.374575 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.374595 kubelet[2010]: W0209 19:42:09.374591 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.374728 kubelet[2010]: E0209 19:42:09.374641 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.374896 kubelet[2010]: E0209 19:42:09.374866 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.374896 kubelet[2010]: W0209 19:42:09.374878 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.374981 kubelet[2010]: E0209 19:42:09.374904 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.375309 kubelet[2010]: E0209 19:42:09.375284 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.375309 kubelet[2010]: W0209 19:42:09.375301 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.375458 kubelet[2010]: E0209 19:42:09.375325 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.375574 kubelet[2010]: E0209 19:42:09.375551 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.375574 kubelet[2010]: W0209 19:42:09.375569 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.375693 kubelet[2010]: E0209 19:42:09.375593 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.378036 kubelet[2010]: E0209 19:42:09.378014 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.378036 kubelet[2010]: W0209 19:42:09.378028 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.378246 kubelet[2010]: E0209 19:42:09.378044 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.378246 kubelet[2010]: E0209 19:42:09.378213 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.378246 kubelet[2010]: W0209 19:42:09.378221 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.378246 kubelet[2010]: E0209 19:42:09.378230 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.378983 kubelet[2010]: E0209 19:42:09.378956 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.378983 kubelet[2010]: W0209 19:42:09.378968 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.378983 kubelet[2010]: E0209 19:42:09.378979 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.470836 kubelet[2010]: E0209 19:42:09.470793 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.470836 kubelet[2010]: W0209 19:42:09.470820 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.470836 kubelet[2010]: E0209 19:42:09.470849 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.471074 kubelet[2010]: E0209 19:42:09.471055 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.471074 kubelet[2010]: W0209 19:42:09.471065 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.471151 kubelet[2010]: E0209 19:42:09.471081 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.471350 kubelet[2010]: E0209 19:42:09.471330 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.471350 kubelet[2010]: W0209 19:42:09.471346 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.471403 kubelet[2010]: E0209 19:42:09.471368 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.471557 kubelet[2010]: E0209 19:42:09.471536 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.471557 kubelet[2010]: W0209 19:42:09.471545 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.471557 kubelet[2010]: E0209 19:42:09.471561 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.471760 kubelet[2010]: E0209 19:42:09.471745 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.471760 kubelet[2010]: W0209 19:42:09.471757 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.471810 kubelet[2010]: E0209 19:42:09.471774 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.471986 kubelet[2010]: E0209 19:42:09.471962 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.471986 kubelet[2010]: W0209 19:42:09.471975 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.472058 kubelet[2010]: E0209 19:42:09.471993 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.472154 kubelet[2010]: E0209 19:42:09.472141 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.472154 kubelet[2010]: W0209 19:42:09.472149 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.472203 kubelet[2010]: E0209 19:42:09.472163 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.472389 kubelet[2010]: E0209 19:42:09.472371 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.472389 kubelet[2010]: W0209 19:42:09.472387 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.472470 kubelet[2010]: E0209 19:42:09.472428 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.472586 kubelet[2010]: E0209 19:42:09.472575 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.472586 kubelet[2010]: W0209 19:42:09.472583 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.472647 kubelet[2010]: E0209 19:42:09.472618 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.472754 kubelet[2010]: E0209 19:42:09.472745 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.472780 kubelet[2010]: W0209 19:42:09.472753 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.472780 kubelet[2010]: E0209 19:42:09.472772 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.472933 kubelet[2010]: E0209 19:42:09.472925 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.472961 kubelet[2010]: W0209 19:42:09.472932 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.472961 kubelet[2010]: E0209 19:42:09.472949 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.473085 kubelet[2010]: E0209 19:42:09.473077 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.473117 kubelet[2010]: W0209 19:42:09.473084 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.473117 kubelet[2010]: E0209 19:42:09.473106 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.473296 kubelet[2010]: E0209 19:42:09.473284 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.473296 kubelet[2010]: W0209 19:42:09.473291 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.473356 kubelet[2010]: E0209 19:42:09.473304 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.473469 kubelet[2010]: E0209 19:42:09.473449 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.473469 kubelet[2010]: W0209 19:42:09.473460 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.473469 kubelet[2010]: E0209 19:42:09.473474 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.473670 kubelet[2010]: E0209 19:42:09.473638 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.473670 kubelet[2010]: W0209 19:42:09.473644 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.473670 kubelet[2010]: E0209 19:42:09.473656 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.473846 kubelet[2010]: E0209 19:42:09.473831 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.473846 kubelet[2010]: W0209 19:42:09.473843 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.473905 kubelet[2010]: E0209 19:42:09.473862 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.474065 kubelet[2010]: E0209 19:42:09.474047 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.474065 kubelet[2010]: W0209 19:42:09.474061 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.474192 kubelet[2010]: E0209 19:42:09.474081 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.474333 kubelet[2010]: E0209 19:42:09.474316 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.474333 kubelet[2010]: W0209 19:42:09.474328 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.474407 kubelet[2010]: E0209 19:42:09.474346 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.474531 kubelet[2010]: E0209 19:42:09.474514 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.474531 kubelet[2010]: W0209 19:42:09.474525 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.474618 kubelet[2010]: E0209 19:42:09.474539 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.474728 kubelet[2010]: E0209 19:42:09.474716 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.474728 kubelet[2010]: W0209 19:42:09.474725 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.474779 kubelet[2010]: E0209 19:42:09.474739 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.474912 kubelet[2010]: E0209 19:42:09.474898 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.474912 kubelet[2010]: W0209 19:42:09.474907 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.474984 kubelet[2010]: E0209 19:42:09.474936 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.475053 kubelet[2010]: E0209 19:42:09.475039 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.475053 kubelet[2010]: W0209 19:42:09.475049 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.475101 kubelet[2010]: E0209 19:42:09.475063 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.475217 kubelet[2010]: E0209 19:42:09.475205 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.475217 kubelet[2010]: W0209 19:42:09.475214 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.475261 kubelet[2010]: E0209 19:42:09.475229 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.475409 kubelet[2010]: E0209 19:42:09.475398 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.475409 kubelet[2010]: W0209 19:42:09.475407 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.475457 kubelet[2010]: E0209 19:42:09.475419 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.475677 kubelet[2010]: E0209 19:42:09.475660 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.475677 kubelet[2010]: W0209 19:42:09.475671 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.475759 kubelet[2010]: E0209 19:42:09.475686 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.475894 kubelet[2010]: E0209 19:42:09.475871 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.475894 kubelet[2010]: W0209 19:42:09.475882 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.475973 kubelet[2010]: E0209 19:42:09.475906 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.476168 kubelet[2010]: E0209 19:42:09.476138 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.476168 kubelet[2010]: W0209 19:42:09.476151 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.476168 kubelet[2010]: E0209 19:42:09.476162 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.494567 kubelet[2010]: E0209 19:42:09.490520 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.494567 kubelet[2010]: W0209 19:42:09.490539 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.494567 kubelet[2010]: E0209 19:42:09.490565 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.494567 kubelet[2010]: E0209 19:42:09.491428 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.494567 kubelet[2010]: W0209 19:42:09.491437 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.494567 kubelet[2010]: E0209 19:42:09.491449 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.501935 kubelet[2010]: E0209 19:42:09.501879 2010 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:42:09.501935 kubelet[2010]: W0209 19:42:09.501915 2010 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:42:09.501935 kubelet[2010]: E0209 19:42:09.501936 2010 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:42:09.515317 kubelet[2010]: E0209 19:42:09.515268 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:42:09.516167 env[1111]: time="2024-02-09T19:42:09.516121036Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-n5n72,Uid:0dc9b40f-2bda-4778-8bd6-1646ec6d7522,Namespace:calico-system,Attempt:0,}" Feb 9 19:42:09.536059 env[1111]: time="2024-02-09T19:42:09.535498140Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:42:09.536059 env[1111]: time="2024-02-09T19:42:09.535556150Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:42:09.536059 env[1111]: time="2024-02-09T19:42:09.535570488Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:42:09.536059 env[1111]: time="2024-02-09T19:42:09.535799041Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/14a83704773244f2c965571a15c440ad4e7f86c962b751541a9ed039eb3cb09b pid=2461 runtime=io.containerd.runc.v2 Feb 9 19:42:09.549215 systemd[1]: Started cri-containerd-14a83704773244f2c965571a15c440ad4e7f86c962b751541a9ed039eb3cb09b.scope. Feb 9 19:42:09.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit: BPF prog-id=121 op=LOAD Feb 9 19:42:09.561000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit[2471]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2461 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:09.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134613833373034373733323434663263393635353731613135633434 Feb 9 19:42:09.561000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit[2471]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2461 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:09.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134613833373034373733323434663263393635353731613135633434 Feb 9 19:42:09.561000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit: BPF prog-id=122 op=LOAD Feb 9 19:42:09.561000 audit[2471]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003be6f0 items=0 ppid=2461 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:09.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134613833373034373733323434663263393635353731613135633434 Feb 9 19:42:09.561000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit: BPF prog-id=123 op=LOAD Feb 9 19:42:09.561000 audit[2471]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003be738 items=0 ppid=2461 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:09.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134613833373034373733323434663263393635353731613135633434 Feb 9 19:42:09.561000 audit: BPF prog-id=123 op=UNLOAD Feb 9 19:42:09.561000 audit: BPF prog-id=122 op=UNLOAD Feb 9 19:42:09.561000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:09.561000 audit: BPF prog-id=124 op=LOAD Feb 9 19:42:09.561000 audit[2471]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003beb48 items=0 ppid=2461 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:09.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134613833373034373733323434663263393635353731613135633434 Feb 9 19:42:09.582299 env[1111]: time="2024-02-09T19:42:09.582182358Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-n5n72,Uid:0dc9b40f-2bda-4778-8bd6-1646ec6d7522,Namespace:calico-system,Attempt:0,} returns sandbox id \"14a83704773244f2c965571a15c440ad4e7f86c962b751541a9ed039eb3cb09b\"" Feb 9 19:42:09.584151 kubelet[2010]: E0209 19:42:09.584084 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:42:09.588234 env[1111]: time="2024-02-09T19:42:09.586556319Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 19:42:09.772432 kubelet[2010]: E0209 19:42:09.772388 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:42:09.773100 env[1111]: time="2024-02-09T19:42:09.773056221Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6ff8d895cc-bmrx7,Uid:c730e823-b48e-495a-98e7-47813f12fb00,Namespace:calico-system,Attempt:0,}" Feb 9 19:42:09.991546 env[1111]: time="2024-02-09T19:42:09.991388074Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:42:09.991748 env[1111]: time="2024-02-09T19:42:09.991451434Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:42:09.991981 env[1111]: time="2024-02-09T19:42:09.991728751Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:42:09.991981 env[1111]: time="2024-02-09T19:42:09.991865079Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fe0a2b5a6ab2b598ec8037992ffc570635524b37c1aab34a638a5fa48d8a9389 pid=2502 runtime=io.containerd.runc.v2 Feb 9 19:42:10.013553 systemd[1]: Started cri-containerd-fe0a2b5a6ab2b598ec8037992ffc570635524b37c1aab34a638a5fa48d8a9389.scope. Feb 9 19:42:10.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.023000 audit: BPF prog-id=125 op=LOAD Feb 9 19:42:10.024000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.024000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2502 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:10.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665306132623561366162326235393865633830333739393266666335 Feb 9 19:42:10.024000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.024000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2502 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:10.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665306132623561366162326235393865633830333739393266666335 Feb 9 19:42:10.024000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.024000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.024000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.024000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.024000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.024000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.024000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.024000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.024000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.024000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.024000 audit: BPF prog-id=126 op=LOAD Feb 9 19:42:10.024000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00039a6f0 items=0 ppid=2502 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:10.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665306132623561366162326235393865633830333739393266666335 Feb 9 19:42:10.024000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.024000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.024000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.024000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.024000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.024000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.024000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.024000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.024000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.024000 audit: BPF prog-id=127 op=LOAD Feb 9 19:42:10.024000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00039a738 items=0 ppid=2502 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:10.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665306132623561366162326235393865633830333739393266666335 Feb 9 19:42:10.024000 audit: BPF prog-id=127 op=UNLOAD Feb 9 19:42:10.024000 audit: BPF prog-id=126 op=UNLOAD Feb 9 19:42:10.024000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.024000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.024000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.024000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.024000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.024000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.024000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.024000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.024000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.024000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:10.024000 audit: BPF prog-id=128 op=LOAD Feb 9 19:42:10.024000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00039ab48 items=0 ppid=2502 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:10.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665306132623561366162326235393865633830333739393266666335 Feb 9 19:42:10.056010 env[1111]: time="2024-02-09T19:42:10.055965580Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6ff8d895cc-bmrx7,Uid:c730e823-b48e-495a-98e7-47813f12fb00,Namespace:calico-system,Attempt:0,} returns sandbox id \"fe0a2b5a6ab2b598ec8037992ffc570635524b37c1aab34a638a5fa48d8a9389\"" Feb 9 19:42:10.057028 kubelet[2010]: E0209 19:42:10.056813 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:42:10.080000 audit[2537]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2537 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:42:10.080000 audit[2537]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffd4582bc60 a2=0 a3=7ffd4582bc4c items=0 ppid=2172 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:10.080000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:42:10.081000 audit[2537]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2537 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:42:10.081000 audit[2537]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffd4582bc60 a2=0 a3=31030 items=0 ppid=2172 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:10.081000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:42:11.356389 kubelet[2010]: E0209 19:42:11.356322 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-n2n88" podUID=48e50443-4a64-49dd-8f80-7dc085e7a041 Feb 9 19:42:12.650003 env[1111]: time="2024-02-09T19:42:12.649940749Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:12.651674 env[1111]: time="2024-02-09T19:42:12.651580367Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:12.653674 env[1111]: time="2024-02-09T19:42:12.653637547Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:12.655661 env[1111]: time="2024-02-09T19:42:12.655617992Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:12.656945 env[1111]: time="2024-02-09T19:42:12.656908939Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 9 19:42:12.658069 env[1111]: time="2024-02-09T19:42:12.658013082Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 9 19:42:12.658962 env[1111]: time="2024-02-09T19:42:12.658895415Z" level=info msg="CreateContainer within sandbox \"14a83704773244f2c965571a15c440ad4e7f86c962b751541a9ed039eb3cb09b\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 19:42:12.673946 env[1111]: time="2024-02-09T19:42:12.673897887Z" level=info msg="CreateContainer within sandbox \"14a83704773244f2c965571a15c440ad4e7f86c962b751541a9ed039eb3cb09b\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"3a9c2b549196c221cac2356835ca6269ac3737a4642bc61e4268abebe168f19c\"" Feb 9 19:42:12.674717 env[1111]: time="2024-02-09T19:42:12.674686441Z" level=info msg="StartContainer for \"3a9c2b549196c221cac2356835ca6269ac3737a4642bc61e4268abebe168f19c\"" Feb 9 19:42:12.693062 systemd[1]: Started cri-containerd-3a9c2b549196c221cac2356835ca6269ac3737a4642bc61e4268abebe168f19c.scope. Feb 9 19:42:12.706000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:12.706000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2461 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:12.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361396332623534393139366332323163616332333536383335636136 Feb 9 19:42:12.706000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:12.706000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:12.706000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:12.706000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:12.706000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:12.706000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:12.706000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:12.706000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:12.706000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:12.706000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:12.706000 audit: BPF prog-id=129 op=LOAD Feb 9 19:42:12.706000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000024220 items=0 ppid=2461 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:12.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361396332623534393139366332323163616332333536383335636136 Feb 9 19:42:12.706000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:12.706000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:12.706000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:12.706000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:12.706000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:12.706000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:12.706000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:12.706000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:12.706000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:12.706000 audit: BPF prog-id=130 op=LOAD Feb 9 19:42:12.706000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000024268 items=0 ppid=2461 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:12.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361396332623534393139366332323163616332333536383335636136 Feb 9 19:42:12.706000 audit: BPF prog-id=130 op=UNLOAD Feb 9 19:42:12.706000 audit: BPF prog-id=129 op=UNLOAD Feb 9 19:42:12.706000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:12.706000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:12.706000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:12.706000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:12.706000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:12.706000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:12.706000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:12.706000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:12.706000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:12.706000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:12.706000 audit: BPF prog-id=131 op=LOAD Feb 9 19:42:12.706000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0000242f8 items=0 ppid=2461 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:12.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361396332623534393139366332323163616332333536383335636136 Feb 9 19:42:12.722518 env[1111]: time="2024-02-09T19:42:12.722468225Z" level=info msg="StartContainer for \"3a9c2b549196c221cac2356835ca6269ac3737a4642bc61e4268abebe168f19c\" returns successfully" Feb 9 19:42:12.730824 systemd[1]: cri-containerd-3a9c2b549196c221cac2356835ca6269ac3737a4642bc61e4268abebe168f19c.scope: Deactivated successfully. Feb 9 19:42:12.734000 audit: BPF prog-id=131 op=UNLOAD Feb 9 19:42:12.747268 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3a9c2b549196c221cac2356835ca6269ac3737a4642bc61e4268abebe168f19c-rootfs.mount: Deactivated successfully. Feb 9 19:42:12.808090 env[1111]: time="2024-02-09T19:42:12.808029883Z" level=info msg="shim disconnected" id=3a9c2b549196c221cac2356835ca6269ac3737a4642bc61e4268abebe168f19c Feb 9 19:42:12.808090 env[1111]: time="2024-02-09T19:42:12.808087332Z" level=warning msg="cleaning up after shim disconnected" id=3a9c2b549196c221cac2356835ca6269ac3737a4642bc61e4268abebe168f19c namespace=k8s.io Feb 9 19:42:12.808090 env[1111]: time="2024-02-09T19:42:12.808097300Z" level=info msg="cleaning up dead shim" Feb 9 19:42:12.815730 env[1111]: time="2024-02-09T19:42:12.815702198Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:42:12Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2584 runtime=io.containerd.runc.v2\n" Feb 9 19:42:13.356433 kubelet[2010]: E0209 19:42:13.356389 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-n2n88" podUID=48e50443-4a64-49dd-8f80-7dc085e7a041 Feb 9 19:42:13.405162 kubelet[2010]: E0209 19:42:13.405141 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:42:14.173026 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3480463537.mount: Deactivated successfully. Feb 9 19:42:15.356889 kubelet[2010]: E0209 19:42:15.356848 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-n2n88" podUID=48e50443-4a64-49dd-8f80-7dc085e7a041 Feb 9 19:42:16.460877 env[1111]: time="2024-02-09T19:42:16.460809365Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:16.576424 env[1111]: time="2024-02-09T19:42:16.576380365Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:16.615065 env[1111]: time="2024-02-09T19:42:16.615026957Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:16.722348 env[1111]: time="2024-02-09T19:42:16.722215984Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:16.723504 env[1111]: time="2024-02-09T19:42:16.723473054Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 9 19:42:16.725075 env[1111]: time="2024-02-09T19:42:16.724865561Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 19:42:16.733448 env[1111]: time="2024-02-09T19:42:16.732638270Z" level=info msg="CreateContainer within sandbox \"fe0a2b5a6ab2b598ec8037992ffc570635524b37c1aab34a638a5fa48d8a9389\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 9 19:42:17.014176 env[1111]: time="2024-02-09T19:42:17.014052280Z" level=info msg="CreateContainer within sandbox \"fe0a2b5a6ab2b598ec8037992ffc570635524b37c1aab34a638a5fa48d8a9389\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"6d81514ceac0e25a0d13a3a16f955908654837ba5da676eedc2268bfa5304031\"" Feb 9 19:42:17.014503 env[1111]: time="2024-02-09T19:42:17.014474630Z" level=info msg="StartContainer for \"6d81514ceac0e25a0d13a3a16f955908654837ba5da676eedc2268bfa5304031\"" Feb 9 19:42:17.028914 systemd[1]: Started cri-containerd-6d81514ceac0e25a0d13a3a16f955908654837ba5da676eedc2268bfa5304031.scope. Feb 9 19:42:17.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.044563 kernel: kauditd_printk_skb: 166 callbacks suppressed Feb 9 19:42:17.044654 kernel: audit: type=1400 audit(1707507737.041:1103): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.044692 kernel: audit: type=1400 audit(1707507737.041:1104): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.049252 kernel: audit: type=1400 audit(1707507737.041:1105): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.049307 kernel: audit: type=1400 audit(1707507737.041:1106): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.053711 kernel: audit: type=1400 audit(1707507737.041:1107): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.053766 kernel: audit: type=1400 audit(1707507737.041:1108): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.057743 kernel: audit: type=1400 audit(1707507737.041:1109): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.057792 kernel: audit: type=1400 audit(1707507737.041:1110): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.061970 kernel: audit: type=1400 audit(1707507737.041:1111): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.062040 kernel: audit: type=1400 audit(1707507737.043:1112): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.043000 audit: BPF prog-id=132 op=LOAD Feb 9 19:42:17.044000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.044000 audit[2610]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2502 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:17.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664383135313463656163306532356130643133613361313666393535 Feb 9 19:42:17.044000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.044000 audit[2610]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2502 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:17.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664383135313463656163306532356130643133613361313666393535 Feb 9 19:42:17.044000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.044000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.044000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.044000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.044000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.044000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.044000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.044000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.044000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.044000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.044000 audit: BPF prog-id=133 op=LOAD Feb 9 19:42:17.044000 audit[2610]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003d2b90 items=0 ppid=2502 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:17.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664383135313463656163306532356130643133613361313666393535 Feb 9 19:42:17.046000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.046000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.046000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.046000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.046000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.046000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.046000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.046000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.046000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.046000 audit: BPF prog-id=134 op=LOAD Feb 9 19:42:17.046000 audit[2610]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003d2bd8 items=0 ppid=2502 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:17.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664383135313463656163306532356130643133613361313666393535 Feb 9 19:42:17.048000 audit: BPF prog-id=134 op=UNLOAD Feb 9 19:42:17.048000 audit: BPF prog-id=133 op=UNLOAD Feb 9 19:42:17.048000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.048000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.048000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.048000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.048000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.048000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.048000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.048000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.048000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.048000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:17.048000 audit: BPF prog-id=135 op=LOAD Feb 9 19:42:17.048000 audit[2610]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003d2fe8 items=0 ppid=2502 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:17.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664383135313463656163306532356130643133613361313666393535 Feb 9 19:42:17.129490 env[1111]: time="2024-02-09T19:42:17.129433448Z" level=info msg="StartContainer for \"6d81514ceac0e25a0d13a3a16f955908654837ba5da676eedc2268bfa5304031\" returns successfully" Feb 9 19:42:17.357408 kubelet[2010]: E0209 19:42:17.357350 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-n2n88" podUID=48e50443-4a64-49dd-8f80-7dc085e7a041 Feb 9 19:42:17.412412 kubelet[2010]: E0209 19:42:17.412245 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:42:17.422102 kubelet[2010]: I0209 19:42:17.422070 2010 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-6ff8d895cc-bmrx7" podStartSLOduration=1.75639262 podCreationTimestamp="2024-02-09 19:42:09 +0000 UTC" firstStartedPulling="2024-02-09 19:42:10.058088688 +0000 UTC m=+20.805567694" lastFinishedPulling="2024-02-09 19:42:16.723733317 +0000 UTC m=+27.471212363" observedRunningTime="2024-02-09 19:42:17.421593549 +0000 UTC m=+28.169072565" watchObservedRunningTime="2024-02-09 19:42:17.422037289 +0000 UTC m=+28.169516295" Feb 9 19:42:17.462000 audit[2643]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=2643 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:42:17.462000 audit[2643]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffc0489c240 a2=0 a3=7ffc0489c22c items=0 ppid=2172 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:17.462000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:42:17.463000 audit[2643]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2643 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:42:17.463000 audit[2643]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffc0489c240 a2=0 a3=7ffc0489c22c items=0 ppid=2172 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:17.463000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:42:18.413834 kubelet[2010]: E0209 19:42:18.413793 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:42:19.359868 kubelet[2010]: E0209 19:42:19.359811 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-n2n88" podUID=48e50443-4a64-49dd-8f80-7dc085e7a041 Feb 9 19:42:19.414676 kubelet[2010]: E0209 19:42:19.414641 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:42:19.430289 systemd[1]: Started sshd@7-10.0.0.29:22-10.0.0.1:36240.service. Feb 9 19:42:19.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.29:22-10.0.0.1:36240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:19.470000 audit[2645]: USER_ACCT pid=2645 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:19.471687 sshd[2645]: Accepted publickey for core from 10.0.0.1 port 36240 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:42:19.471000 audit[2645]: CRED_ACQ pid=2645 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:19.471000 audit[2645]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcadf3d760 a2=3 a3=0 items=0 ppid=1 pid=2645 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:19.471000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:42:19.472925 sshd[2645]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:42:19.477305 systemd-logind[1103]: New session 8 of user core. Feb 9 19:42:19.478357 systemd[1]: Started session-8.scope. Feb 9 19:42:19.482000 audit[2645]: USER_START pid=2645 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:19.484000 audit[2647]: CRED_ACQ pid=2647 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:19.602554 sshd[2645]: pam_unix(sshd:session): session closed for user core Feb 9 19:42:19.602000 audit[2645]: USER_END pid=2645 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:19.602000 audit[2645]: CRED_DISP pid=2645 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:19.604881 systemd[1]: sshd@7-10.0.0.29:22-10.0.0.1:36240.service: Deactivated successfully. Feb 9 19:42:19.605552 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 19:42:19.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.29:22-10.0.0.1:36240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:19.606051 systemd-logind[1103]: Session 8 logged out. Waiting for processes to exit. Feb 9 19:42:19.606753 systemd-logind[1103]: Removed session 8. Feb 9 19:42:21.356471 kubelet[2010]: E0209 19:42:21.356434 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-n2n88" podUID=48e50443-4a64-49dd-8f80-7dc085e7a041 Feb 9 19:42:23.357100 kubelet[2010]: E0209 19:42:23.357061 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-n2n88" podUID=48e50443-4a64-49dd-8f80-7dc085e7a041 Feb 9 19:42:23.383888 env[1111]: time="2024-02-09T19:42:23.383843276Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:23.385618 env[1111]: time="2024-02-09T19:42:23.385579579Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:23.387380 env[1111]: time="2024-02-09T19:42:23.387333756Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:23.389026 env[1111]: time="2024-02-09T19:42:23.388980129Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:23.389551 env[1111]: time="2024-02-09T19:42:23.389519740Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 9 19:42:23.391233 env[1111]: time="2024-02-09T19:42:23.391198685Z" level=info msg="CreateContainer within sandbox \"14a83704773244f2c965571a15c440ad4e7f86c962b751541a9ed039eb3cb09b\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 19:42:23.402512 env[1111]: time="2024-02-09T19:42:23.402474877Z" level=info msg="CreateContainer within sandbox \"14a83704773244f2c965571a15c440ad4e7f86c962b751541a9ed039eb3cb09b\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"dfc92f7f9d1d9c68e1b2562213a531e8a1f1bf356e378ece5f94e1830a520212\"" Feb 9 19:42:23.402945 env[1111]: time="2024-02-09T19:42:23.402916543Z" level=info msg="StartContainer for \"dfc92f7f9d1d9c68e1b2562213a531e8a1f1bf356e378ece5f94e1830a520212\"" Feb 9 19:42:23.425955 systemd[1]: Started cri-containerd-dfc92f7f9d1d9c68e1b2562213a531e8a1f1bf356e378ece5f94e1830a520212.scope. Feb 9 19:42:23.437000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.439908 kernel: kauditd_printk_skb: 64 callbacks suppressed Feb 9 19:42:23.439974 kernel: audit: type=1400 audit(1707507743.437:1132): avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.437000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2461 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:23.444627 kernel: audit: type=1300 audit(1707507743.437:1132): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2461 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:23.444687 kernel: audit: type=1327 audit(1707507743.437:1132): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466633932663766396431643963363865316232353632323133613533 Feb 9 19:42:23.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466633932663766396431643963363865316232353632323133613533 Feb 9 19:42:23.437000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.449410 kernel: audit: type=1400 audit(1707507743.437:1133): avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.449469 kernel: audit: type=1400 audit(1707507743.437:1133): avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.437000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.451366 kernel: audit: type=1400 audit(1707507743.437:1133): avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.437000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.437000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.437000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.457764 kernel: audit: type=1400 audit(1707507743.437:1133): avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.457836 kernel: audit: type=1400 audit(1707507743.437:1133): avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.457868 kernel: audit: type=1400 audit(1707507743.437:1133): avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.437000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.437000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.461707 kernel: audit: type=1400 audit(1707507743.437:1133): avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.437000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.437000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.437000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.437000 audit: BPF prog-id=136 op=LOAD Feb 9 19:42:23.437000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000e9be0 items=0 ppid=2461 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:23.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466633932663766396431643963363865316232353632323133613533 Feb 9 19:42:23.440000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.440000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.440000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.440000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.440000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.440000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.440000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.440000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.440000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.440000 audit: BPF prog-id=137 op=LOAD Feb 9 19:42:23.440000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000e9c28 items=0 ppid=2461 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:23.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466633932663766396431643963363865316232353632323133613533 Feb 9 19:42:23.443000 audit: BPF prog-id=137 op=UNLOAD Feb 9 19:42:23.443000 audit: BPF prog-id=136 op=UNLOAD Feb 9 19:42:23.443000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.443000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.443000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.443000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.443000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.443000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.443000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.443000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.443000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.443000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.443000 audit: BPF prog-id=138 op=LOAD Feb 9 19:42:23.443000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000e9cb8 items=0 ppid=2461 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:23.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466633932663766396431643963363865316232353632323133613533 Feb 9 19:42:23.469544 env[1111]: time="2024-02-09T19:42:23.469506343Z" level=info msg="StartContainer for \"dfc92f7f9d1d9c68e1b2562213a531e8a1f1bf356e378ece5f94e1830a520212\" returns successfully" Feb 9 19:42:24.426567 kubelet[2010]: E0209 19:42:24.426532 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:42:24.505272 env[1111]: time="2024-02-09T19:42:24.505194521Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:42:24.507665 systemd[1]: cri-containerd-dfc92f7f9d1d9c68e1b2562213a531e8a1f1bf356e378ece5f94e1830a520212.scope: Deactivated successfully. Feb 9 19:42:24.512000 audit: BPF prog-id=138 op=UNLOAD Feb 9 19:42:24.524913 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-dfc92f7f9d1d9c68e1b2562213a531e8a1f1bf356e378ece5f94e1830a520212-rootfs.mount: Deactivated successfully. Feb 9 19:42:24.579193 kubelet[2010]: I0209 19:42:24.579159 2010 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 19:42:24.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.29:22-10.0.0.1:36244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:24.606798 systemd[1]: Started sshd@8-10.0.0.29:22-10.0.0.1:36244.service. Feb 9 19:42:24.658880 kubelet[2010]: I0209 19:42:24.658833 2010 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:42:24.663936 systemd[1]: Created slice kubepods-burstable-pod6b291e45_a45d_494e_a1f8_c189616e7a34.slice. Feb 9 19:42:24.677377 kubelet[2010]: I0209 19:42:24.677287 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/6b291e45-a45d-494e-a1f8-c189616e7a34-config-volume\") pod \"coredns-5d78c9869d-jrt4g\" (UID: \"6b291e45-a45d-494e-a1f8-c189616e7a34\") " pod="kube-system/coredns-5d78c9869d-jrt4g" Feb 9 19:42:24.677377 kubelet[2010]: I0209 19:42:24.677327 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mpczb\" (UniqueName: \"kubernetes.io/projected/6b291e45-a45d-494e-a1f8-c189616e7a34-kube-api-access-mpczb\") pod \"coredns-5d78c9869d-jrt4g\" (UID: \"6b291e45-a45d-494e-a1f8-c189616e7a34\") " pod="kube-system/coredns-5d78c9869d-jrt4g" Feb 9 19:42:24.705412 kubelet[2010]: I0209 19:42:24.704931 2010 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:42:24.705412 kubelet[2010]: I0209 19:42:24.705107 2010 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:42:24.711917 systemd[1]: Created slice kubepods-burstable-podbd0dc1b7_cf31_4312_a403_9152a4ac5774.slice. Feb 9 19:42:24.716705 systemd[1]: Created slice kubepods-besteffort-podaa5e91fd_a53f_4816_9d38_2537adca9f7f.slice. Feb 9 19:42:24.717048 env[1111]: time="2024-02-09T19:42:24.716997254Z" level=info msg="shim disconnected" id=dfc92f7f9d1d9c68e1b2562213a531e8a1f1bf356e378ece5f94e1830a520212 Feb 9 19:42:24.717137 env[1111]: time="2024-02-09T19:42:24.717052609Z" level=warning msg="cleaning up after shim disconnected" id=dfc92f7f9d1d9c68e1b2562213a531e8a1f1bf356e378ece5f94e1830a520212 namespace=k8s.io Feb 9 19:42:24.717137 env[1111]: time="2024-02-09T19:42:24.717063349Z" level=info msg="cleaning up dead shim" Feb 9 19:42:24.718000 audit[2714]: USER_ACCT pid=2714 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:24.720029 sshd[2714]: Accepted publickey for core from 10.0.0.1 port 36244 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:42:24.719000 audit[2714]: CRED_ACQ pid=2714 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:24.719000 audit[2714]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed0e2b510 a2=3 a3=0 items=0 ppid=1 pid=2714 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:24.719000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:42:24.722143 sshd[2714]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:42:24.728376 env[1111]: time="2024-02-09T19:42:24.728316225Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:42:24Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2716 runtime=io.containerd.runc.v2\n" Feb 9 19:42:24.731560 systemd-logind[1103]: New session 9 of user core. Feb 9 19:42:24.732732 systemd[1]: Started session-9.scope. Feb 9 19:42:24.737000 audit[2714]: USER_START pid=2714 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:24.738000 audit[2728]: CRED_ACQ pid=2728 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:24.777898 kubelet[2010]: I0209 19:42:24.777866 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/bd0dc1b7-cf31-4312-a403-9152a4ac5774-config-volume\") pod \"coredns-5d78c9869d-x6762\" (UID: \"bd0dc1b7-cf31-4312-a403-9152a4ac5774\") " pod="kube-system/coredns-5d78c9869d-x6762" Feb 9 19:42:24.777898 kubelet[2010]: I0209 19:42:24.777904 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tnjcz\" (UniqueName: \"kubernetes.io/projected/bd0dc1b7-cf31-4312-a403-9152a4ac5774-kube-api-access-tnjcz\") pod \"coredns-5d78c9869d-x6762\" (UID: \"bd0dc1b7-cf31-4312-a403-9152a4ac5774\") " pod="kube-system/coredns-5d78c9869d-x6762" Feb 9 19:42:24.778145 kubelet[2010]: I0209 19:42:24.778036 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tmmgl\" (UniqueName: \"kubernetes.io/projected/aa5e91fd-a53f-4816-9d38-2537adca9f7f-kube-api-access-tmmgl\") pod \"calico-kube-controllers-856df5c4fb-csmth\" (UID: \"aa5e91fd-a53f-4816-9d38-2537adca9f7f\") " pod="calico-system/calico-kube-controllers-856df5c4fb-csmth" Feb 9 19:42:24.778145 kubelet[2010]: I0209 19:42:24.778134 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/aa5e91fd-a53f-4816-9d38-2537adca9f7f-tigera-ca-bundle\") pod \"calico-kube-controllers-856df5c4fb-csmth\" (UID: \"aa5e91fd-a53f-4816-9d38-2537adca9f7f\") " pod="calico-system/calico-kube-controllers-856df5c4fb-csmth" Feb 9 19:42:24.845128 sshd[2714]: pam_unix(sshd:session): session closed for user core Feb 9 19:42:24.844000 audit[2714]: USER_END pid=2714 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:24.844000 audit[2714]: CRED_DISP pid=2714 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:24.847782 systemd[1]: sshd@8-10.0.0.29:22-10.0.0.1:36244.service: Deactivated successfully. Feb 9 19:42:24.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.29:22-10.0.0.1:36244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:24.848713 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 19:42:24.849621 systemd-logind[1103]: Session 9 logged out. Waiting for processes to exit. Feb 9 19:42:24.850443 systemd-logind[1103]: Removed session 9. Feb 9 19:42:24.966052 kubelet[2010]: E0209 19:42:24.965919 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:42:24.966641 env[1111]: time="2024-02-09T19:42:24.966579306Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-jrt4g,Uid:6b291e45-a45d-494e-a1f8-c189616e7a34,Namespace:kube-system,Attempt:0,}" Feb 9 19:42:25.014562 kubelet[2010]: E0209 19:42:25.014524 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:42:25.016392 env[1111]: time="2024-02-09T19:42:25.016349763Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-x6762,Uid:bd0dc1b7-cf31-4312-a403-9152a4ac5774,Namespace:kube-system,Attempt:0,}" Feb 9 19:42:25.023121 env[1111]: time="2024-02-09T19:42:25.023084064Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-856df5c4fb-csmth,Uid:aa5e91fd-a53f-4816-9d38-2537adca9f7f,Namespace:calico-system,Attempt:0,}" Feb 9 19:42:25.027310 env[1111]: time="2024-02-09T19:42:25.027218208Z" level=error msg="Failed to destroy network for sandbox \"8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:42:25.027681 env[1111]: time="2024-02-09T19:42:25.027642240Z" level=error msg="encountered an error cleaning up failed sandbox \"8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:42:25.027912 env[1111]: time="2024-02-09T19:42:25.027880291Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-jrt4g,Uid:6b291e45-a45d-494e-a1f8-c189616e7a34,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:42:25.028765 kubelet[2010]: E0209 19:42:25.028363 2010 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:42:25.028765 kubelet[2010]: E0209 19:42:25.028428 2010 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-jrt4g" Feb 9 19:42:25.028765 kubelet[2010]: E0209 19:42:25.028455 2010 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-jrt4g" Feb 9 19:42:25.028883 kubelet[2010]: E0209 19:42:25.028515 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-jrt4g_kube-system(6b291e45-a45d-494e-a1f8-c189616e7a34)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-jrt4g_kube-system(6b291e45-a45d-494e-a1f8-c189616e7a34)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-jrt4g" podUID=6b291e45-a45d-494e-a1f8-c189616e7a34 Feb 9 19:42:25.070774 env[1111]: time="2024-02-09T19:42:25.070703724Z" level=error msg="Failed to destroy network for sandbox \"86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:42:25.071197 env[1111]: time="2024-02-09T19:42:25.071135291Z" level=error msg="encountered an error cleaning up failed sandbox \"86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:42:25.071257 env[1111]: time="2024-02-09T19:42:25.071231392Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-x6762,Uid:bd0dc1b7-cf31-4312-a403-9152a4ac5774,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:42:25.071509 kubelet[2010]: E0209 19:42:25.071487 2010 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:42:25.071588 kubelet[2010]: E0209 19:42:25.071545 2010 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-x6762" Feb 9 19:42:25.071588 kubelet[2010]: E0209 19:42:25.071572 2010 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-x6762" Feb 9 19:42:25.071721 kubelet[2010]: E0209 19:42:25.071657 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-x6762_kube-system(bd0dc1b7-cf31-4312-a403-9152a4ac5774)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-x6762_kube-system(bd0dc1b7-cf31-4312-a403-9152a4ac5774)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-x6762" podUID=bd0dc1b7-cf31-4312-a403-9152a4ac5774 Feb 9 19:42:25.086723 env[1111]: time="2024-02-09T19:42:25.086628519Z" level=error msg="Failed to destroy network for sandbox \"fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:42:25.087079 env[1111]: time="2024-02-09T19:42:25.087043253Z" level=error msg="encountered an error cleaning up failed sandbox \"fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:42:25.087126 env[1111]: time="2024-02-09T19:42:25.087102495Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-856df5c4fb-csmth,Uid:aa5e91fd-a53f-4816-9d38-2537adca9f7f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:42:25.087405 kubelet[2010]: E0209 19:42:25.087372 2010 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:42:25.087480 kubelet[2010]: E0209 19:42:25.087428 2010 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-856df5c4fb-csmth" Feb 9 19:42:25.087480 kubelet[2010]: E0209 19:42:25.087449 2010 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-856df5c4fb-csmth" Feb 9 19:42:25.087534 kubelet[2010]: E0209 19:42:25.087515 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-856df5c4fb-csmth_calico-system(aa5e91fd-a53f-4816-9d38-2537adca9f7f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-856df5c4fb-csmth_calico-system(aa5e91fd-a53f-4816-9d38-2537adca9f7f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-856df5c4fb-csmth" podUID=aa5e91fd-a53f-4816-9d38-2537adca9f7f Feb 9 19:42:25.362510 systemd[1]: Created slice kubepods-besteffort-pod48e50443_4a64_49dd_8f80_7dc085e7a041.slice. Feb 9 19:42:25.364733 env[1111]: time="2024-02-09T19:42:25.364695451Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-n2n88,Uid:48e50443-4a64-49dd-8f80-7dc085e7a041,Namespace:calico-system,Attempt:0,}" Feb 9 19:42:25.414985 env[1111]: time="2024-02-09T19:42:25.414912683Z" level=error msg="Failed to destroy network for sandbox \"6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:42:25.415280 env[1111]: time="2024-02-09T19:42:25.415250982Z" level=error msg="encountered an error cleaning up failed sandbox \"6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:42:25.415324 env[1111]: time="2024-02-09T19:42:25.415302260Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-n2n88,Uid:48e50443-4a64-49dd-8f80-7dc085e7a041,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:42:25.415565 kubelet[2010]: E0209 19:42:25.415539 2010 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:42:25.415654 kubelet[2010]: E0209 19:42:25.415593 2010 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-n2n88" Feb 9 19:42:25.415654 kubelet[2010]: E0209 19:42:25.415635 2010 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-n2n88" Feb 9 19:42:25.415738 kubelet[2010]: E0209 19:42:25.415700 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-n2n88_calico-system(48e50443-4a64-49dd-8f80-7dc085e7a041)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-n2n88_calico-system(48e50443-4a64-49dd-8f80-7dc085e7a041)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-n2n88" podUID=48e50443-4a64-49dd-8f80-7dc085e7a041 Feb 9 19:42:25.428713 kubelet[2010]: I0209 19:42:25.428693 2010 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" Feb 9 19:42:25.429239 env[1111]: time="2024-02-09T19:42:25.429174424Z" level=info msg="StopPodSandbox for \"6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a\"" Feb 9 19:42:25.431768 kubelet[2010]: E0209 19:42:25.431091 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:42:25.433170 env[1111]: time="2024-02-09T19:42:25.433133838Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 19:42:25.434670 kubelet[2010]: I0209 19:42:25.434651 2010 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" Feb 9 19:42:25.435216 env[1111]: time="2024-02-09T19:42:25.435163416Z" level=info msg="StopPodSandbox for \"fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e\"" Feb 9 19:42:25.435556 kubelet[2010]: I0209 19:42:25.435530 2010 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" Feb 9 19:42:25.436129 env[1111]: time="2024-02-09T19:42:25.436107059Z" level=info msg="StopPodSandbox for \"8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32\"" Feb 9 19:42:25.436854 kubelet[2010]: I0209 19:42:25.436804 2010 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" Feb 9 19:42:25.437372 env[1111]: time="2024-02-09T19:42:25.437234110Z" level=info msg="StopPodSandbox for \"86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b\"" Feb 9 19:42:25.471376 env[1111]: time="2024-02-09T19:42:25.471305840Z" level=error msg="StopPodSandbox for \"fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e\" failed" error="failed to destroy network for sandbox \"fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:42:25.471712 kubelet[2010]: E0209 19:42:25.471676 2010 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" Feb 9 19:42:25.471854 kubelet[2010]: E0209 19:42:25.471762 2010 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e} Feb 9 19:42:25.471854 kubelet[2010]: E0209 19:42:25.471794 2010 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"aa5e91fd-a53f-4816-9d38-2537adca9f7f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:42:25.471854 kubelet[2010]: E0209 19:42:25.471824 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"aa5e91fd-a53f-4816-9d38-2537adca9f7f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-856df5c4fb-csmth" podUID=aa5e91fd-a53f-4816-9d38-2537adca9f7f Feb 9 19:42:25.479021 env[1111]: time="2024-02-09T19:42:25.478956643Z" level=error msg="StopPodSandbox for \"6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a\" failed" error="failed to destroy network for sandbox \"6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:42:25.479362 kubelet[2010]: E0209 19:42:25.479342 2010 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" Feb 9 19:42:25.479454 kubelet[2010]: E0209 19:42:25.479368 2010 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a} Feb 9 19:42:25.479454 kubelet[2010]: E0209 19:42:25.479396 2010 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"48e50443-4a64-49dd-8f80-7dc085e7a041\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:42:25.479454 kubelet[2010]: E0209 19:42:25.479425 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"48e50443-4a64-49dd-8f80-7dc085e7a041\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-n2n88" podUID=48e50443-4a64-49dd-8f80-7dc085e7a041 Feb 9 19:42:25.483827 env[1111]: time="2024-02-09T19:42:25.483752719Z" level=error msg="StopPodSandbox for \"8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32\" failed" error="failed to destroy network for sandbox \"8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:42:25.484198 kubelet[2010]: E0209 19:42:25.484161 2010 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" Feb 9 19:42:25.484301 kubelet[2010]: E0209 19:42:25.484203 2010 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32} Feb 9 19:42:25.484301 kubelet[2010]: E0209 19:42:25.484241 2010 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6b291e45-a45d-494e-a1f8-c189616e7a34\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:42:25.484301 kubelet[2010]: E0209 19:42:25.484273 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6b291e45-a45d-494e-a1f8-c189616e7a34\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-jrt4g" podUID=6b291e45-a45d-494e-a1f8-c189616e7a34 Feb 9 19:42:25.484456 env[1111]: time="2024-02-09T19:42:25.484362833Z" level=error msg="StopPodSandbox for \"86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b\" failed" error="failed to destroy network for sandbox \"86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:42:25.484567 kubelet[2010]: E0209 19:42:25.484546 2010 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" Feb 9 19:42:25.484636 kubelet[2010]: E0209 19:42:25.484571 2010 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b} Feb 9 19:42:25.484636 kubelet[2010]: E0209 19:42:25.484608 2010 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bd0dc1b7-cf31-4312-a403-9152a4ac5774\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:42:25.484861 kubelet[2010]: E0209 19:42:25.484638 2010 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bd0dc1b7-cf31-4312-a403-9152a4ac5774\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-x6762" podUID=bd0dc1b7-cf31-4312-a403-9152a4ac5774 Feb 9 19:42:25.526374 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32-shm.mount: Deactivated successfully. Feb 9 19:42:29.853719 kernel: kauditd_printk_skb: 45 callbacks suppressed Feb 9 19:42:29.853845 kernel: audit: type=1130 audit(1707507749.848:1148): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.29:22-10.0.0.1:33544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:29.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.29:22-10.0.0.1:33544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:29.849870 systemd[1]: Started sshd@9-10.0.0.29:22-10.0.0.1:33544.service. Feb 9 19:42:29.891000 audit[2987]: USER_ACCT pid=2987 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:29.903183 kernel: audit: type=1101 audit(1707507749.891:1149): pid=2987 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:29.903295 kernel: audit: type=1103 audit(1707507749.895:1150): pid=2987 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:29.903377 kernel: audit: type=1006 audit(1707507749.895:1151): pid=2987 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 9 19:42:29.895000 audit[2987]: CRED_ACQ pid=2987 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:29.903546 sshd[2987]: Accepted publickey for core from 10.0.0.1 port 33544 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:42:29.902508 systemd-logind[1103]: New session 10 of user core. Feb 9 19:42:29.897170 sshd[2987]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:42:29.903095 systemd[1]: Started session-10.scope. Feb 9 19:42:29.909133 kernel: audit: type=1300 audit(1707507749.895:1151): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3c768cc0 a2=3 a3=0 items=0 ppid=1 pid=2987 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:29.909185 kernel: audit: type=1327 audit(1707507749.895:1151): proctitle=737368643A20636F7265205B707269765D Feb 9 19:42:29.895000 audit[2987]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3c768cc0 a2=3 a3=0 items=0 ppid=1 pid=2987 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:29.895000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:42:29.909000 audit[2987]: USER_START pid=2987 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:29.917643 kernel: audit: type=1105 audit(1707507749.909:1152): pid=2987 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:29.917795 kernel: audit: type=1103 audit(1707507749.912:1153): pid=2989 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:29.912000 audit[2989]: CRED_ACQ pid=2989 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:30.029228 sshd[2987]: pam_unix(sshd:session): session closed for user core Feb 9 19:42:30.028000 audit[2987]: USER_END pid=2987 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:30.032137 systemd[1]: sshd@9-10.0.0.29:22-10.0.0.1:33544.service: Deactivated successfully. Feb 9 19:42:30.032831 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 19:42:30.029000 audit[2987]: CRED_DISP pid=2987 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:30.033430 systemd-logind[1103]: Session 10 logged out. Waiting for processes to exit. Feb 9 19:42:30.034294 systemd-logind[1103]: Removed session 10. Feb 9 19:42:30.035847 kernel: audit: type=1106 audit(1707507750.028:1154): pid=2987 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:30.035927 kernel: audit: type=1104 audit(1707507750.029:1155): pid=2987 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:30.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.29:22-10.0.0.1:33544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:32.707143 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1936673543.mount: Deactivated successfully. Feb 9 19:42:34.625086 env[1111]: time="2024-02-09T19:42:34.625025728Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:34.626919 env[1111]: time="2024-02-09T19:42:34.626880891Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:34.628408 env[1111]: time="2024-02-09T19:42:34.628367248Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:34.630206 env[1111]: time="2024-02-09T19:42:34.630172789Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:34.630672 env[1111]: time="2024-02-09T19:42:34.630632166Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 9 19:42:34.642590 env[1111]: time="2024-02-09T19:42:34.642534636Z" level=info msg="CreateContainer within sandbox \"14a83704773244f2c965571a15c440ad4e7f86c962b751541a9ed039eb3cb09b\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 19:42:34.657026 env[1111]: time="2024-02-09T19:42:34.656976812Z" level=info msg="CreateContainer within sandbox \"14a83704773244f2c965571a15c440ad4e7f86c962b751541a9ed039eb3cb09b\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"816a8ca30cbc26e9bcc71eb0dd71a14857f24f333e8c1d6229f7d22dc9c291fa\"" Feb 9 19:42:34.657563 env[1111]: time="2024-02-09T19:42:34.657535035Z" level=info msg="StartContainer for \"816a8ca30cbc26e9bcc71eb0dd71a14857f24f333e8c1d6229f7d22dc9c291fa\"" Feb 9 19:42:34.674566 systemd[1]: Started cri-containerd-816a8ca30cbc26e9bcc71eb0dd71a14857f24f333e8c1d6229f7d22dc9c291fa.scope. Feb 9 19:42:34.691000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:34.691000 audit[3012]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2461 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:34.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831366138636133306362633236653962636337316562306464373161 Feb 9 19:42:34.692000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:34.692000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:34.692000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:34.692000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:34.692000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:34.692000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:34.692000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:34.692000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:34.692000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:34.692000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:34.692000 audit: BPF prog-id=139 op=LOAD Feb 9 19:42:34.692000 audit[3012]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c00026fc70 items=0 ppid=2461 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:34.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831366138636133306362633236653962636337316562306464373161 Feb 9 19:42:34.692000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:34.692000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:34.692000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:34.692000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:34.692000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:34.692000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:34.692000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:34.692000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:34.692000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:34.692000 audit: BPF prog-id=140 op=LOAD Feb 9 19:42:34.692000 audit[3012]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c00026fcb8 items=0 ppid=2461 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:34.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831366138636133306362633236653962636337316562306464373161 Feb 9 19:42:34.692000 audit: BPF prog-id=140 op=UNLOAD Feb 9 19:42:34.692000 audit: BPF prog-id=139 op=UNLOAD Feb 9 19:42:34.692000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:34.692000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:34.692000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:34.692000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:34.692000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:34.692000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:34.692000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:34.692000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:34.692000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:34.692000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:34.692000 audit: BPF prog-id=141 op=LOAD Feb 9 19:42:34.692000 audit[3012]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c00026fd48 items=0 ppid=2461 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:34.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831366138636133306362633236653962636337316562306464373161 Feb 9 19:42:34.708280 env[1111]: time="2024-02-09T19:42:34.708220430Z" level=info msg="StartContainer for \"816a8ca30cbc26e9bcc71eb0dd71a14857f24f333e8c1d6229f7d22dc9c291fa\" returns successfully" Feb 9 19:42:34.770645 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 19:42:34.770795 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 19:42:35.033870 systemd[1]: Started sshd@10-10.0.0.29:22-10.0.0.1:33550.service. Feb 9 19:42:35.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.29:22-10.0.0.1:33550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:35.034750 kernel: kauditd_printk_skb: 44 callbacks suppressed Feb 9 19:42:35.034832 kernel: audit: type=1130 audit(1707507755.032:1163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.29:22-10.0.0.1:33550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:35.072000 audit[3073]: USER_ACCT pid=3073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:35.074721 sshd[3073]: Accepted publickey for core from 10.0.0.1 port 33550 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:42:35.075000 audit[3073]: CRED_ACQ pid=3073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:35.077202 sshd[3073]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:42:35.079661 kernel: audit: type=1101 audit(1707507755.072:1164): pid=3073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:35.079720 kernel: audit: type=1103 audit(1707507755.075:1165): pid=3073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:35.079763 kernel: audit: type=1006 audit(1707507755.075:1166): pid=3073 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 9 19:42:35.081397 kernel: audit: type=1300 audit(1707507755.075:1166): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5820a570 a2=3 a3=0 items=0 ppid=1 pid=3073 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:35.075000 audit[3073]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5820a570 a2=3 a3=0 items=0 ppid=1 pid=3073 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:35.081092 systemd-logind[1103]: New session 11 of user core. Feb 9 19:42:35.081962 systemd[1]: Started session-11.scope. Feb 9 19:42:35.083939 kernel: audit: type=1327 audit(1707507755.075:1166): proctitle=737368643A20636F7265205B707269765D Feb 9 19:42:35.075000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:42:35.085000 audit[3073]: USER_START pid=3073 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:35.085000 audit[3075]: CRED_ACQ pid=3075 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:35.093160 kernel: audit: type=1105 audit(1707507755.085:1167): pid=3073 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:35.093211 kernel: audit: type=1103 audit(1707507755.085:1168): pid=3075 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:35.191749 sshd[3073]: pam_unix(sshd:session): session closed for user core Feb 9 19:42:35.191000 audit[3073]: USER_END pid=3073 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:35.191000 audit[3073]: CRED_DISP pid=3073 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:35.195431 systemd[1]: sshd@10-10.0.0.29:22-10.0.0.1:33550.service: Deactivated successfully. Feb 9 19:42:35.196084 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 19:42:35.198238 kernel: audit: type=1106 audit(1707507755.191:1169): pid=3073 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:35.198308 kernel: audit: type=1104 audit(1707507755.191:1170): pid=3073 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:35.191000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.29:22-10.0.0.1:33550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:35.198784 systemd[1]: Started sshd@11-10.0.0.29:22-10.0.0.1:33566.service. Feb 9 19:42:35.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.29:22-10.0.0.1:33566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:35.199182 systemd-logind[1103]: Session 11 logged out. Waiting for processes to exit. Feb 9 19:42:35.200128 systemd-logind[1103]: Removed session 11. Feb 9 19:42:35.234000 audit[3087]: USER_ACCT pid=3087 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:35.236235 sshd[3087]: Accepted publickey for core from 10.0.0.1 port 33566 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:42:35.235000 audit[3087]: CRED_ACQ pid=3087 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:35.235000 audit[3087]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd1b47110 a2=3 a3=0 items=0 ppid=1 pid=3087 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:35.235000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:42:35.237454 sshd[3087]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:42:35.240967 systemd-logind[1103]: New session 12 of user core. Feb 9 19:42:35.241767 systemd[1]: Started session-12.scope. Feb 9 19:42:35.243000 audit[3087]: USER_START pid=3087 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:35.244000 audit[3089]: CRED_ACQ pid=3089 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:35.456519 kubelet[2010]: E0209 19:42:35.456478 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:42:35.472974 kubelet[2010]: I0209 19:42:35.471464 2010 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-n5n72" podStartSLOduration=1.425757608 podCreationTimestamp="2024-02-09 19:42:09 +0000 UTC" firstStartedPulling="2024-02-09 19:42:09.585320794 +0000 UTC m=+20.332799810" lastFinishedPulling="2024-02-09 19:42:34.630978871 +0000 UTC m=+45.378457897" observedRunningTime="2024-02-09 19:42:35.471030718 +0000 UTC m=+46.218509754" watchObservedRunningTime="2024-02-09 19:42:35.471415695 +0000 UTC m=+46.218894731" Feb 9 19:42:35.577869 sshd[3087]: pam_unix(sshd:session): session closed for user core Feb 9 19:42:35.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.29:22-10.0.0.1:33570 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:35.581797 systemd[1]: Started sshd@12-10.0.0.29:22-10.0.0.1:33570.service. Feb 9 19:42:35.581000 audit[3087]: USER_END pid=3087 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:35.581000 audit[3087]: CRED_DISP pid=3087 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:35.583000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.29:22-10.0.0.1:33566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:35.585290 systemd[1]: sshd@11-10.0.0.29:22-10.0.0.1:33566.service: Deactivated successfully. Feb 9 19:42:35.586388 systemd[1]: session-12.scope: Deactivated successfully. Feb 9 19:42:35.588940 systemd-logind[1103]: Session 12 logged out. Waiting for processes to exit. Feb 9 19:42:35.591047 systemd-logind[1103]: Removed session 12. Feb 9 19:42:35.625000 audit[3119]: USER_ACCT pid=3119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:35.627485 sshd[3119]: Accepted publickey for core from 10.0.0.1 port 33570 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:42:35.626000 audit[3119]: CRED_ACQ pid=3119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:35.626000 audit[3119]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5a6853d0 a2=3 a3=0 items=0 ppid=1 pid=3119 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:35.626000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:42:35.628645 sshd[3119]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:42:35.632155 systemd-logind[1103]: New session 13 of user core. Feb 9 19:42:35.633059 systemd[1]: Started session-13.scope. Feb 9 19:42:35.636000 audit[3119]: USER_START pid=3119 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:35.637000 audit[3122]: CRED_ACQ pid=3122 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:35.748850 sshd[3119]: pam_unix(sshd:session): session closed for user core Feb 9 19:42:35.748000 audit[3119]: USER_END pid=3119 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:35.748000 audit[3119]: CRED_DISP pid=3119 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:35.751578 systemd[1]: sshd@12-10.0.0.29:22-10.0.0.1:33570.service: Deactivated successfully. Feb 9 19:42:35.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.29:22-10.0.0.1:33570 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:35.752313 systemd[1]: session-13.scope: Deactivated successfully. Feb 9 19:42:35.753206 systemd-logind[1103]: Session 13 logged out. Waiting for processes to exit. Feb 9 19:42:35.754014 systemd-logind[1103]: Removed session 13. Feb 9 19:42:36.003000 audit[3166]: AVC avc: denied { write } for pid=3166 comm="tee" name="fd" dev="proc" ino=23542 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:42:36.003000 audit[3166]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe429dd98f a2=241 a3=1b6 items=1 ppid=3140 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:36.003000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 19:42:36.003000 audit: PATH item=0 name="/dev/fd/63" inode=25604 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:36.003000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:42:36.006000 audit[3169]: AVC avc: denied { write } for pid=3169 comm="tee" name="fd" dev="proc" ino=25607 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:42:36.006000 audit[3169]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd05ee897f a2=241 a3=1b6 items=1 ppid=3146 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:36.006000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 19:42:36.006000 audit: PATH item=0 name="/dev/fd/63" inode=24401 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:36.006000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:42:36.012000 audit[3182]: AVC avc: denied { write } for pid=3182 comm="tee" name="fd" dev="proc" ino=25615 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:42:36.012000 audit[3182]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdd4d5a990 a2=241 a3=1b6 items=1 ppid=3141 pid=3182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:36.012000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 19:42:36.012000 audit: PATH item=0 name="/dev/fd/63" inode=23546 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:36.012000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:42:36.014000 audit[3185]: AVC avc: denied { write } for pid=3185 comm="tee" name="fd" dev="proc" ino=25620 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:42:36.014000 audit[3185]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff51b5b98f a2=241 a3=1b6 items=1 ppid=3154 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:36.014000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 19:42:36.014000 audit: PATH item=0 name="/dev/fd/63" inode=24404 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:36.014000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:42:36.023000 audit[3207]: AVC avc: denied { write } for pid=3207 comm="tee" name="fd" dev="proc" ino=26628 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:42:36.023000 audit[3207]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee2b6c980 a2=241 a3=1b6 items=1 ppid=3142 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:36.023000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 19:42:36.023000 audit: PATH item=0 name="/dev/fd/63" inode=25619 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:36.023000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:42:36.024000 audit[3219]: AVC avc: denied { write } for pid=3219 comm="tee" name="fd" dev="proc" ino=24791 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:42:36.024000 audit[3219]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc9338298f a2=241 a3=1b6 items=1 ppid=3144 pid=3219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:36.024000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 19:42:36.024000 audit: PATH item=0 name="/dev/fd/63" inode=26625 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:36.024000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:42:36.042000 audit[3211]: AVC avc: denied { write } for pid=3211 comm="tee" name="fd" dev="proc" ino=24420 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:42:36.042000 audit[3211]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffec2305991 a2=241 a3=1b6 items=1 ppid=3150 pid=3211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:36.042000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 19:42:36.042000 audit: PATH item=0 name="/dev/fd/63" inode=24411 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:36.042000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:42:36.222000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.222000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.222000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.222000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.222000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.222000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.222000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.222000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.222000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.222000 audit: BPF prog-id=142 op=LOAD Feb 9 19:42:36.222000 audit[3285]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc7c70f660 a2=70 a3=7fef521b4000 items=0 ppid=3151 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:36.222000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:42:36.223000 audit: BPF prog-id=142 op=UNLOAD Feb 9 19:42:36.223000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.223000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.223000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.223000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.223000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.223000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.223000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.223000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.223000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.223000 audit: BPF prog-id=143 op=LOAD Feb 9 19:42:36.223000 audit[3285]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc7c70f660 a2=70 a3=6e items=0 ppid=3151 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:36.223000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:42:36.224000 audit: BPF prog-id=143 op=UNLOAD Feb 9 19:42:36.224000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.224000 audit[3285]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc7c70f610 a2=70 a3=7ffc7c70f660 items=0 ppid=3151 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:36.224000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:42:36.224000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.224000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.224000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.224000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.224000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.224000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.224000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.224000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.224000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.224000 audit: BPF prog-id=144 op=LOAD Feb 9 19:42:36.224000 audit[3285]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffc7c70f5f0 a2=70 a3=7ffc7c70f660 items=0 ppid=3151 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:36.224000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:42:36.225000 audit: BPF prog-id=144 op=UNLOAD Feb 9 19:42:36.225000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.225000 audit[3285]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc7c70f6d0 a2=70 a3=0 items=0 ppid=3151 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:36.225000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:42:36.225000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.225000 audit[3285]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc7c70f6c0 a2=70 a3=0 items=0 ppid=3151 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:36.225000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:42:36.225000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.225000 audit[3285]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffc7c70f700 a2=70 a3=0 items=0 ppid=3151 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:36.225000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:42:36.226000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.226000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.226000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.226000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.226000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.226000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.226000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.226000 audit[3285]: AVC avc: denied { perfmon } for pid=3285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.226000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.226000 audit[3285]: AVC avc: denied { bpf } for pid=3285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.226000 audit: BPF prog-id=145 op=LOAD Feb 9 19:42:36.226000 audit[3285]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffc7c70f620 a2=70 a3=ffffffff items=0 ppid=3151 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:36.226000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:42:36.229000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.229000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff8c39c8d0 a2=70 a3=208 items=0 ppid=3151 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:36.229000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:42:36.230000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:36.230000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff8c39c7a0 a2=70 a3=3 items=0 ppid=3151 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:36.230000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:42:36.237000 audit: BPF prog-id=145 op=UNLOAD Feb 9 19:42:36.274000 audit[3314]: NETFILTER_CFG table=mangle:97 family=2 entries=19 op=nft_register_chain pid=3314 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:42:36.274000 audit[3314]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffe75064d00 a2=0 a3=7ffe75064cec items=0 ppid=3151 pid=3314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:36.274000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:42:36.279000 audit[3317]: NETFILTER_CFG table=raw:98 family=2 entries=19 op=nft_register_chain pid=3317 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:42:36.279000 audit[3317]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffc910d1020 a2=0 a3=7ffc910d100c items=0 ppid=3151 pid=3317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:36.279000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:42:36.280000 audit[3315]: NETFILTER_CFG table=nat:99 family=2 entries=16 op=nft_register_chain pid=3315 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:42:36.280000 audit[3315]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffe7c871020 a2=0 a3=55cf92a14000 items=0 ppid=3151 pid=3315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:36.280000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:42:36.282000 audit[3316]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=3316 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:42:36.282000 audit[3316]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffea0722250 a2=0 a3=55696d242000 items=0 ppid=3151 pid=3316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:36.282000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:42:36.357368 env[1111]: time="2024-02-09T19:42:36.357309691Z" level=info msg="StopPodSandbox for \"6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a\"" Feb 9 19:42:36.457992 env[1111]: 2024-02-09 19:42:36.402 [INFO][3339] k8s.go 578: Cleaning up netns ContainerID="6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" Feb 9 19:42:36.457992 env[1111]: 2024-02-09 19:42:36.402 [INFO][3339] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" iface="eth0" netns="/var/run/netns/cni-8a0685e8-b36b-1880-c05f-5e922a58a75d" Feb 9 19:42:36.457992 env[1111]: 2024-02-09 19:42:36.402 [INFO][3339] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" iface="eth0" netns="/var/run/netns/cni-8a0685e8-b36b-1880-c05f-5e922a58a75d" Feb 9 19:42:36.457992 env[1111]: 2024-02-09 19:42:36.403 [INFO][3339] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" iface="eth0" netns="/var/run/netns/cni-8a0685e8-b36b-1880-c05f-5e922a58a75d" Feb 9 19:42:36.457992 env[1111]: 2024-02-09 19:42:36.403 [INFO][3339] k8s.go 585: Releasing IP address(es) ContainerID="6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" Feb 9 19:42:36.457992 env[1111]: 2024-02-09 19:42:36.403 [INFO][3339] utils.go 188: Calico CNI releasing IP address ContainerID="6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" Feb 9 19:42:36.457992 env[1111]: 2024-02-09 19:42:36.444 [INFO][3347] ipam_plugin.go 415: Releasing address using handleID ContainerID="6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" HandleID="k8s-pod-network.6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" Workload="localhost-k8s-csi--node--driver--n2n88-eth0" Feb 9 19:42:36.457992 env[1111]: 2024-02-09 19:42:36.444 [INFO][3347] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:42:36.457992 env[1111]: 2024-02-09 19:42:36.444 [INFO][3347] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:42:36.457992 env[1111]: 2024-02-09 19:42:36.453 [WARNING][3347] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" HandleID="k8s-pod-network.6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" Workload="localhost-k8s-csi--node--driver--n2n88-eth0" Feb 9 19:42:36.457992 env[1111]: 2024-02-09 19:42:36.453 [INFO][3347] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" HandleID="k8s-pod-network.6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" Workload="localhost-k8s-csi--node--driver--n2n88-eth0" Feb 9 19:42:36.457992 env[1111]: 2024-02-09 19:42:36.454 [INFO][3347] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:42:36.457992 env[1111]: 2024-02-09 19:42:36.456 [INFO][3339] k8s.go 591: Teardown processing complete. ContainerID="6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" Feb 9 19:42:36.458483 env[1111]: time="2024-02-09T19:42:36.458169769Z" level=info msg="TearDown network for sandbox \"6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a\" successfully" Feb 9 19:42:36.458483 env[1111]: time="2024-02-09T19:42:36.458212249Z" level=info msg="StopPodSandbox for \"6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a\" returns successfully" Feb 9 19:42:36.460079 systemd[1]: run-netns-cni\x2d8a0685e8\x2db36b\x2d1880\x2dc05f\x2d5e922a58a75d.mount: Deactivated successfully. Feb 9 19:42:36.460818 env[1111]: time="2024-02-09T19:42:36.460766413Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-n2n88,Uid:48e50443-4a64-49dd-8f80-7dc085e7a041,Namespace:calico-system,Attempt:1,}" Feb 9 19:42:36.462106 kubelet[2010]: E0209 19:42:36.462075 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:42:37.152517 systemd-networkd[1012]: vxlan.calico: Link UP Feb 9 19:42:37.152525 systemd-networkd[1012]: vxlan.calico: Gained carrier Feb 9 19:42:37.175510 systemd-networkd[1012]: calif2790f2b425: Link UP Feb 9 19:42:37.176506 systemd-networkd[1012]: calif2790f2b425: Gained carrier Feb 9 19:42:37.176640 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif2790f2b425: link becomes ready Feb 9 19:42:37.189179 env[1111]: 2024-02-09 19:42:37.116 [INFO][3380] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--n2n88-eth0 csi-node-driver- calico-system 48e50443-4a64-49dd-8f80-7dc085e7a041 798 0 2024-02-09 19:42:09 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:86b88cf7c9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s localhost csi-node-driver-n2n88 eth0 default [] [] [kns.calico-system ksa.calico-system.default] calif2790f2b425 [] []}} ContainerID="8ee33eba5bdda2c18b59fa658e2ca7477172365bf824afb95a2173776870e693" Namespace="calico-system" Pod="csi-node-driver-n2n88" WorkloadEndpoint="localhost-k8s-csi--node--driver--n2n88-" Feb 9 19:42:37.189179 env[1111]: 2024-02-09 19:42:37.116 [INFO][3380] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="8ee33eba5bdda2c18b59fa658e2ca7477172365bf824afb95a2173776870e693" Namespace="calico-system" Pod="csi-node-driver-n2n88" WorkloadEndpoint="localhost-k8s-csi--node--driver--n2n88-eth0" Feb 9 19:42:37.189179 env[1111]: 2024-02-09 19:42:37.137 [INFO][3393] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8ee33eba5bdda2c18b59fa658e2ca7477172365bf824afb95a2173776870e693" HandleID="k8s-pod-network.8ee33eba5bdda2c18b59fa658e2ca7477172365bf824afb95a2173776870e693" Workload="localhost-k8s-csi--node--driver--n2n88-eth0" Feb 9 19:42:37.189179 env[1111]: 2024-02-09 19:42:37.148 [INFO][3393] ipam_plugin.go 268: Auto assigning IP ContainerID="8ee33eba5bdda2c18b59fa658e2ca7477172365bf824afb95a2173776870e693" HandleID="k8s-pod-network.8ee33eba5bdda2c18b59fa658e2ca7477172365bf824afb95a2173776870e693" Workload="localhost-k8s-csi--node--driver--n2n88-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0005a7290), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-n2n88", "timestamp":"2024-02-09 19:42:37.137441425 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:42:37.189179 env[1111]: 2024-02-09 19:42:37.148 [INFO][3393] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:42:37.189179 env[1111]: 2024-02-09 19:42:37.148 [INFO][3393] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:42:37.189179 env[1111]: 2024-02-09 19:42:37.148 [INFO][3393] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 9 19:42:37.189179 env[1111]: 2024-02-09 19:42:37.150 [INFO][3393] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8ee33eba5bdda2c18b59fa658e2ca7477172365bf824afb95a2173776870e693" host="localhost" Feb 9 19:42:37.189179 env[1111]: 2024-02-09 19:42:37.157 [INFO][3393] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 9 19:42:37.189179 env[1111]: 2024-02-09 19:42:37.160 [INFO][3393] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 9 19:42:37.189179 env[1111]: 2024-02-09 19:42:37.162 [INFO][3393] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 9 19:42:37.189179 env[1111]: 2024-02-09 19:42:37.163 [INFO][3393] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 9 19:42:37.189179 env[1111]: 2024-02-09 19:42:37.163 [INFO][3393] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.8ee33eba5bdda2c18b59fa658e2ca7477172365bf824afb95a2173776870e693" host="localhost" Feb 9 19:42:37.189179 env[1111]: 2024-02-09 19:42:37.164 [INFO][3393] ipam.go 1682: Creating new handle: k8s-pod-network.8ee33eba5bdda2c18b59fa658e2ca7477172365bf824afb95a2173776870e693 Feb 9 19:42:37.189179 env[1111]: 2024-02-09 19:42:37.167 [INFO][3393] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.8ee33eba5bdda2c18b59fa658e2ca7477172365bf824afb95a2173776870e693" host="localhost" Feb 9 19:42:37.189179 env[1111]: 2024-02-09 19:42:37.170 [INFO][3393] ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.8ee33eba5bdda2c18b59fa658e2ca7477172365bf824afb95a2173776870e693" host="localhost" Feb 9 19:42:37.189179 env[1111]: 2024-02-09 19:42:37.171 [INFO][3393] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.8ee33eba5bdda2c18b59fa658e2ca7477172365bf824afb95a2173776870e693" host="localhost" Feb 9 19:42:37.189179 env[1111]: 2024-02-09 19:42:37.171 [INFO][3393] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:42:37.189179 env[1111]: 2024-02-09 19:42:37.171 [INFO][3393] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="8ee33eba5bdda2c18b59fa658e2ca7477172365bf824afb95a2173776870e693" HandleID="k8s-pod-network.8ee33eba5bdda2c18b59fa658e2ca7477172365bf824afb95a2173776870e693" Workload="localhost-k8s-csi--node--driver--n2n88-eth0" Feb 9 19:42:37.189973 env[1111]: 2024-02-09 19:42:37.173 [INFO][3380] k8s.go 385: Populated endpoint ContainerID="8ee33eba5bdda2c18b59fa658e2ca7477172365bf824afb95a2173776870e693" Namespace="calico-system" Pod="csi-node-driver-n2n88" WorkloadEndpoint="localhost-k8s-csi--node--driver--n2n88-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--n2n88-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"48e50443-4a64-49dd-8f80-7dc085e7a041", ResourceVersion:"798", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 42, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-n2n88", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calif2790f2b425", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:42:37.189973 env[1111]: 2024-02-09 19:42:37.173 [INFO][3380] k8s.go 386: Calico CNI using IPs: [192.168.88.129/32] ContainerID="8ee33eba5bdda2c18b59fa658e2ca7477172365bf824afb95a2173776870e693" Namespace="calico-system" Pod="csi-node-driver-n2n88" WorkloadEndpoint="localhost-k8s-csi--node--driver--n2n88-eth0" Feb 9 19:42:37.189973 env[1111]: 2024-02-09 19:42:37.174 [INFO][3380] dataplane_linux.go 68: Setting the host side veth name to calif2790f2b425 ContainerID="8ee33eba5bdda2c18b59fa658e2ca7477172365bf824afb95a2173776870e693" Namespace="calico-system" Pod="csi-node-driver-n2n88" WorkloadEndpoint="localhost-k8s-csi--node--driver--n2n88-eth0" Feb 9 19:42:37.189973 env[1111]: 2024-02-09 19:42:37.176 [INFO][3380] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="8ee33eba5bdda2c18b59fa658e2ca7477172365bf824afb95a2173776870e693" Namespace="calico-system" Pod="csi-node-driver-n2n88" WorkloadEndpoint="localhost-k8s-csi--node--driver--n2n88-eth0" Feb 9 19:42:37.189973 env[1111]: 2024-02-09 19:42:37.177 [INFO][3380] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="8ee33eba5bdda2c18b59fa658e2ca7477172365bf824afb95a2173776870e693" Namespace="calico-system" Pod="csi-node-driver-n2n88" WorkloadEndpoint="localhost-k8s-csi--node--driver--n2n88-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--n2n88-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"48e50443-4a64-49dd-8f80-7dc085e7a041", ResourceVersion:"798", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 42, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8ee33eba5bdda2c18b59fa658e2ca7477172365bf824afb95a2173776870e693", Pod:"csi-node-driver-n2n88", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calif2790f2b425", MAC:"72:f3:41:a3:10:02", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:42:37.189973 env[1111]: 2024-02-09 19:42:37.182 [INFO][3380] k8s.go 491: Wrote updated endpoint to datastore ContainerID="8ee33eba5bdda2c18b59fa658e2ca7477172365bf824afb95a2173776870e693" Namespace="calico-system" Pod="csi-node-driver-n2n88" WorkloadEndpoint="localhost-k8s-csi--node--driver--n2n88-eth0" Feb 9 19:42:37.198238 env[1111]: time="2024-02-09T19:42:37.198176486Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:42:37.198238 env[1111]: time="2024-02-09T19:42:37.198214118Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:42:37.198238 env[1111]: time="2024-02-09T19:42:37.198225339Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:42:37.198378 env[1111]: time="2024-02-09T19:42:37.198338632Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8ee33eba5bdda2c18b59fa658e2ca7477172365bf824afb95a2173776870e693 pid=3421 runtime=io.containerd.runc.v2 Feb 9 19:42:37.212075 systemd[1]: Started cri-containerd-8ee33eba5bdda2c18b59fa658e2ca7477172365bf824afb95a2173776870e693.scope. Feb 9 19:42:37.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit: BPF prog-id=146 op=LOAD Feb 9 19:42:37.218000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3421 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:37.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865653333656261356264646132633138623539666136353865326361 Feb 9 19:42:37.218000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3421 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:37.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865653333656261356264646132633138623539666136353865326361 Feb 9 19:42:37.218000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit: BPF prog-id=147 op=LOAD Feb 9 19:42:37.218000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00021d0a0 items=0 ppid=3421 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:37.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865653333656261356264646132633138623539666136353865326361 Feb 9 19:42:37.218000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit: BPF prog-id=148 op=LOAD Feb 9 19:42:37.218000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00021d0e8 items=0 ppid=3421 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:37.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865653333656261356264646132633138623539666136353865326361 Feb 9 19:42:37.218000 audit: BPF prog-id=148 op=UNLOAD Feb 9 19:42:37.218000 audit: BPF prog-id=147 op=UNLOAD Feb 9 19:42:37.218000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:37.218000 audit: BPF prog-id=149 op=LOAD Feb 9 19:42:37.218000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00021d4f8 items=0 ppid=3421 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:37.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865653333656261356264646132633138623539666136353865326361 Feb 9 19:42:37.223212 systemd-resolved[1065]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 19:42:37.225000 audit[3451]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=3451 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:42:37.225000 audit[3451]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7fffdbce4a30 a2=0 a3=7fffdbce4a1c items=0 ppid=3151 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:37.225000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:42:37.234577 env[1111]: time="2024-02-09T19:42:37.234535721Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-n2n88,Uid:48e50443-4a64-49dd-8f80-7dc085e7a041,Namespace:calico-system,Attempt:1,} returns sandbox id \"8ee33eba5bdda2c18b59fa658e2ca7477172365bf824afb95a2173776870e693\"" Feb 9 19:42:37.236918 env[1111]: time="2024-02-09T19:42:37.236003622Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 19:42:37.464762 kubelet[2010]: E0209 19:42:37.464639 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:42:38.357036 env[1111]: time="2024-02-09T19:42:38.356975942Z" level=info msg="StopPodSandbox for \"8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32\"" Feb 9 19:42:38.425434 env[1111]: 2024-02-09 19:42:38.395 [INFO][3502] k8s.go 578: Cleaning up netns ContainerID="8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" Feb 9 19:42:38.425434 env[1111]: 2024-02-09 19:42:38.395 [INFO][3502] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" iface="eth0" netns="/var/run/netns/cni-77fa2d49-8925-ed7a-6842-a1c15aed76dc" Feb 9 19:42:38.425434 env[1111]: 2024-02-09 19:42:38.396 [INFO][3502] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" iface="eth0" netns="/var/run/netns/cni-77fa2d49-8925-ed7a-6842-a1c15aed76dc" Feb 9 19:42:38.425434 env[1111]: 2024-02-09 19:42:38.396 [INFO][3502] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" iface="eth0" netns="/var/run/netns/cni-77fa2d49-8925-ed7a-6842-a1c15aed76dc" Feb 9 19:42:38.425434 env[1111]: 2024-02-09 19:42:38.396 [INFO][3502] k8s.go 585: Releasing IP address(es) ContainerID="8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" Feb 9 19:42:38.425434 env[1111]: 2024-02-09 19:42:38.396 [INFO][3502] utils.go 188: Calico CNI releasing IP address ContainerID="8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" Feb 9 19:42:38.425434 env[1111]: 2024-02-09 19:42:38.413 [INFO][3510] ipam_plugin.go 415: Releasing address using handleID ContainerID="8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" HandleID="k8s-pod-network.8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" Workload="localhost-k8s-coredns--5d78c9869d--jrt4g-eth0" Feb 9 19:42:38.425434 env[1111]: 2024-02-09 19:42:38.413 [INFO][3510] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:42:38.425434 env[1111]: 2024-02-09 19:42:38.413 [INFO][3510] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:42:38.425434 env[1111]: 2024-02-09 19:42:38.420 [WARNING][3510] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" HandleID="k8s-pod-network.8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" Workload="localhost-k8s-coredns--5d78c9869d--jrt4g-eth0" Feb 9 19:42:38.425434 env[1111]: 2024-02-09 19:42:38.420 [INFO][3510] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" HandleID="k8s-pod-network.8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" Workload="localhost-k8s-coredns--5d78c9869d--jrt4g-eth0" Feb 9 19:42:38.425434 env[1111]: 2024-02-09 19:42:38.422 [INFO][3510] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:42:38.425434 env[1111]: 2024-02-09 19:42:38.424 [INFO][3502] k8s.go 591: Teardown processing complete. ContainerID="8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" Feb 9 19:42:38.426310 env[1111]: time="2024-02-09T19:42:38.426268593Z" level=info msg="TearDown network for sandbox \"8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32\" successfully" Feb 9 19:42:38.426383 env[1111]: time="2024-02-09T19:42:38.426314079Z" level=info msg="StopPodSandbox for \"8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32\" returns successfully" Feb 9 19:42:38.426726 kubelet[2010]: E0209 19:42:38.426684 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:42:38.428128 systemd[1]: run-netns-cni\x2d77fa2d49\x2d8925\x2ded7a\x2d6842\x2da1c15aed76dc.mount: Deactivated successfully. Feb 9 19:42:38.429043 env[1111]: time="2024-02-09T19:42:38.428994099Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-jrt4g,Uid:6b291e45-a45d-494e-a1f8-c189616e7a34,Namespace:kube-system,Attempt:1,}" Feb 9 19:42:38.557365 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:42:38.557673 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia500e98941d: link becomes ready Feb 9 19:42:38.555679 systemd-networkd[1012]: calia500e98941d: Link UP Feb 9 19:42:38.558103 systemd-networkd[1012]: calia500e98941d: Gained carrier Feb 9 19:42:38.575235 env[1111]: 2024-02-09 19:42:38.471 [INFO][3518] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5d78c9869d--jrt4g-eth0 coredns-5d78c9869d- kube-system 6b291e45-a45d-494e-a1f8-c189616e7a34 814 0 2024-02-09 19:42:03 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5d78c9869d-jrt4g eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calia500e98941d [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="39a49351787cbbe76776d496747d5828cc4847fe2f12fe92c1f99e43b6891413" Namespace="kube-system" Pod="coredns-5d78c9869d-jrt4g" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--jrt4g-" Feb 9 19:42:38.575235 env[1111]: 2024-02-09 19:42:38.471 [INFO][3518] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="39a49351787cbbe76776d496747d5828cc4847fe2f12fe92c1f99e43b6891413" Namespace="kube-system" Pod="coredns-5d78c9869d-jrt4g" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--jrt4g-eth0" Feb 9 19:42:38.575235 env[1111]: 2024-02-09 19:42:38.493 [INFO][3532] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="39a49351787cbbe76776d496747d5828cc4847fe2f12fe92c1f99e43b6891413" HandleID="k8s-pod-network.39a49351787cbbe76776d496747d5828cc4847fe2f12fe92c1f99e43b6891413" Workload="localhost-k8s-coredns--5d78c9869d--jrt4g-eth0" Feb 9 19:42:38.575235 env[1111]: 2024-02-09 19:42:38.521 [INFO][3532] ipam_plugin.go 268: Auto assigning IP ContainerID="39a49351787cbbe76776d496747d5828cc4847fe2f12fe92c1f99e43b6891413" HandleID="k8s-pod-network.39a49351787cbbe76776d496747d5828cc4847fe2f12fe92c1f99e43b6891413" Workload="localhost-k8s-coredns--5d78c9869d--jrt4g-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050520), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5d78c9869d-jrt4g", "timestamp":"2024-02-09 19:42:38.493088416 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:42:38.575235 env[1111]: 2024-02-09 19:42:38.522 [INFO][3532] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:42:38.575235 env[1111]: 2024-02-09 19:42:38.522 [INFO][3532] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:42:38.575235 env[1111]: 2024-02-09 19:42:38.522 [INFO][3532] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 9 19:42:38.575235 env[1111]: 2024-02-09 19:42:38.523 [INFO][3532] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.39a49351787cbbe76776d496747d5828cc4847fe2f12fe92c1f99e43b6891413" host="localhost" Feb 9 19:42:38.575235 env[1111]: 2024-02-09 19:42:38.529 [INFO][3532] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 9 19:42:38.575235 env[1111]: 2024-02-09 19:42:38.533 [INFO][3532] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 9 19:42:38.575235 env[1111]: 2024-02-09 19:42:38.535 [INFO][3532] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 9 19:42:38.575235 env[1111]: 2024-02-09 19:42:38.538 [INFO][3532] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 9 19:42:38.575235 env[1111]: 2024-02-09 19:42:38.538 [INFO][3532] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.39a49351787cbbe76776d496747d5828cc4847fe2f12fe92c1f99e43b6891413" host="localhost" Feb 9 19:42:38.575235 env[1111]: 2024-02-09 19:42:38.540 [INFO][3532] ipam.go 1682: Creating new handle: k8s-pod-network.39a49351787cbbe76776d496747d5828cc4847fe2f12fe92c1f99e43b6891413 Feb 9 19:42:38.575235 env[1111]: 2024-02-09 19:42:38.545 [INFO][3532] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.39a49351787cbbe76776d496747d5828cc4847fe2f12fe92c1f99e43b6891413" host="localhost" Feb 9 19:42:38.575235 env[1111]: 2024-02-09 19:42:38.549 [INFO][3532] ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.39a49351787cbbe76776d496747d5828cc4847fe2f12fe92c1f99e43b6891413" host="localhost" Feb 9 19:42:38.575235 env[1111]: 2024-02-09 19:42:38.549 [INFO][3532] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.39a49351787cbbe76776d496747d5828cc4847fe2f12fe92c1f99e43b6891413" host="localhost" Feb 9 19:42:38.575235 env[1111]: 2024-02-09 19:42:38.549 [INFO][3532] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:42:38.575235 env[1111]: 2024-02-09 19:42:38.549 [INFO][3532] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="39a49351787cbbe76776d496747d5828cc4847fe2f12fe92c1f99e43b6891413" HandleID="k8s-pod-network.39a49351787cbbe76776d496747d5828cc4847fe2f12fe92c1f99e43b6891413" Workload="localhost-k8s-coredns--5d78c9869d--jrt4g-eth0" Feb 9 19:42:38.576491 env[1111]: 2024-02-09 19:42:38.552 [INFO][3518] k8s.go 385: Populated endpoint ContainerID="39a49351787cbbe76776d496747d5828cc4847fe2f12fe92c1f99e43b6891413" Namespace="kube-system" Pod="coredns-5d78c9869d-jrt4g" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--jrt4g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--jrt4g-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"6b291e45-a45d-494e-a1f8-c189616e7a34", ResourceVersion:"814", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 42, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5d78c9869d-jrt4g", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia500e98941d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:42:38.576491 env[1111]: 2024-02-09 19:42:38.552 [INFO][3518] k8s.go 386: Calico CNI using IPs: [192.168.88.130/32] ContainerID="39a49351787cbbe76776d496747d5828cc4847fe2f12fe92c1f99e43b6891413" Namespace="kube-system" Pod="coredns-5d78c9869d-jrt4g" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--jrt4g-eth0" Feb 9 19:42:38.576491 env[1111]: 2024-02-09 19:42:38.552 [INFO][3518] dataplane_linux.go 68: Setting the host side veth name to calia500e98941d ContainerID="39a49351787cbbe76776d496747d5828cc4847fe2f12fe92c1f99e43b6891413" Namespace="kube-system" Pod="coredns-5d78c9869d-jrt4g" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--jrt4g-eth0" Feb 9 19:42:38.576491 env[1111]: 2024-02-09 19:42:38.557 [INFO][3518] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="39a49351787cbbe76776d496747d5828cc4847fe2f12fe92c1f99e43b6891413" Namespace="kube-system" Pod="coredns-5d78c9869d-jrt4g" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--jrt4g-eth0" Feb 9 19:42:38.576491 env[1111]: 2024-02-09 19:42:38.558 [INFO][3518] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="39a49351787cbbe76776d496747d5828cc4847fe2f12fe92c1f99e43b6891413" Namespace="kube-system" Pod="coredns-5d78c9869d-jrt4g" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--jrt4g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--jrt4g-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"6b291e45-a45d-494e-a1f8-c189616e7a34", ResourceVersion:"814", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 42, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"39a49351787cbbe76776d496747d5828cc4847fe2f12fe92c1f99e43b6891413", Pod:"coredns-5d78c9869d-jrt4g", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia500e98941d", MAC:"02:69:ea:40:f4:ba", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:42:38.576491 env[1111]: 2024-02-09 19:42:38.568 [INFO][3518] k8s.go 491: Wrote updated endpoint to datastore ContainerID="39a49351787cbbe76776d496747d5828cc4847fe2f12fe92c1f99e43b6891413" Namespace="kube-system" Pod="coredns-5d78c9869d-jrt4g" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--jrt4g-eth0" Feb 9 19:42:38.600000 audit[3559]: NETFILTER_CFG table=filter:102 family=2 entries=40 op=nft_register_chain pid=3559 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:42:38.600000 audit[3559]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7fffbc05f890 a2=0 a3=7fffbc05f87c items=0 ppid=3151 pid=3559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:38.600000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:42:38.607587 env[1111]: time="2024-02-09T19:42:38.607366744Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:42:38.607587 env[1111]: time="2024-02-09T19:42:38.607526976Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:42:38.607587 env[1111]: time="2024-02-09T19:42:38.607550220Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:42:38.608076 env[1111]: time="2024-02-09T19:42:38.607972808Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/39a49351787cbbe76776d496747d5828cc4847fe2f12fe92c1f99e43b6891413 pid=3562 runtime=io.containerd.runc.v2 Feb 9 19:42:38.628235 systemd[1]: Started cri-containerd-39a49351787cbbe76776d496747d5828cc4847fe2f12fe92c1f99e43b6891413.scope. Feb 9 19:42:38.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.644000 audit: BPF prog-id=150 op=LOAD Feb 9 19:42:38.645000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.645000 audit[3572]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3562 pid=3572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:38.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339613439333531373837636262653736373736643439363734376435 Feb 9 19:42:38.645000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.645000 audit[3572]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3562 pid=3572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:38.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339613439333531373837636262653736373736643439363734376435 Feb 9 19:42:38.645000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.645000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.645000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.645000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.645000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.645000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.645000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.645000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.645000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.645000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.645000 audit: BPF prog-id=151 op=LOAD Feb 9 19:42:38.645000 audit[3572]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021ec60 items=0 ppid=3562 pid=3572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:38.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339613439333531373837636262653736373736643439363734376435 Feb 9 19:42:38.645000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.645000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.645000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.645000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.645000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.645000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.645000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.645000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.645000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.645000 audit: BPF prog-id=152 op=LOAD Feb 9 19:42:38.645000 audit[3572]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021eca8 items=0 ppid=3562 pid=3572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:38.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339613439333531373837636262653736373736643439363734376435 Feb 9 19:42:38.645000 audit: BPF prog-id=152 op=UNLOAD Feb 9 19:42:38.645000 audit: BPF prog-id=151 op=UNLOAD Feb 9 19:42:38.645000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.645000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.645000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.645000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.645000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.645000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.645000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.645000 audit[3572]: AVC avc: denied { perfmon } for pid=3572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.645000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.645000 audit[3572]: AVC avc: denied { bpf } for pid=3572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.645000 audit: BPF prog-id=153 op=LOAD Feb 9 19:42:38.645000 audit[3572]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00021f0b8 items=0 ppid=3562 pid=3572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:38.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339613439333531373837636262653736373736643439363734376435 Feb 9 19:42:38.648316 systemd-resolved[1065]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 19:42:38.679793 env[1111]: time="2024-02-09T19:42:38.679700407Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-jrt4g,Uid:6b291e45-a45d-494e-a1f8-c189616e7a34,Namespace:kube-system,Attempt:1,} returns sandbox id \"39a49351787cbbe76776d496747d5828cc4847fe2f12fe92c1f99e43b6891413\"" Feb 9 19:42:38.680646 kubelet[2010]: E0209 19:42:38.680594 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:42:38.684903 env[1111]: time="2024-02-09T19:42:38.684853936Z" level=info msg="CreateContainer within sandbox \"39a49351787cbbe76776d496747d5828cc4847fe2f12fe92c1f99e43b6891413\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 19:42:38.719026 systemd-networkd[1012]: vxlan.calico: Gained IPv6LL Feb 9 19:42:38.719573 systemd-networkd[1012]: calif2790f2b425: Gained IPv6LL Feb 9 19:42:38.816040 env[1111]: time="2024-02-09T19:42:38.815962812Z" level=info msg="CreateContainer within sandbox \"39a49351787cbbe76776d496747d5828cc4847fe2f12fe92c1f99e43b6891413\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"628d524f27242dce0113a8f5f91d8254fa44d3d54a5bbf6c0d9509562e0bd740\"" Feb 9 19:42:38.816799 env[1111]: time="2024-02-09T19:42:38.816753576Z" level=info msg="StartContainer for \"628d524f27242dce0113a8f5f91d8254fa44d3d54a5bbf6c0d9509562e0bd740\"" Feb 9 19:42:38.831825 systemd[1]: Started cri-containerd-628d524f27242dce0113a8f5f91d8254fa44d3d54a5bbf6c0d9509562e0bd740.scope. Feb 9 19:42:38.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.844000 audit: BPF prog-id=154 op=LOAD Feb 9 19:42:38.844000 audit[3603]: AVC avc: denied { bpf } for pid=3603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.844000 audit[3603]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3562 pid=3603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:38.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632386435323466323732343264636530313133613866356639316438 Feb 9 19:42:38.844000 audit[3603]: AVC avc: denied { perfmon } for pid=3603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.844000 audit[3603]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3562 pid=3603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:38.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632386435323466323732343264636530313133613866356639316438 Feb 9 19:42:38.844000 audit[3603]: AVC avc: denied { bpf } for pid=3603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.844000 audit[3603]: AVC avc: denied { bpf } for pid=3603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.844000 audit[3603]: AVC avc: denied { bpf } for pid=3603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.844000 audit[3603]: AVC avc: denied { perfmon } for pid=3603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.844000 audit[3603]: AVC avc: denied { perfmon } for pid=3603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.844000 audit[3603]: AVC avc: denied { perfmon } for pid=3603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.844000 audit[3603]: AVC avc: denied { perfmon } for pid=3603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.844000 audit[3603]: AVC avc: denied { perfmon } for pid=3603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.844000 audit[3603]: AVC avc: denied { bpf } for pid=3603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.844000 audit[3603]: AVC avc: denied { bpf } for pid=3603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.844000 audit: BPF prog-id=155 op=LOAD Feb 9 19:42:38.844000 audit[3603]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000299a10 items=0 ppid=3562 pid=3603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:38.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632386435323466323732343264636530313133613866356639316438 Feb 9 19:42:38.845000 audit[3603]: AVC avc: denied { bpf } for pid=3603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.845000 audit[3603]: AVC avc: denied { bpf } for pid=3603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.845000 audit[3603]: AVC avc: denied { perfmon } for pid=3603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.845000 audit[3603]: AVC avc: denied { perfmon } for pid=3603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.845000 audit[3603]: AVC avc: denied { perfmon } for pid=3603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.845000 audit[3603]: AVC avc: denied { perfmon } for pid=3603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.845000 audit[3603]: AVC avc: denied { perfmon } for pid=3603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.845000 audit[3603]: AVC avc: denied { bpf } for pid=3603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.845000 audit[3603]: AVC avc: denied { bpf } for pid=3603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.845000 audit: BPF prog-id=156 op=LOAD Feb 9 19:42:38.845000 audit[3603]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000299a58 items=0 ppid=3562 pid=3603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:38.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632386435323466323732343264636530313133613866356639316438 Feb 9 19:42:38.845000 audit: BPF prog-id=156 op=UNLOAD Feb 9 19:42:38.845000 audit: BPF prog-id=155 op=UNLOAD Feb 9 19:42:38.845000 audit[3603]: AVC avc: denied { bpf } for pid=3603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.845000 audit[3603]: AVC avc: denied { bpf } for pid=3603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.845000 audit[3603]: AVC avc: denied { bpf } for pid=3603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.845000 audit[3603]: AVC avc: denied { perfmon } for pid=3603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.845000 audit[3603]: AVC avc: denied { perfmon } for pid=3603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.845000 audit[3603]: AVC avc: denied { perfmon } for pid=3603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.845000 audit[3603]: AVC avc: denied { perfmon } for pid=3603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.845000 audit[3603]: AVC avc: denied { perfmon } for pid=3603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.845000 audit[3603]: AVC avc: denied { bpf } for pid=3603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.845000 audit[3603]: AVC avc: denied { bpf } for pid=3603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:38.845000 audit: BPF prog-id=157 op=LOAD Feb 9 19:42:38.845000 audit[3603]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000299e68 items=0 ppid=3562 pid=3603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:38.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632386435323466323732343264636530313133613866356639316438 Feb 9 19:42:38.861430 env[1111]: time="2024-02-09T19:42:38.861318658Z" level=info msg="StartContainer for \"628d524f27242dce0113a8f5f91d8254fa44d3d54a5bbf6c0d9509562e0bd740\" returns successfully" Feb 9 19:42:39.358323 env[1111]: time="2024-02-09T19:42:39.358279698Z" level=info msg="StopPodSandbox for \"fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e\"" Feb 9 19:42:39.374948 env[1111]: time="2024-02-09T19:42:39.374892102Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:39.376495 env[1111]: time="2024-02-09T19:42:39.376460093Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:39.377779 env[1111]: time="2024-02-09T19:42:39.377749065Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:39.379111 env[1111]: time="2024-02-09T19:42:39.379079348Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:39.379882 env[1111]: time="2024-02-09T19:42:39.379845264Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 9 19:42:39.382438 env[1111]: time="2024-02-09T19:42:39.382402742Z" level=info msg="CreateContainer within sandbox \"8ee33eba5bdda2c18b59fa658e2ca7477172365bf824afb95a2173776870e693\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 19:42:39.395932 env[1111]: time="2024-02-09T19:42:39.395868465Z" level=info msg="CreateContainer within sandbox \"8ee33eba5bdda2c18b59fa658e2ca7477172365bf824afb95a2173776870e693\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"06672a965b2c342382edf850c656e9c06ec86b754a4624cd7a5930c06ced0412\"" Feb 9 19:42:39.396828 env[1111]: time="2024-02-09T19:42:39.396794874Z" level=info msg="StartContainer for \"06672a965b2c342382edf850c656e9c06ec86b754a4624cd7a5930c06ced0412\"" Feb 9 19:42:39.425564 systemd[1]: Started cri-containerd-06672a965b2c342382edf850c656e9c06ec86b754a4624cd7a5930c06ced0412.scope. Feb 9 19:42:39.440000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.440000 audit[3666]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3421 pid=3666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:39.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036363732613936356232633334323338326564663835306336353665 Feb 9 19:42:39.440000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.440000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.440000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.440000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.440000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.440000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.440000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.440000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.440000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.440000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.440000 audit: BPF prog-id=158 op=LOAD Feb 9 19:42:39.440000 audit[3666]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002f3f40 items=0 ppid=3421 pid=3666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:39.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036363732613936356232633334323338326564663835306336353665 Feb 9 19:42:39.440000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.440000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.440000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.440000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.440000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.440000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.440000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.440000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.440000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.440000 audit: BPF prog-id=159 op=LOAD Feb 9 19:42:39.440000 audit[3666]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002f3f88 items=0 ppid=3421 pid=3666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:39.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036363732613936356232633334323338326564663835306336353665 Feb 9 19:42:39.440000 audit: BPF prog-id=159 op=UNLOAD Feb 9 19:42:39.440000 audit: BPF prog-id=158 op=UNLOAD Feb 9 19:42:39.440000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.440000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.440000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.440000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.440000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.440000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.440000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.440000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.440000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.440000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.440000 audit: BPF prog-id=160 op=LOAD Feb 9 19:42:39.440000 audit[3666]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003c4018 items=0 ppid=3421 pid=3666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:39.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036363732613936356232633334323338326564663835306336353665 Feb 9 19:42:39.463293 env[1111]: time="2024-02-09T19:42:39.463229832Z" level=info msg="StartContainer for \"06672a965b2c342382edf850c656e9c06ec86b754a4624cd7a5930c06ced0412\" returns successfully" Feb 9 19:42:39.465039 env[1111]: time="2024-02-09T19:42:39.464970148Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 19:42:39.470229 kubelet[2010]: E0209 19:42:39.470201 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:42:39.470478 env[1111]: 2024-02-09 19:42:39.410 [INFO][3651] k8s.go 578: Cleaning up netns ContainerID="fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" Feb 9 19:42:39.470478 env[1111]: 2024-02-09 19:42:39.411 [INFO][3651] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" iface="eth0" netns="/var/run/netns/cni-d8fcf049-8b61-d986-8232-c16c32306c20" Feb 9 19:42:39.470478 env[1111]: 2024-02-09 19:42:39.411 [INFO][3651] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" iface="eth0" netns="/var/run/netns/cni-d8fcf049-8b61-d986-8232-c16c32306c20" Feb 9 19:42:39.470478 env[1111]: 2024-02-09 19:42:39.411 [INFO][3651] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" iface="eth0" netns="/var/run/netns/cni-d8fcf049-8b61-d986-8232-c16c32306c20" Feb 9 19:42:39.470478 env[1111]: 2024-02-09 19:42:39.411 [INFO][3651] k8s.go 585: Releasing IP address(es) ContainerID="fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" Feb 9 19:42:39.470478 env[1111]: 2024-02-09 19:42:39.411 [INFO][3651] utils.go 188: Calico CNI releasing IP address ContainerID="fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" Feb 9 19:42:39.470478 env[1111]: 2024-02-09 19:42:39.447 [INFO][3667] ipam_plugin.go 415: Releasing address using handleID ContainerID="fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" HandleID="k8s-pod-network.fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" Workload="localhost-k8s-calico--kube--controllers--856df5c4fb--csmth-eth0" Feb 9 19:42:39.470478 env[1111]: 2024-02-09 19:42:39.448 [INFO][3667] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:42:39.470478 env[1111]: 2024-02-09 19:42:39.448 [INFO][3667] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:42:39.470478 env[1111]: 2024-02-09 19:42:39.459 [WARNING][3667] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" HandleID="k8s-pod-network.fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" Workload="localhost-k8s-calico--kube--controllers--856df5c4fb--csmth-eth0" Feb 9 19:42:39.470478 env[1111]: 2024-02-09 19:42:39.459 [INFO][3667] ipam_plugin.go 443: Releasing address using workloadID ContainerID="fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" HandleID="k8s-pod-network.fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" Workload="localhost-k8s-calico--kube--controllers--856df5c4fb--csmth-eth0" Feb 9 19:42:39.470478 env[1111]: 2024-02-09 19:42:39.464 [INFO][3667] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:42:39.470478 env[1111]: 2024-02-09 19:42:39.467 [INFO][3651] k8s.go 591: Teardown processing complete. ContainerID="fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" Feb 9 19:42:39.471630 env[1111]: time="2024-02-09T19:42:39.470782612Z" level=info msg="TearDown network for sandbox \"fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e\" successfully" Feb 9 19:42:39.471630 env[1111]: time="2024-02-09T19:42:39.470806777Z" level=info msg="StopPodSandbox for \"fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e\" returns successfully" Feb 9 19:42:39.471630 env[1111]: time="2024-02-09T19:42:39.471204007Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-856df5c4fb-csmth,Uid:aa5e91fd-a53f-4816-9d38-2537adca9f7f,Namespace:calico-system,Attempt:1,}" Feb 9 19:42:39.472515 systemd[1]: run-netns-cni\x2dd8fcf049\x2d8b61\x2dd986\x2d8232\x2dc16c32306c20.mount: Deactivated successfully. Feb 9 19:42:39.495650 kubelet[2010]: I0209 19:42:39.495553 2010 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-jrt4g" podStartSLOduration=36.495497803 podCreationTimestamp="2024-02-09 19:42:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:42:39.482845305 +0000 UTC m=+50.230324321" watchObservedRunningTime="2024-02-09 19:42:39.495497803 +0000 UTC m=+50.242976820" Feb 9 19:42:39.497000 audit[3702]: NETFILTER_CFG table=filter:103 family=2 entries=14 op=nft_register_rule pid=3702 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:42:39.497000 audit[3702]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffebaf66e70 a2=0 a3=7ffebaf66e5c items=0 ppid=2172 pid=3702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:39.497000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:42:39.498000 audit[3702]: NETFILTER_CFG table=nat:104 family=2 entries=14 op=nft_register_rule pid=3702 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:42:39.498000 audit[3702]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7ffebaf66e70 a2=0 a3=31030 items=0 ppid=2172 pid=3702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:39.498000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:42:39.512000 audit[3710]: NETFILTER_CFG table=filter:105 family=2 entries=11 op=nft_register_rule pid=3710 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:42:39.512000 audit[3710]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fffc250a970 a2=0 a3=7fffc250a95c items=0 ppid=2172 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:39.512000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:42:39.514000 audit[3710]: NETFILTER_CFG table=nat:106 family=2 entries=35 op=nft_register_chain pid=3710 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:42:39.514000 audit[3710]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7fffc250a970 a2=0 a3=7fffc250a95c items=0 ppid=2172 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:39.514000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:42:39.610871 systemd-networkd[1012]: cali1a3b66974a4: Link UP Feb 9 19:42:39.613849 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1a3b66974a4: link becomes ready Feb 9 19:42:39.613681 systemd-networkd[1012]: cali1a3b66974a4: Gained carrier Feb 9 19:42:39.622715 env[1111]: 2024-02-09 19:42:39.538 [INFO][3703] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--856df5c4fb--csmth-eth0 calico-kube-controllers-856df5c4fb- calico-system aa5e91fd-a53f-4816-9d38-2537adca9f7f 829 0 2024-02-09 19:42:09 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:856df5c4fb projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-856df5c4fb-csmth eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali1a3b66974a4 [] []}} ContainerID="2ddac61f951a2568f63bf6999032bb6e5fd6434fd2382d06d65a1ea5c9a332d0" Namespace="calico-system" Pod="calico-kube-controllers-856df5c4fb-csmth" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--856df5c4fb--csmth-" Feb 9 19:42:39.622715 env[1111]: 2024-02-09 19:42:39.538 [INFO][3703] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="2ddac61f951a2568f63bf6999032bb6e5fd6434fd2382d06d65a1ea5c9a332d0" Namespace="calico-system" Pod="calico-kube-controllers-856df5c4fb-csmth" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--856df5c4fb--csmth-eth0" Feb 9 19:42:39.622715 env[1111]: 2024-02-09 19:42:39.570 [INFO][3720] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2ddac61f951a2568f63bf6999032bb6e5fd6434fd2382d06d65a1ea5c9a332d0" HandleID="k8s-pod-network.2ddac61f951a2568f63bf6999032bb6e5fd6434fd2382d06d65a1ea5c9a332d0" Workload="localhost-k8s-calico--kube--controllers--856df5c4fb--csmth-eth0" Feb 9 19:42:39.622715 env[1111]: 2024-02-09 19:42:39.582 [INFO][3720] ipam_plugin.go 268: Auto assigning IP ContainerID="2ddac61f951a2568f63bf6999032bb6e5fd6434fd2382d06d65a1ea5c9a332d0" HandleID="k8s-pod-network.2ddac61f951a2568f63bf6999032bb6e5fd6434fd2382d06d65a1ea5c9a332d0" Workload="localhost-k8s-calico--kube--controllers--856df5c4fb--csmth-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002b79f0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-856df5c4fb-csmth", "timestamp":"2024-02-09 19:42:39.570446325 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:42:39.622715 env[1111]: 2024-02-09 19:42:39.582 [INFO][3720] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:42:39.622715 env[1111]: 2024-02-09 19:42:39.583 [INFO][3720] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:42:39.622715 env[1111]: 2024-02-09 19:42:39.583 [INFO][3720] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 9 19:42:39.622715 env[1111]: 2024-02-09 19:42:39.585 [INFO][3720] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2ddac61f951a2568f63bf6999032bb6e5fd6434fd2382d06d65a1ea5c9a332d0" host="localhost" Feb 9 19:42:39.622715 env[1111]: 2024-02-09 19:42:39.589 [INFO][3720] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 9 19:42:39.622715 env[1111]: 2024-02-09 19:42:39.593 [INFO][3720] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 9 19:42:39.622715 env[1111]: 2024-02-09 19:42:39.594 [INFO][3720] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 9 19:42:39.622715 env[1111]: 2024-02-09 19:42:39.596 [INFO][3720] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 9 19:42:39.622715 env[1111]: 2024-02-09 19:42:39.596 [INFO][3720] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.2ddac61f951a2568f63bf6999032bb6e5fd6434fd2382d06d65a1ea5c9a332d0" host="localhost" Feb 9 19:42:39.622715 env[1111]: 2024-02-09 19:42:39.598 [INFO][3720] ipam.go 1682: Creating new handle: k8s-pod-network.2ddac61f951a2568f63bf6999032bb6e5fd6434fd2382d06d65a1ea5c9a332d0 Feb 9 19:42:39.622715 env[1111]: 2024-02-09 19:42:39.601 [INFO][3720] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.2ddac61f951a2568f63bf6999032bb6e5fd6434fd2382d06d65a1ea5c9a332d0" host="localhost" Feb 9 19:42:39.622715 env[1111]: 2024-02-09 19:42:39.604 [INFO][3720] ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.2ddac61f951a2568f63bf6999032bb6e5fd6434fd2382d06d65a1ea5c9a332d0" host="localhost" Feb 9 19:42:39.622715 env[1111]: 2024-02-09 19:42:39.604 [INFO][3720] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.2ddac61f951a2568f63bf6999032bb6e5fd6434fd2382d06d65a1ea5c9a332d0" host="localhost" Feb 9 19:42:39.622715 env[1111]: 2024-02-09 19:42:39.604 [INFO][3720] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:42:39.622715 env[1111]: 2024-02-09 19:42:39.604 [INFO][3720] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="2ddac61f951a2568f63bf6999032bb6e5fd6434fd2382d06d65a1ea5c9a332d0" HandleID="k8s-pod-network.2ddac61f951a2568f63bf6999032bb6e5fd6434fd2382d06d65a1ea5c9a332d0" Workload="localhost-k8s-calico--kube--controllers--856df5c4fb--csmth-eth0" Feb 9 19:42:39.623335 env[1111]: 2024-02-09 19:42:39.608 [INFO][3703] k8s.go 385: Populated endpoint ContainerID="2ddac61f951a2568f63bf6999032bb6e5fd6434fd2382d06d65a1ea5c9a332d0" Namespace="calico-system" Pod="calico-kube-controllers-856df5c4fb-csmth" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--856df5c4fb--csmth-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--856df5c4fb--csmth-eth0", GenerateName:"calico-kube-controllers-856df5c4fb-", Namespace:"calico-system", SelfLink:"", UID:"aa5e91fd-a53f-4816-9d38-2537adca9f7f", ResourceVersion:"829", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 42, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"856df5c4fb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-856df5c4fb-csmth", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali1a3b66974a4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:42:39.623335 env[1111]: 2024-02-09 19:42:39.608 [INFO][3703] k8s.go 386: Calico CNI using IPs: [192.168.88.131/32] ContainerID="2ddac61f951a2568f63bf6999032bb6e5fd6434fd2382d06d65a1ea5c9a332d0" Namespace="calico-system" Pod="calico-kube-controllers-856df5c4fb-csmth" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--856df5c4fb--csmth-eth0" Feb 9 19:42:39.623335 env[1111]: 2024-02-09 19:42:39.608 [INFO][3703] dataplane_linux.go 68: Setting the host side veth name to cali1a3b66974a4 ContainerID="2ddac61f951a2568f63bf6999032bb6e5fd6434fd2382d06d65a1ea5c9a332d0" Namespace="calico-system" Pod="calico-kube-controllers-856df5c4fb-csmth" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--856df5c4fb--csmth-eth0" Feb 9 19:42:39.623335 env[1111]: 2024-02-09 19:42:39.611 [INFO][3703] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2ddac61f951a2568f63bf6999032bb6e5fd6434fd2382d06d65a1ea5c9a332d0" Namespace="calico-system" Pod="calico-kube-controllers-856df5c4fb-csmth" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--856df5c4fb--csmth-eth0" Feb 9 19:42:39.623335 env[1111]: 2024-02-09 19:42:39.611 [INFO][3703] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="2ddac61f951a2568f63bf6999032bb6e5fd6434fd2382d06d65a1ea5c9a332d0" Namespace="calico-system" Pod="calico-kube-controllers-856df5c4fb-csmth" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--856df5c4fb--csmth-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--856df5c4fb--csmth-eth0", GenerateName:"calico-kube-controllers-856df5c4fb-", Namespace:"calico-system", SelfLink:"", UID:"aa5e91fd-a53f-4816-9d38-2537adca9f7f", ResourceVersion:"829", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 42, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"856df5c4fb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2ddac61f951a2568f63bf6999032bb6e5fd6434fd2382d06d65a1ea5c9a332d0", Pod:"calico-kube-controllers-856df5c4fb-csmth", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali1a3b66974a4", MAC:"86:39:d9:6c:fe:07", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:42:39.623335 env[1111]: 2024-02-09 19:42:39.620 [INFO][3703] k8s.go 491: Wrote updated endpoint to datastore ContainerID="2ddac61f951a2568f63bf6999032bb6e5fd6434fd2382d06d65a1ea5c9a332d0" Namespace="calico-system" Pod="calico-kube-controllers-856df5c4fb-csmth" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--856df5c4fb--csmth-eth0" Feb 9 19:42:39.636535 env[1111]: time="2024-02-09T19:42:39.636443546Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:42:39.636795 env[1111]: time="2024-02-09T19:42:39.636491627Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:42:39.636909 env[1111]: time="2024-02-09T19:42:39.636772278Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:42:39.637384 env[1111]: time="2024-02-09T19:42:39.637338136Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2ddac61f951a2568f63bf6999032bb6e5fd6434fd2382d06d65a1ea5c9a332d0 pid=3750 runtime=io.containerd.runc.v2 Feb 9 19:42:39.642000 audit[3765]: NETFILTER_CFG table=filter:107 family=2 entries=38 op=nft_register_chain pid=3765 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:42:39.642000 audit[3765]: SYSCALL arch=c000003e syscall=46 success=yes exit=19508 a0=3 a1=7ffcd103d530 a2=0 a3=7ffcd103d51c items=0 ppid=3151 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:39.642000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:42:39.647942 systemd[1]: Started cri-containerd-2ddac61f951a2568f63bf6999032bb6e5fd6434fd2382d06d65a1ea5c9a332d0.scope. Feb 9 19:42:39.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.658000 audit: BPF prog-id=161 op=LOAD Feb 9 19:42:39.658000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.658000 audit[3759]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3750 pid=3759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:39.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264646163363166393531613235363866363362663639393930333262 Feb 9 19:42:39.658000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.658000 audit[3759]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3750 pid=3759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:39.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264646163363166393531613235363866363362663639393930333262 Feb 9 19:42:39.659000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.659000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.659000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.659000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.659000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.659000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.659000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.659000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.659000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.659000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.659000 audit: BPF prog-id=162 op=LOAD Feb 9 19:42:39.659000 audit[3759]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000304ce0 items=0 ppid=3750 pid=3759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:39.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264646163363166393531613235363866363362663639393930333262 Feb 9 19:42:39.659000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.659000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.659000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.659000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.659000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.659000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.659000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.659000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.659000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.659000 audit: BPF prog-id=163 op=LOAD Feb 9 19:42:39.659000 audit[3759]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000304d28 items=0 ppid=3750 pid=3759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:39.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264646163363166393531613235363866363362663639393930333262 Feb 9 19:42:39.659000 audit: BPF prog-id=163 op=UNLOAD Feb 9 19:42:39.659000 audit: BPF prog-id=162 op=UNLOAD Feb 9 19:42:39.659000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.659000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.659000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.659000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.659000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.659000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.659000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.659000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.659000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.659000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:39.659000 audit: BPF prog-id=164 op=LOAD Feb 9 19:42:39.659000 audit[3759]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000305138 items=0 ppid=3750 pid=3759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:39.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264646163363166393531613235363866363362663639393930333262 Feb 9 19:42:39.661696 systemd-resolved[1065]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 19:42:39.684392 env[1111]: time="2024-02-09T19:42:39.684330817Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-856df5c4fb-csmth,Uid:aa5e91fd-a53f-4816-9d38-2537adca9f7f,Namespace:calico-system,Attempt:1,} returns sandbox id \"2ddac61f951a2568f63bf6999032bb6e5fd6434fd2382d06d65a1ea5c9a332d0\"" Feb 9 19:42:40.356992 env[1111]: time="2024-02-09T19:42:40.356917572Z" level=info msg="StopPodSandbox for \"86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b\"" Feb 9 19:42:40.446800 systemd-networkd[1012]: calia500e98941d: Gained IPv6LL Feb 9 19:42:40.469053 env[1111]: 2024-02-09 19:42:40.418 [INFO][3799] k8s.go 578: Cleaning up netns ContainerID="86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" Feb 9 19:42:40.469053 env[1111]: 2024-02-09 19:42:40.419 [INFO][3799] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" iface="eth0" netns="/var/run/netns/cni-1cbe619e-eb66-7771-dcac-ca3ac177a73d" Feb 9 19:42:40.469053 env[1111]: 2024-02-09 19:42:40.419 [INFO][3799] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" iface="eth0" netns="/var/run/netns/cni-1cbe619e-eb66-7771-dcac-ca3ac177a73d" Feb 9 19:42:40.469053 env[1111]: 2024-02-09 19:42:40.419 [INFO][3799] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" iface="eth0" netns="/var/run/netns/cni-1cbe619e-eb66-7771-dcac-ca3ac177a73d" Feb 9 19:42:40.469053 env[1111]: 2024-02-09 19:42:40.419 [INFO][3799] k8s.go 585: Releasing IP address(es) ContainerID="86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" Feb 9 19:42:40.469053 env[1111]: 2024-02-09 19:42:40.419 [INFO][3799] utils.go 188: Calico CNI releasing IP address ContainerID="86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" Feb 9 19:42:40.469053 env[1111]: 2024-02-09 19:42:40.457 [INFO][3807] ipam_plugin.go 415: Releasing address using handleID ContainerID="86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" HandleID="k8s-pod-network.86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" Workload="localhost-k8s-coredns--5d78c9869d--x6762-eth0" Feb 9 19:42:40.469053 env[1111]: 2024-02-09 19:42:40.458 [INFO][3807] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:42:40.469053 env[1111]: 2024-02-09 19:42:40.458 [INFO][3807] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:42:40.469053 env[1111]: 2024-02-09 19:42:40.464 [WARNING][3807] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" HandleID="k8s-pod-network.86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" Workload="localhost-k8s-coredns--5d78c9869d--x6762-eth0" Feb 9 19:42:40.469053 env[1111]: 2024-02-09 19:42:40.464 [INFO][3807] ipam_plugin.go 443: Releasing address using workloadID ContainerID="86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" HandleID="k8s-pod-network.86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" Workload="localhost-k8s-coredns--5d78c9869d--x6762-eth0" Feb 9 19:42:40.469053 env[1111]: 2024-02-09 19:42:40.465 [INFO][3807] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:42:40.469053 env[1111]: 2024-02-09 19:42:40.467 [INFO][3799] k8s.go 591: Teardown processing complete. ContainerID="86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" Feb 9 19:42:40.471013 systemd[1]: run-netns-cni\x2d1cbe619e\x2deb66\x2d7771\x2ddcac\x2dca3ac177a73d.mount: Deactivated successfully. Feb 9 19:42:40.471756 env[1111]: time="2024-02-09T19:42:40.471715199Z" level=info msg="TearDown network for sandbox \"86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b\" successfully" Feb 9 19:42:40.471756 env[1111]: time="2024-02-09T19:42:40.471754183Z" level=info msg="StopPodSandbox for \"86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b\" returns successfully" Feb 9 19:42:40.472258 kubelet[2010]: E0209 19:42:40.472081 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:42:40.472771 env[1111]: time="2024-02-09T19:42:40.472711895Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-x6762,Uid:bd0dc1b7-cf31-4312-a403-9152a4ac5774,Namespace:kube-system,Attempt:1,}" Feb 9 19:42:40.490903 kubelet[2010]: E0209 19:42:40.490863 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:42:40.703726 systemd-networkd[1012]: cali1a3b66974a4: Gained IPv6LL Feb 9 19:42:40.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.29:22-10.0.0.1:46288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:40.755131 systemd[1]: Started sshd@13-10.0.0.29:22-10.0.0.1:46288.service. Feb 9 19:42:40.756276 kernel: kauditd_printk_skb: 433 callbacks suppressed Feb 9 19:42:40.756349 kernel: audit: type=1130 audit(1707507760.753:1300): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.29:22-10.0.0.1:46288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:40.816000 audit[3837]: USER_ACCT pid=3837 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:40.818131 sshd[3837]: Accepted publickey for core from 10.0.0.1 port 46288 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:42:40.819000 audit[3837]: CRED_ACQ pid=3837 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:40.821282 sshd[3837]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:42:40.824241 kernel: audit: type=1101 audit(1707507760.816:1301): pid=3837 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:40.824383 kernel: audit: type=1103 audit(1707507760.819:1302): pid=3837 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:40.824423 kernel: audit: type=1006 audit(1707507760.819:1303): pid=3837 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Feb 9 19:42:40.825433 kernel: audit: type=1300 audit(1707507760.819:1303): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc90d8b250 a2=3 a3=0 items=0 ppid=1 pid=3837 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:40.819000 audit[3837]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc90d8b250 a2=3 a3=0 items=0 ppid=1 pid=3837 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:40.826066 systemd-logind[1103]: New session 14 of user core. Feb 9 19:42:40.827223 systemd[1]: Started session-14.scope. Feb 9 19:42:40.828963 kernel: audit: type=1327 audit(1707507760.819:1303): proctitle=737368643A20636F7265205B707269765D Feb 9 19:42:40.819000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:42:40.831000 audit[3837]: USER_START pid=3837 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:40.837639 kernel: audit: type=1105 audit(1707507760.831:1304): pid=3837 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:40.835000 audit[3840]: CRED_ACQ pid=3840 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:40.842626 kernel: audit: type=1103 audit(1707507760.835:1305): pid=3840 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:40.842736 systemd-networkd[1012]: cali2e30b035a60: Link UP Feb 9 19:42:40.844592 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:42:40.845076 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2e30b035a60: link becomes ready Feb 9 19:42:40.845196 systemd-networkd[1012]: cali2e30b035a60: Gained carrier Feb 9 19:42:40.879129 env[1111]: 2024-02-09 19:42:40.717 [INFO][3816] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5d78c9869d--x6762-eth0 coredns-5d78c9869d- kube-system bd0dc1b7-cf31-4312-a403-9152a4ac5774 847 0 2024-02-09 19:42:03 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5d78c9869d-x6762 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali2e30b035a60 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="bd7144cebaec8cd797894ca0e0c7044b082ccacd602e52b49a868a5bbf74cfc6" Namespace="kube-system" Pod="coredns-5d78c9869d-x6762" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--x6762-" Feb 9 19:42:40.879129 env[1111]: 2024-02-09 19:42:40.718 [INFO][3816] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="bd7144cebaec8cd797894ca0e0c7044b082ccacd602e52b49a868a5bbf74cfc6" Namespace="kube-system" Pod="coredns-5d78c9869d-x6762" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--x6762-eth0" Feb 9 19:42:40.879129 env[1111]: 2024-02-09 19:42:40.744 [INFO][3829] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bd7144cebaec8cd797894ca0e0c7044b082ccacd602e52b49a868a5bbf74cfc6" HandleID="k8s-pod-network.bd7144cebaec8cd797894ca0e0c7044b082ccacd602e52b49a868a5bbf74cfc6" Workload="localhost-k8s-coredns--5d78c9869d--x6762-eth0" Feb 9 19:42:40.879129 env[1111]: 2024-02-09 19:42:40.771 [INFO][3829] ipam_plugin.go 268: Auto assigning IP ContainerID="bd7144cebaec8cd797894ca0e0c7044b082ccacd602e52b49a868a5bbf74cfc6" HandleID="k8s-pod-network.bd7144cebaec8cd797894ca0e0c7044b082ccacd602e52b49a868a5bbf74cfc6" Workload="localhost-k8s-coredns--5d78c9869d--x6762-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00025d930), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5d78c9869d-x6762", "timestamp":"2024-02-09 19:42:40.743988932 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:42:40.879129 env[1111]: 2024-02-09 19:42:40.771 [INFO][3829] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:42:40.879129 env[1111]: 2024-02-09 19:42:40.771 [INFO][3829] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:42:40.879129 env[1111]: 2024-02-09 19:42:40.771 [INFO][3829] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 9 19:42:40.879129 env[1111]: 2024-02-09 19:42:40.773 [INFO][3829] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.bd7144cebaec8cd797894ca0e0c7044b082ccacd602e52b49a868a5bbf74cfc6" host="localhost" Feb 9 19:42:40.879129 env[1111]: 2024-02-09 19:42:40.777 [INFO][3829] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 9 19:42:40.879129 env[1111]: 2024-02-09 19:42:40.781 [INFO][3829] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 9 19:42:40.879129 env[1111]: 2024-02-09 19:42:40.782 [INFO][3829] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 9 19:42:40.879129 env[1111]: 2024-02-09 19:42:40.785 [INFO][3829] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 9 19:42:40.879129 env[1111]: 2024-02-09 19:42:40.785 [INFO][3829] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.bd7144cebaec8cd797894ca0e0c7044b082ccacd602e52b49a868a5bbf74cfc6" host="localhost" Feb 9 19:42:40.879129 env[1111]: 2024-02-09 19:42:40.786 [INFO][3829] ipam.go 1682: Creating new handle: k8s-pod-network.bd7144cebaec8cd797894ca0e0c7044b082ccacd602e52b49a868a5bbf74cfc6 Feb 9 19:42:40.879129 env[1111]: 2024-02-09 19:42:40.790 [INFO][3829] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.bd7144cebaec8cd797894ca0e0c7044b082ccacd602e52b49a868a5bbf74cfc6" host="localhost" Feb 9 19:42:40.879129 env[1111]: 2024-02-09 19:42:40.835 [INFO][3829] ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.bd7144cebaec8cd797894ca0e0c7044b082ccacd602e52b49a868a5bbf74cfc6" host="localhost" Feb 9 19:42:40.879129 env[1111]: 2024-02-09 19:42:40.835 [INFO][3829] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.bd7144cebaec8cd797894ca0e0c7044b082ccacd602e52b49a868a5bbf74cfc6" host="localhost" Feb 9 19:42:40.879129 env[1111]: 2024-02-09 19:42:40.835 [INFO][3829] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:42:40.879129 env[1111]: 2024-02-09 19:42:40.835 [INFO][3829] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="bd7144cebaec8cd797894ca0e0c7044b082ccacd602e52b49a868a5bbf74cfc6" HandleID="k8s-pod-network.bd7144cebaec8cd797894ca0e0c7044b082ccacd602e52b49a868a5bbf74cfc6" Workload="localhost-k8s-coredns--5d78c9869d--x6762-eth0" Feb 9 19:42:40.882775 env[1111]: 2024-02-09 19:42:40.840 [INFO][3816] k8s.go 385: Populated endpoint ContainerID="bd7144cebaec8cd797894ca0e0c7044b082ccacd602e52b49a868a5bbf74cfc6" Namespace="kube-system" Pod="coredns-5d78c9869d-x6762" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--x6762-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--x6762-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"bd0dc1b7-cf31-4312-a403-9152a4ac5774", ResourceVersion:"847", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 42, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5d78c9869d-x6762", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2e30b035a60", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:42:40.882775 env[1111]: 2024-02-09 19:42:40.840 [INFO][3816] k8s.go 386: Calico CNI using IPs: [192.168.88.132/32] ContainerID="bd7144cebaec8cd797894ca0e0c7044b082ccacd602e52b49a868a5bbf74cfc6" Namespace="kube-system" Pod="coredns-5d78c9869d-x6762" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--x6762-eth0" Feb 9 19:42:40.882775 env[1111]: 2024-02-09 19:42:40.840 [INFO][3816] dataplane_linux.go 68: Setting the host side veth name to cali2e30b035a60 ContainerID="bd7144cebaec8cd797894ca0e0c7044b082ccacd602e52b49a868a5bbf74cfc6" Namespace="kube-system" Pod="coredns-5d78c9869d-x6762" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--x6762-eth0" Feb 9 19:42:40.882775 env[1111]: 2024-02-09 19:42:40.845 [INFO][3816] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="bd7144cebaec8cd797894ca0e0c7044b082ccacd602e52b49a868a5bbf74cfc6" Namespace="kube-system" Pod="coredns-5d78c9869d-x6762" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--x6762-eth0" Feb 9 19:42:40.882775 env[1111]: 2024-02-09 19:42:40.846 [INFO][3816] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="bd7144cebaec8cd797894ca0e0c7044b082ccacd602e52b49a868a5bbf74cfc6" Namespace="kube-system" Pod="coredns-5d78c9869d-x6762" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--x6762-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--x6762-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"bd0dc1b7-cf31-4312-a403-9152a4ac5774", ResourceVersion:"847", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 42, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"bd7144cebaec8cd797894ca0e0c7044b082ccacd602e52b49a868a5bbf74cfc6", Pod:"coredns-5d78c9869d-x6762", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2e30b035a60", MAC:"9a:cd:12:02:43:9a", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:42:40.882775 env[1111]: 2024-02-09 19:42:40.876 [INFO][3816] k8s.go 491: Wrote updated endpoint to datastore ContainerID="bd7144cebaec8cd797894ca0e0c7044b082ccacd602e52b49a868a5bbf74cfc6" Namespace="kube-system" Pod="coredns-5d78c9869d-x6762" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--x6762-eth0" Feb 9 19:42:40.888000 audit[3857]: NETFILTER_CFG table=filter:108 family=2 entries=38 op=nft_register_chain pid=3857 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:42:40.893642 kernel: audit: type=1325 audit(1707507760.888:1306): table=filter:108 family=2 entries=38 op=nft_register_chain pid=3857 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:42:40.888000 audit[3857]: SYSCALL arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7ffefc635090 a2=0 a3=7ffefc63507c items=0 ppid=3151 pid=3857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:40.888000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:42:40.898730 kernel: audit: type=1300 audit(1707507760.888:1306): arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7ffefc635090 a2=0 a3=7ffefc63507c items=0 ppid=3151 pid=3857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:40.922264 env[1111]: time="2024-02-09T19:42:40.922071278Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:42:40.922264 env[1111]: time="2024-02-09T19:42:40.922209759Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:42:40.922264 env[1111]: time="2024-02-09T19:42:40.922227683Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:42:40.923041 env[1111]: time="2024-02-09T19:42:40.922831486Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bd7144cebaec8cd797894ca0e0c7044b082ccacd602e52b49a868a5bbf74cfc6 pid=3870 runtime=io.containerd.runc.v2 Feb 9 19:42:40.943452 systemd[1]: Started cri-containerd-bd7144cebaec8cd797894ca0e0c7044b082ccacd602e52b49a868a5bbf74cfc6.scope. Feb 9 19:42:40.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.960000 audit: BPF prog-id=165 op=LOAD Feb 9 19:42:40.961000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.961000 audit[3881]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3870 pid=3881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:40.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264373134346365626165633863643739373839346361306530633730 Feb 9 19:42:40.961000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.961000 audit[3881]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3870 pid=3881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:40.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264373134346365626165633863643739373839346361306530633730 Feb 9 19:42:40.961000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.961000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.961000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.961000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.961000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.961000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.961000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.961000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.961000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.961000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.961000 audit: BPF prog-id=166 op=LOAD Feb 9 19:42:40.961000 audit[3881]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003a65a0 items=0 ppid=3870 pid=3881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:40.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264373134346365626165633863643739373839346361306530633730 Feb 9 19:42:40.961000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.961000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.961000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.961000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.961000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.961000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.961000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.961000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.961000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.961000 audit: BPF prog-id=167 op=LOAD Feb 9 19:42:40.961000 audit[3881]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003a65e8 items=0 ppid=3870 pid=3881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:40.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264373134346365626165633863643739373839346361306530633730 Feb 9 19:42:40.961000 audit: BPF prog-id=167 op=UNLOAD Feb 9 19:42:40.961000 audit: BPF prog-id=166 op=UNLOAD Feb 9 19:42:40.961000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.961000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.961000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.961000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.961000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.961000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.961000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.961000 audit[3881]: AVC avc: denied { perfmon } for pid=3881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.961000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.961000 audit[3881]: AVC avc: denied { bpf } for pid=3881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:40.961000 audit: BPF prog-id=168 op=LOAD Feb 9 19:42:40.961000 audit[3881]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003a69f8 items=0 ppid=3870 pid=3881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:40.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264373134346365626165633863643739373839346361306530633730 Feb 9 19:42:40.964507 systemd-resolved[1065]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 19:42:40.991294 env[1111]: time="2024-02-09T19:42:40.991237341Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-x6762,Uid:bd0dc1b7-cf31-4312-a403-9152a4ac5774,Namespace:kube-system,Attempt:1,} returns sandbox id \"bd7144cebaec8cd797894ca0e0c7044b082ccacd602e52b49a868a5bbf74cfc6\"" Feb 9 19:42:40.993185 kubelet[2010]: E0209 19:42:40.992655 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:42:40.995348 env[1111]: time="2024-02-09T19:42:40.995312402Z" level=info msg="CreateContainer within sandbox \"bd7144cebaec8cd797894ca0e0c7044b082ccacd602e52b49a868a5bbf74cfc6\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 19:42:41.000928 sshd[3837]: pam_unix(sshd:session): session closed for user core Feb 9 19:42:41.000000 audit[3837]: USER_END pid=3837 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:41.000000 audit[3837]: CRED_DISP pid=3837 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:41.004357 systemd-logind[1103]: Session 14 logged out. Waiting for processes to exit. Feb 9 19:42:41.004552 systemd[1]: sshd@13-10.0.0.29:22-10.0.0.1:46288.service: Deactivated successfully. Feb 9 19:42:41.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.29:22-10.0.0.1:46288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:41.005260 systemd[1]: session-14.scope: Deactivated successfully. Feb 9 19:42:41.007209 systemd-logind[1103]: Removed session 14. Feb 9 19:42:41.011722 env[1111]: time="2024-02-09T19:42:41.011660467Z" level=info msg="CreateContainer within sandbox \"bd7144cebaec8cd797894ca0e0c7044b082ccacd602e52b49a868a5bbf74cfc6\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"cb6812216c962e87b196125c9073ba5be62608b012b11707925e4ca4c1cf92ea\"" Feb 9 19:42:41.012406 env[1111]: time="2024-02-09T19:42:41.012373791Z" level=info msg="StartContainer for \"cb6812216c962e87b196125c9073ba5be62608b012b11707925e4ca4c1cf92ea\"" Feb 9 19:42:41.031533 systemd[1]: Started cri-containerd-cb6812216c962e87b196125c9073ba5be62608b012b11707925e4ca4c1cf92ea.scope. Feb 9 19:42:41.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.041000 audit: BPF prog-id=169 op=LOAD Feb 9 19:42:41.042000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.042000 audit[3913]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3870 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:41.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362363831323231366339363265383762313936313235633930373362 Feb 9 19:42:41.042000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.042000 audit[3913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3870 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:41.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362363831323231366339363265383762313936313235633930373362 Feb 9 19:42:41.042000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.042000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.042000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.042000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.042000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.042000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.042000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.042000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.042000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.042000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.042000 audit: BPF prog-id=170 op=LOAD Feb 9 19:42:41.042000 audit[3913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000218510 items=0 ppid=3870 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:41.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362363831323231366339363265383762313936313235633930373362 Feb 9 19:42:41.042000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.042000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.042000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.042000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.042000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.042000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.042000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.042000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.042000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.042000 audit: BPF prog-id=171 op=LOAD Feb 9 19:42:41.042000 audit[3913]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000218558 items=0 ppid=3870 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:41.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362363831323231366339363265383762313936313235633930373362 Feb 9 19:42:41.042000 audit: BPF prog-id=171 op=UNLOAD Feb 9 19:42:41.042000 audit: BPF prog-id=170 op=UNLOAD Feb 9 19:42:41.042000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.042000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.042000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.042000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.042000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.042000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.042000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.042000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.042000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.042000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:41.042000 audit: BPF prog-id=172 op=LOAD Feb 9 19:42:41.042000 audit[3913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000218968 items=0 ppid=3870 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:41.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362363831323231366339363265383762313936313235633930373362 Feb 9 19:42:41.060878 env[1111]: time="2024-02-09T19:42:41.060829382Z" level=info msg="StartContainer for \"cb6812216c962e87b196125c9073ba5be62608b012b11707925e4ca4c1cf92ea\" returns successfully" Feb 9 19:42:41.494728 kubelet[2010]: E0209 19:42:41.494691 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:42:41.495125 kubelet[2010]: E0209 19:42:41.494821 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:42:41.514623 kubelet[2010]: I0209 19:42:41.514350 2010 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-x6762" podStartSLOduration=38.514315598 podCreationTimestamp="2024-02-09 19:42:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:42:41.514276022 +0000 UTC m=+52.261755058" watchObservedRunningTime="2024-02-09 19:42:41.514315598 +0000 UTC m=+52.261794614" Feb 9 19:42:41.522000 audit[3951]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=3951 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:42:41.522000 audit[3951]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd7f5edf10 a2=0 a3=7ffd7f5edefc items=0 ppid=2172 pid=3951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:41.522000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:42:41.523000 audit[3951]: NETFILTER_CFG table=nat:110 family=2 entries=44 op=nft_register_rule pid=3951 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:42:41.523000 audit[3951]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffd7f5edf10 a2=0 a3=7ffd7f5edefc items=0 ppid=2172 pid=3951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:41.523000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:42:41.972456 env[1111]: time="2024-02-09T19:42:41.972386123Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:42.007411 env[1111]: time="2024-02-09T19:42:42.007345903Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:42.019316 env[1111]: time="2024-02-09T19:42:42.019260369Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:42.029953 env[1111]: time="2024-02-09T19:42:42.029898758Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:42.030359 env[1111]: time="2024-02-09T19:42:42.030334306Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 9 19:42:42.032269 env[1111]: time="2024-02-09T19:42:42.032246778Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 9 19:42:42.033284 env[1111]: time="2024-02-09T19:42:42.033263255Z" level=info msg="CreateContainer within sandbox \"8ee33eba5bdda2c18b59fa658e2ca7477172365bf824afb95a2173776870e693\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 19:42:42.101563 env[1111]: time="2024-02-09T19:42:42.101494570Z" level=info msg="CreateContainer within sandbox \"8ee33eba5bdda2c18b59fa658e2ca7477172365bf824afb95a2173776870e693\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"8f6ac7646a207170091bae892eb6167e3153c2caf3154e4c6b5f8f45fec67cda\"" Feb 9 19:42:42.102570 env[1111]: time="2024-02-09T19:42:42.102540724Z" level=info msg="StartContainer for \"8f6ac7646a207170091bae892eb6167e3153c2caf3154e4c6b5f8f45fec67cda\"" Feb 9 19:42:42.110820 systemd-networkd[1012]: cali2e30b035a60: Gained IPv6LL Feb 9 19:42:42.130850 systemd[1]: Started cri-containerd-8f6ac7646a207170091bae892eb6167e3153c2caf3154e4c6b5f8f45fec67cda.scope. Feb 9 19:42:42.142000 audit[3963]: AVC avc: denied { perfmon } for pid=3963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:42.142000 audit[3963]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3421 pid=3963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:42.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866366163373634366132303731373030393162616538393265623631 Feb 9 19:42:42.142000 audit[3963]: AVC avc: denied { bpf } for pid=3963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:42.142000 audit[3963]: AVC avc: denied { bpf } for pid=3963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:42.142000 audit[3963]: AVC avc: denied { bpf } for pid=3963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:42.142000 audit[3963]: AVC avc: denied { perfmon } for pid=3963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:42.142000 audit[3963]: AVC avc: denied { perfmon } for pid=3963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:42.142000 audit[3963]: AVC avc: denied { perfmon } for pid=3963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:42.142000 audit[3963]: AVC avc: denied { perfmon } for pid=3963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:42.142000 audit[3963]: AVC avc: denied { perfmon } for pid=3963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:42.142000 audit[3963]: AVC avc: denied { bpf } for pid=3963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:42.142000 audit[3963]: AVC avc: denied { bpf } for pid=3963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:42.142000 audit: BPF prog-id=173 op=LOAD Feb 9 19:42:42.142000 audit[3963]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003b4130 items=0 ppid=3421 pid=3963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:42.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866366163373634366132303731373030393162616538393265623631 Feb 9 19:42:42.142000 audit[3963]: AVC avc: denied { bpf } for pid=3963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:42.142000 audit[3963]: AVC avc: denied { bpf } for pid=3963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:42.142000 audit[3963]: AVC avc: denied { perfmon } for pid=3963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:42.142000 audit[3963]: AVC avc: denied { perfmon } for pid=3963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:42.142000 audit[3963]: AVC avc: denied { perfmon } for pid=3963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:42.142000 audit[3963]: AVC avc: denied { perfmon } for pid=3963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:42.142000 audit[3963]: AVC avc: denied { perfmon } for pid=3963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:42.142000 audit[3963]: AVC avc: denied { bpf } for pid=3963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:42.142000 audit[3963]: AVC avc: denied { bpf } for pid=3963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:42.142000 audit: BPF prog-id=174 op=LOAD Feb 9 19:42:42.142000 audit[3963]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003b4178 items=0 ppid=3421 pid=3963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:42.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866366163373634366132303731373030393162616538393265623631 Feb 9 19:42:42.142000 audit: BPF prog-id=174 op=UNLOAD Feb 9 19:42:42.142000 audit: BPF prog-id=173 op=UNLOAD Feb 9 19:42:42.142000 audit[3963]: AVC avc: denied { bpf } for pid=3963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:42.142000 audit[3963]: AVC avc: denied { bpf } for pid=3963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:42.142000 audit[3963]: AVC avc: denied { bpf } for pid=3963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:42.142000 audit[3963]: AVC avc: denied { perfmon } for pid=3963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:42.142000 audit[3963]: AVC avc: denied { perfmon } for pid=3963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:42.142000 audit[3963]: AVC avc: denied { perfmon } for pid=3963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:42.142000 audit[3963]: AVC avc: denied { perfmon } for pid=3963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:42.142000 audit[3963]: AVC avc: denied { perfmon } for pid=3963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:42.142000 audit[3963]: AVC avc: denied { bpf } for pid=3963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:42.142000 audit[3963]: AVC avc: denied { bpf } for pid=3963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:42.142000 audit: BPF prog-id=175 op=LOAD Feb 9 19:42:42.142000 audit[3963]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003b4208 items=0 ppid=3421 pid=3963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:42.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866366163373634366132303731373030393162616538393265623631 Feb 9 19:42:42.156955 env[1111]: time="2024-02-09T19:42:42.156916799Z" level=info msg="StartContainer for \"8f6ac7646a207170091bae892eb6167e3153c2caf3154e4c6b5f8f45fec67cda\" returns successfully" Feb 9 19:42:42.422451 kubelet[2010]: I0209 19:42:42.422417 2010 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 19:42:42.422846 kubelet[2010]: I0209 19:42:42.422829 2010 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 19:42:42.499791 kubelet[2010]: E0209 19:42:42.499763 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:42:42.518780 kubelet[2010]: I0209 19:42:42.518732 2010 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-n2n88" podStartSLOduration=28.723212341 podCreationTimestamp="2024-02-09 19:42:09 +0000 UTC" firstStartedPulling="2024-02-09 19:42:37.235770071 +0000 UTC m=+47.983249087" lastFinishedPulling="2024-02-09 19:42:42.031227075 +0000 UTC m=+52.778706091" observedRunningTime="2024-02-09 19:42:42.510055203 +0000 UTC m=+53.257534239" watchObservedRunningTime="2024-02-09 19:42:42.518669345 +0000 UTC m=+53.266148361" Feb 9 19:42:42.528000 audit[3994]: NETFILTER_CFG table=filter:111 family=2 entries=8 op=nft_register_rule pid=3994 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:42:42.528000 audit[3994]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd20493840 a2=0 a3=7ffd2049382c items=0 ppid=2172 pid=3994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:42.528000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:42:42.533000 audit[3994]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=3994 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:42:42.533000 audit[3994]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7ffd20493840 a2=0 a3=7ffd2049382c items=0 ppid=2172 pid=3994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:42.533000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:42:43.501998 kubelet[2010]: E0209 19:42:43.501962 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:42:45.588000 audit[1865]: AVC avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c314,c980 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:45.588000 audit[1865]: AVC avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c314,c980 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:45.588000 audit[1865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000b36180 a2=fc6 a3=0 items=0 ppid=1743 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c314,c980 key=(null) Feb 9 19:42:45.588000 audit[1865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025ebb30 a2=fc6 a3=0 items=0 ppid=1743 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c314,c980 key=(null) Feb 9 19:42:45.588000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:42:45.588000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:42:46.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.29:22-10.0.0.1:46292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:46.004221 systemd[1]: Started sshd@14-10.0.0.29:22-10.0.0.1:46292.service. Feb 9 19:42:46.005292 kernel: kauditd_printk_skb: 179 callbacks suppressed Feb 9 19:42:46.005361 kernel: audit: type=1130 audit(1707507766.003:1358): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.29:22-10.0.0.1:46292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:46.024000 audit[1881]: AVC avc: denied { watch } for pid=1881 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c530,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:46.024000 audit[1881]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00a3e9140 a2=fc6 a3=0 items=0 ppid=1706 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c530,c739 key=(null) Feb 9 19:42:46.035063 kernel: audit: type=1400 audit(1707507766.024:1359): avc: denied { watch } for pid=1881 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c530,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:46.035190 kernel: audit: type=1300 audit(1707507766.024:1359): arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00a3e9140 a2=fc6 a3=0 items=0 ppid=1706 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c530,c739 key=(null) Feb 9 19:42:46.035225 kernel: audit: type=1327 audit(1707507766.024:1359): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 9 19:42:46.024000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 9 19:42:46.024000 audit[1881]: AVC avc: denied { watch } for pid=1881 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520995 scontext=system_u:system_r:svirt_lxc_net_t:s0:c530,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:46.040898 kernel: audit: type=1400 audit(1707507766.024:1360): avc: denied { watch } for pid=1881 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520995 scontext=system_u:system_r:svirt_lxc_net_t:s0:c530,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:46.040962 kernel: audit: type=1300 audit(1707507766.024:1360): arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00a84c3f0 a2=fc6 a3=0 items=0 ppid=1706 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c530,c739 key=(null) Feb 9 19:42:46.024000 audit[1881]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00a84c3f0 a2=fc6 a3=0 items=0 ppid=1706 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c530,c739 key=(null) Feb 9 19:42:46.024000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 9 19:42:46.045037 sshd[4000]: Accepted publickey for core from 10.0.0.1 port 46292 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:42:46.047302 kernel: audit: type=1327 audit(1707507766.024:1360): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 9 19:42:46.047382 kernel: audit: type=1400 audit(1707507766.025:1361): avc: denied { watch } for pid=1881 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c530,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:46.025000 audit[1881]: AVC avc: denied { watch } for pid=1881 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c530,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:46.048125 sshd[4000]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:42:46.025000 audit[1881]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00a84c420 a2=fc6 a3=0 items=0 ppid=1706 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c530,c739 key=(null) Feb 9 19:42:46.054664 kernel: audit: type=1300 audit(1707507766.025:1361): arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00a84c420 a2=fc6 a3=0 items=0 ppid=1706 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c530,c739 key=(null) Feb 9 19:42:46.025000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 9 19:42:46.058024 kernel: audit: type=1327 audit(1707507766.025:1361): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 9 19:42:46.025000 audit[1881]: AVC avc: denied { watch } for pid=1881 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c530,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:46.025000 audit[1881]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00f7d7560 a2=fc6 a3=0 items=0 ppid=1706 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c530,c739 key=(null) Feb 9 19:42:46.025000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 9 19:42:46.026000 audit[1881]: AVC avc: denied { watch } for pid=1881 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c530,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:46.026000 audit[1881]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00fa185a0 a2=fc6 a3=0 items=0 ppid=1706 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c530,c739 key=(null) Feb 9 19:42:46.026000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 9 19:42:46.026000 audit[1881]: AVC avc: denied { watch } for pid=1881 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c530,c739 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:46.026000 audit[1881]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00a3e9200 a2=fc6 a3=0 items=0 ppid=1706 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c530,c739 key=(null) Feb 9 19:42:46.026000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Feb 9 19:42:46.044000 audit[4000]: USER_ACCT pid=4000 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:46.047000 audit[4000]: CRED_ACQ pid=4000 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:46.047000 audit[4000]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9dc11480 a2=3 a3=0 items=0 ppid=1 pid=4000 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:46.047000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:42:46.059412 systemd[1]: Started session-15.scope. Feb 9 19:42:46.060864 systemd-logind[1103]: New session 15 of user core. Feb 9 19:42:46.064000 audit[4000]: USER_START pid=4000 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:46.066000 audit[4002]: CRED_ACQ pid=4002 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:46.180551 sshd[4000]: pam_unix(sshd:session): session closed for user core Feb 9 19:42:46.181000 audit[4000]: USER_END pid=4000 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:46.181000 audit[4000]: CRED_DISP pid=4000 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:46.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.29:22-10.0.0.1:46292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:46.183276 systemd[1]: sshd@14-10.0.0.29:22-10.0.0.1:46292.service: Deactivated successfully. Feb 9 19:42:46.184143 systemd[1]: session-15.scope: Deactivated successfully. Feb 9 19:42:46.184678 systemd-logind[1103]: Session 15 logged out. Waiting for processes to exit. Feb 9 19:42:46.185302 systemd-logind[1103]: Removed session 15. Feb 9 19:42:46.274629 env[1111]: time="2024-02-09T19:42:46.274432116Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:46.276681 env[1111]: time="2024-02-09T19:42:46.276652893Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:46.279452 env[1111]: time="2024-02-09T19:42:46.279389659Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:46.281315 env[1111]: time="2024-02-09T19:42:46.281277055Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:46.282225 env[1111]: time="2024-02-09T19:42:46.282193907Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 9 19:42:46.291272 env[1111]: time="2024-02-09T19:42:46.291233440Z" level=info msg="CreateContainer within sandbox \"2ddac61f951a2568f63bf6999032bb6e5fd6434fd2382d06d65a1ea5c9a332d0\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 9 19:42:46.309270 env[1111]: time="2024-02-09T19:42:46.309193130Z" level=info msg="CreateContainer within sandbox \"2ddac61f951a2568f63bf6999032bb6e5fd6434fd2382d06d65a1ea5c9a332d0\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"31a2153d873b945f2afc1ceb613163345d2718e5499cb1102408717c90a53bfe\"" Feb 9 19:42:46.310512 env[1111]: time="2024-02-09T19:42:46.310479821Z" level=info msg="StartContainer for \"31a2153d873b945f2afc1ceb613163345d2718e5499cb1102408717c90a53bfe\"" Feb 9 19:42:46.332887 systemd[1]: Started cri-containerd-31a2153d873b945f2afc1ceb613163345d2718e5499cb1102408717c90a53bfe.scope. Feb 9 19:42:46.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.346000 audit: BPF prog-id=176 op=LOAD Feb 9 19:42:46.347000 audit[4028]: AVC avc: denied { bpf } for pid=4028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.347000 audit[4028]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3750 pid=4028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:46.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331613231353364383733623934356632616663316365623631333136 Feb 9 19:42:46.347000 audit[4028]: AVC avc: denied { perfmon } for pid=4028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.347000 audit[4028]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3750 pid=4028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:46.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331613231353364383733623934356632616663316365623631333136 Feb 9 19:42:46.347000 audit[4028]: AVC avc: denied { bpf } for pid=4028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.347000 audit[4028]: AVC avc: denied { bpf } for pid=4028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.347000 audit[4028]: AVC avc: denied { bpf } for pid=4028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.347000 audit[4028]: AVC avc: denied { perfmon } for pid=4028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.347000 audit[4028]: AVC avc: denied { perfmon } for pid=4028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.347000 audit[4028]: AVC avc: denied { perfmon } for pid=4028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.347000 audit[4028]: AVC avc: denied { perfmon } for pid=4028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.347000 audit[4028]: AVC avc: denied { perfmon } for pid=4028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.347000 audit[4028]: AVC avc: denied { bpf } for pid=4028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.347000 audit[4028]: AVC avc: denied { bpf } for pid=4028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.347000 audit: BPF prog-id=177 op=LOAD Feb 9 19:42:46.347000 audit[4028]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003da990 items=0 ppid=3750 pid=4028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:46.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331613231353364383733623934356632616663316365623631333136 Feb 9 19:42:46.347000 audit[4028]: AVC avc: denied { bpf } for pid=4028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.347000 audit[4028]: AVC avc: denied { bpf } for pid=4028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.347000 audit[4028]: AVC avc: denied { perfmon } for pid=4028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.347000 audit[4028]: AVC avc: denied { perfmon } for pid=4028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.347000 audit[4028]: AVC avc: denied { perfmon } for pid=4028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.347000 audit[4028]: AVC avc: denied { perfmon } for pid=4028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.347000 audit[4028]: AVC avc: denied { perfmon } for pid=4028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.347000 audit[4028]: AVC avc: denied { bpf } for pid=4028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.347000 audit[4028]: AVC avc: denied { bpf } for pid=4028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.347000 audit: BPF prog-id=178 op=LOAD Feb 9 19:42:46.347000 audit[4028]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003da9d8 items=0 ppid=3750 pid=4028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:46.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331613231353364383733623934356632616663316365623631333136 Feb 9 19:42:46.347000 audit: BPF prog-id=178 op=UNLOAD Feb 9 19:42:46.347000 audit: BPF prog-id=177 op=UNLOAD Feb 9 19:42:46.347000 audit[4028]: AVC avc: denied { bpf } for pid=4028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.347000 audit[4028]: AVC avc: denied { bpf } for pid=4028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.347000 audit[4028]: AVC avc: denied { bpf } for pid=4028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.347000 audit[4028]: AVC avc: denied { perfmon } for pid=4028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.347000 audit[4028]: AVC avc: denied { perfmon } for pid=4028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.347000 audit[4028]: AVC avc: denied { perfmon } for pid=4028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.347000 audit[4028]: AVC avc: denied { perfmon } for pid=4028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.347000 audit[4028]: AVC avc: denied { perfmon } for pid=4028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.347000 audit[4028]: AVC avc: denied { bpf } for pid=4028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.347000 audit[4028]: AVC avc: denied { bpf } for pid=4028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:46.347000 audit: BPF prog-id=179 op=LOAD Feb 9 19:42:46.347000 audit[4028]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003dade8 items=0 ppid=3750 pid=4028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:46.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331613231353364383733623934356632616663316365623631333136 Feb 9 19:42:46.455595 env[1111]: time="2024-02-09T19:42:46.455516866Z" level=info msg="StartContainer for \"31a2153d873b945f2afc1ceb613163345d2718e5499cb1102408717c90a53bfe\" returns successfully" Feb 9 19:42:46.596466 kubelet[2010]: I0209 19:42:46.596429 2010 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-856df5c4fb-csmth" podStartSLOduration=30.999401624 podCreationTimestamp="2024-02-09 19:42:09 +0000 UTC" firstStartedPulling="2024-02-09 19:42:39.685522567 +0000 UTC m=+50.433001573" lastFinishedPulling="2024-02-09 19:42:46.282510685 +0000 UTC m=+57.029989701" observedRunningTime="2024-02-09 19:42:46.586709567 +0000 UTC m=+57.334188583" watchObservedRunningTime="2024-02-09 19:42:46.596389752 +0000 UTC m=+57.343868768" Feb 9 19:42:47.289459 systemd[1]: run-containerd-runc-k8s.io-31a2153d873b945f2afc1ceb613163345d2718e5499cb1102408717c90a53bfe-runc.tNZSS7.mount: Deactivated successfully. Feb 9 19:42:49.334066 env[1111]: time="2024-02-09T19:42:49.334022025Z" level=info msg="StopPodSandbox for \"8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32\"" Feb 9 19:42:49.395647 env[1111]: 2024-02-09 19:42:49.368 [WARNING][4094] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--jrt4g-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"6b291e45-a45d-494e-a1f8-c189616e7a34", ResourceVersion:"836", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 42, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"39a49351787cbbe76776d496747d5828cc4847fe2f12fe92c1f99e43b6891413", Pod:"coredns-5d78c9869d-jrt4g", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia500e98941d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:42:49.395647 env[1111]: 2024-02-09 19:42:49.368 [INFO][4094] k8s.go 578: Cleaning up netns ContainerID="8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" Feb 9 19:42:49.395647 env[1111]: 2024-02-09 19:42:49.368 [INFO][4094] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" iface="eth0" netns="" Feb 9 19:42:49.395647 env[1111]: 2024-02-09 19:42:49.368 [INFO][4094] k8s.go 585: Releasing IP address(es) ContainerID="8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" Feb 9 19:42:49.395647 env[1111]: 2024-02-09 19:42:49.368 [INFO][4094] utils.go 188: Calico CNI releasing IP address ContainerID="8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" Feb 9 19:42:49.395647 env[1111]: 2024-02-09 19:42:49.384 [INFO][4105] ipam_plugin.go 415: Releasing address using handleID ContainerID="8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" HandleID="k8s-pod-network.8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" Workload="localhost-k8s-coredns--5d78c9869d--jrt4g-eth0" Feb 9 19:42:49.395647 env[1111]: 2024-02-09 19:42:49.384 [INFO][4105] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:42:49.395647 env[1111]: 2024-02-09 19:42:49.384 [INFO][4105] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:42:49.395647 env[1111]: 2024-02-09 19:42:49.391 [WARNING][4105] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" HandleID="k8s-pod-network.8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" Workload="localhost-k8s-coredns--5d78c9869d--jrt4g-eth0" Feb 9 19:42:49.395647 env[1111]: 2024-02-09 19:42:49.391 [INFO][4105] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" HandleID="k8s-pod-network.8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" Workload="localhost-k8s-coredns--5d78c9869d--jrt4g-eth0" Feb 9 19:42:49.395647 env[1111]: 2024-02-09 19:42:49.392 [INFO][4105] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:42:49.395647 env[1111]: 2024-02-09 19:42:49.393 [INFO][4094] k8s.go 591: Teardown processing complete. ContainerID="8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" Feb 9 19:42:49.395647 env[1111]: time="2024-02-09T19:42:49.395652473Z" level=info msg="TearDown network for sandbox \"8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32\" successfully" Feb 9 19:42:49.396429 env[1111]: time="2024-02-09T19:42:49.395691048Z" level=info msg="StopPodSandbox for \"8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32\" returns successfully" Feb 9 19:42:49.396623 env[1111]: time="2024-02-09T19:42:49.396561758Z" level=info msg="RemovePodSandbox for \"8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32\"" Feb 9 19:42:49.396693 env[1111]: time="2024-02-09T19:42:49.396590643Z" level=info msg="Forcibly stopping sandbox \"8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32\"" Feb 9 19:42:49.463253 env[1111]: 2024-02-09 19:42:49.432 [WARNING][4128] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--jrt4g-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"6b291e45-a45d-494e-a1f8-c189616e7a34", ResourceVersion:"836", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 42, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"39a49351787cbbe76776d496747d5828cc4847fe2f12fe92c1f99e43b6891413", Pod:"coredns-5d78c9869d-jrt4g", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia500e98941d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:42:49.463253 env[1111]: 2024-02-09 19:42:49.432 [INFO][4128] k8s.go 578: Cleaning up netns ContainerID="8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" Feb 9 19:42:49.463253 env[1111]: 2024-02-09 19:42:49.432 [INFO][4128] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" iface="eth0" netns="" Feb 9 19:42:49.463253 env[1111]: 2024-02-09 19:42:49.432 [INFO][4128] k8s.go 585: Releasing IP address(es) ContainerID="8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" Feb 9 19:42:49.463253 env[1111]: 2024-02-09 19:42:49.433 [INFO][4128] utils.go 188: Calico CNI releasing IP address ContainerID="8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" Feb 9 19:42:49.463253 env[1111]: 2024-02-09 19:42:49.451 [INFO][4136] ipam_plugin.go 415: Releasing address using handleID ContainerID="8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" HandleID="k8s-pod-network.8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" Workload="localhost-k8s-coredns--5d78c9869d--jrt4g-eth0" Feb 9 19:42:49.463253 env[1111]: 2024-02-09 19:42:49.451 [INFO][4136] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:42:49.463253 env[1111]: 2024-02-09 19:42:49.451 [INFO][4136] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:42:49.463253 env[1111]: 2024-02-09 19:42:49.458 [WARNING][4136] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" HandleID="k8s-pod-network.8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" Workload="localhost-k8s-coredns--5d78c9869d--jrt4g-eth0" Feb 9 19:42:49.463253 env[1111]: 2024-02-09 19:42:49.458 [INFO][4136] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" HandleID="k8s-pod-network.8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" Workload="localhost-k8s-coredns--5d78c9869d--jrt4g-eth0" Feb 9 19:42:49.463253 env[1111]: 2024-02-09 19:42:49.460 [INFO][4136] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:42:49.463253 env[1111]: 2024-02-09 19:42:49.461 [INFO][4128] k8s.go 591: Teardown processing complete. ContainerID="8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32" Feb 9 19:42:49.463927 env[1111]: time="2024-02-09T19:42:49.463293943Z" level=info msg="TearDown network for sandbox \"8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32\" successfully" Feb 9 19:42:49.467076 env[1111]: time="2024-02-09T19:42:49.467035450Z" level=info msg="RemovePodSandbox \"8da25513b2c1bb0eccd54decc87c6b9003784268d01aeb2aaa1506d3e12a5c32\" returns successfully" Feb 9 19:42:49.467821 env[1111]: time="2024-02-09T19:42:49.467772934Z" level=info msg="StopPodSandbox for \"fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e\"" Feb 9 19:42:49.536761 env[1111]: 2024-02-09 19:42:49.504 [WARNING][4158] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--856df5c4fb--csmth-eth0", GenerateName:"calico-kube-controllers-856df5c4fb-", Namespace:"calico-system", SelfLink:"", UID:"aa5e91fd-a53f-4816-9d38-2537adca9f7f", ResourceVersion:"909", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 42, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"856df5c4fb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2ddac61f951a2568f63bf6999032bb6e5fd6434fd2382d06d65a1ea5c9a332d0", Pod:"calico-kube-controllers-856df5c4fb-csmth", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali1a3b66974a4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:42:49.536761 env[1111]: 2024-02-09 19:42:49.505 [INFO][4158] k8s.go 578: Cleaning up netns ContainerID="fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" Feb 9 19:42:49.536761 env[1111]: 2024-02-09 19:42:49.505 [INFO][4158] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" iface="eth0" netns="" Feb 9 19:42:49.536761 env[1111]: 2024-02-09 19:42:49.505 [INFO][4158] k8s.go 585: Releasing IP address(es) ContainerID="fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" Feb 9 19:42:49.536761 env[1111]: 2024-02-09 19:42:49.505 [INFO][4158] utils.go 188: Calico CNI releasing IP address ContainerID="fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" Feb 9 19:42:49.536761 env[1111]: 2024-02-09 19:42:49.524 [INFO][4166] ipam_plugin.go 415: Releasing address using handleID ContainerID="fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" HandleID="k8s-pod-network.fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" Workload="localhost-k8s-calico--kube--controllers--856df5c4fb--csmth-eth0" Feb 9 19:42:49.536761 env[1111]: 2024-02-09 19:42:49.524 [INFO][4166] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:42:49.536761 env[1111]: 2024-02-09 19:42:49.524 [INFO][4166] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:42:49.536761 env[1111]: 2024-02-09 19:42:49.532 [WARNING][4166] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" HandleID="k8s-pod-network.fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" Workload="localhost-k8s-calico--kube--controllers--856df5c4fb--csmth-eth0" Feb 9 19:42:49.536761 env[1111]: 2024-02-09 19:42:49.532 [INFO][4166] ipam_plugin.go 443: Releasing address using workloadID ContainerID="fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" HandleID="k8s-pod-network.fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" Workload="localhost-k8s-calico--kube--controllers--856df5c4fb--csmth-eth0" Feb 9 19:42:49.536761 env[1111]: 2024-02-09 19:42:49.533 [INFO][4166] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:42:49.536761 env[1111]: 2024-02-09 19:42:49.535 [INFO][4158] k8s.go 591: Teardown processing complete. ContainerID="fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" Feb 9 19:42:49.537332 env[1111]: time="2024-02-09T19:42:49.536787736Z" level=info msg="TearDown network for sandbox \"fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e\" successfully" Feb 9 19:42:49.537332 env[1111]: time="2024-02-09T19:42:49.536820760Z" level=info msg="StopPodSandbox for \"fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e\" returns successfully" Feb 9 19:42:49.537556 env[1111]: time="2024-02-09T19:42:49.537529098Z" level=info msg="RemovePodSandbox for \"fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e\"" Feb 9 19:42:49.537634 env[1111]: time="2024-02-09T19:42:49.537561712Z" level=info msg="Forcibly stopping sandbox \"fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e\"" Feb 9 19:42:49.603207 env[1111]: 2024-02-09 19:42:49.570 [WARNING][4189] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--856df5c4fb--csmth-eth0", GenerateName:"calico-kube-controllers-856df5c4fb-", Namespace:"calico-system", SelfLink:"", UID:"aa5e91fd-a53f-4816-9d38-2537adca9f7f", ResourceVersion:"909", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 42, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"856df5c4fb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2ddac61f951a2568f63bf6999032bb6e5fd6434fd2382d06d65a1ea5c9a332d0", Pod:"calico-kube-controllers-856df5c4fb-csmth", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali1a3b66974a4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:42:49.603207 env[1111]: 2024-02-09 19:42:49.570 [INFO][4189] k8s.go 578: Cleaning up netns ContainerID="fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" Feb 9 19:42:49.603207 env[1111]: 2024-02-09 19:42:49.570 [INFO][4189] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" iface="eth0" netns="" Feb 9 19:42:49.603207 env[1111]: 2024-02-09 19:42:49.570 [INFO][4189] k8s.go 585: Releasing IP address(es) ContainerID="fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" Feb 9 19:42:49.603207 env[1111]: 2024-02-09 19:42:49.570 [INFO][4189] utils.go 188: Calico CNI releasing IP address ContainerID="fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" Feb 9 19:42:49.603207 env[1111]: 2024-02-09 19:42:49.590 [INFO][4196] ipam_plugin.go 415: Releasing address using handleID ContainerID="fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" HandleID="k8s-pod-network.fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" Workload="localhost-k8s-calico--kube--controllers--856df5c4fb--csmth-eth0" Feb 9 19:42:49.603207 env[1111]: 2024-02-09 19:42:49.590 [INFO][4196] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:42:49.603207 env[1111]: 2024-02-09 19:42:49.590 [INFO][4196] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:42:49.603207 env[1111]: 2024-02-09 19:42:49.598 [WARNING][4196] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" HandleID="k8s-pod-network.fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" Workload="localhost-k8s-calico--kube--controllers--856df5c4fb--csmth-eth0" Feb 9 19:42:49.603207 env[1111]: 2024-02-09 19:42:49.598 [INFO][4196] ipam_plugin.go 443: Releasing address using workloadID ContainerID="fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" HandleID="k8s-pod-network.fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" Workload="localhost-k8s-calico--kube--controllers--856df5c4fb--csmth-eth0" Feb 9 19:42:49.603207 env[1111]: 2024-02-09 19:42:49.599 [INFO][4196] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:42:49.603207 env[1111]: 2024-02-09 19:42:49.601 [INFO][4189] k8s.go 591: Teardown processing complete. ContainerID="fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e" Feb 9 19:42:49.603207 env[1111]: time="2024-02-09T19:42:49.603132257Z" level=info msg="TearDown network for sandbox \"fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e\" successfully" Feb 9 19:42:49.606253 env[1111]: time="2024-02-09T19:42:49.606211154Z" level=info msg="RemovePodSandbox \"fd8e793633f6de2bdd2676f3086ab88cf97922253da89cc970da85b7def8bf7e\" returns successfully" Feb 9 19:42:49.606899 env[1111]: time="2024-02-09T19:42:49.606853295Z" level=info msg="StopPodSandbox for \"86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b\"" Feb 9 19:42:49.679347 env[1111]: 2024-02-09 19:42:49.640 [WARNING][4219] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--x6762-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"bd0dc1b7-cf31-4312-a403-9152a4ac5774", ResourceVersion:"887", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 42, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"bd7144cebaec8cd797894ca0e0c7044b082ccacd602e52b49a868a5bbf74cfc6", Pod:"coredns-5d78c9869d-x6762", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2e30b035a60", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:42:49.679347 env[1111]: 2024-02-09 19:42:49.641 [INFO][4219] k8s.go 578: Cleaning up netns ContainerID="86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" Feb 9 19:42:49.679347 env[1111]: 2024-02-09 19:42:49.641 [INFO][4219] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" iface="eth0" netns="" Feb 9 19:42:49.679347 env[1111]: 2024-02-09 19:42:49.641 [INFO][4219] k8s.go 585: Releasing IP address(es) ContainerID="86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" Feb 9 19:42:49.679347 env[1111]: 2024-02-09 19:42:49.641 [INFO][4219] utils.go 188: Calico CNI releasing IP address ContainerID="86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" Feb 9 19:42:49.679347 env[1111]: 2024-02-09 19:42:49.664 [INFO][4227] ipam_plugin.go 415: Releasing address using handleID ContainerID="86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" HandleID="k8s-pod-network.86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" Workload="localhost-k8s-coredns--5d78c9869d--x6762-eth0" Feb 9 19:42:49.679347 env[1111]: 2024-02-09 19:42:49.665 [INFO][4227] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:42:49.679347 env[1111]: 2024-02-09 19:42:49.665 [INFO][4227] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:42:49.679347 env[1111]: 2024-02-09 19:42:49.673 [WARNING][4227] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" HandleID="k8s-pod-network.86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" Workload="localhost-k8s-coredns--5d78c9869d--x6762-eth0" Feb 9 19:42:49.679347 env[1111]: 2024-02-09 19:42:49.673 [INFO][4227] ipam_plugin.go 443: Releasing address using workloadID ContainerID="86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" HandleID="k8s-pod-network.86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" Workload="localhost-k8s-coredns--5d78c9869d--x6762-eth0" Feb 9 19:42:49.679347 env[1111]: 2024-02-09 19:42:49.674 [INFO][4227] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:42:49.679347 env[1111]: 2024-02-09 19:42:49.676 [INFO][4219] k8s.go 591: Teardown processing complete. ContainerID="86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" Feb 9 19:42:49.680020 env[1111]: time="2024-02-09T19:42:49.679392107Z" level=info msg="TearDown network for sandbox \"86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b\" successfully" Feb 9 19:42:49.680020 env[1111]: time="2024-02-09T19:42:49.679433126Z" level=info msg="StopPodSandbox for \"86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b\" returns successfully" Feb 9 19:42:49.680206 env[1111]: time="2024-02-09T19:42:49.680159189Z" level=info msg="RemovePodSandbox for \"86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b\"" Feb 9 19:42:49.680256 env[1111]: time="2024-02-09T19:42:49.680217440Z" level=info msg="Forcibly stopping sandbox \"86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b\"" Feb 9 19:42:49.742354 env[1111]: 2024-02-09 19:42:49.712 [WARNING][4249] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--x6762-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"bd0dc1b7-cf31-4312-a403-9152a4ac5774", ResourceVersion:"887", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 42, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"bd7144cebaec8cd797894ca0e0c7044b082ccacd602e52b49a868a5bbf74cfc6", Pod:"coredns-5d78c9869d-x6762", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2e30b035a60", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:42:49.742354 env[1111]: 2024-02-09 19:42:49.713 [INFO][4249] k8s.go 578: Cleaning up netns ContainerID="86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" Feb 9 19:42:49.742354 env[1111]: 2024-02-09 19:42:49.713 [INFO][4249] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" iface="eth0" netns="" Feb 9 19:42:49.742354 env[1111]: 2024-02-09 19:42:49.713 [INFO][4249] k8s.go 585: Releasing IP address(es) ContainerID="86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" Feb 9 19:42:49.742354 env[1111]: 2024-02-09 19:42:49.713 [INFO][4249] utils.go 188: Calico CNI releasing IP address ContainerID="86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" Feb 9 19:42:49.742354 env[1111]: 2024-02-09 19:42:49.729 [INFO][4257] ipam_plugin.go 415: Releasing address using handleID ContainerID="86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" HandleID="k8s-pod-network.86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" Workload="localhost-k8s-coredns--5d78c9869d--x6762-eth0" Feb 9 19:42:49.742354 env[1111]: 2024-02-09 19:42:49.729 [INFO][4257] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:42:49.742354 env[1111]: 2024-02-09 19:42:49.729 [INFO][4257] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:42:49.742354 env[1111]: 2024-02-09 19:42:49.737 [WARNING][4257] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" HandleID="k8s-pod-network.86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" Workload="localhost-k8s-coredns--5d78c9869d--x6762-eth0" Feb 9 19:42:49.742354 env[1111]: 2024-02-09 19:42:49.737 [INFO][4257] ipam_plugin.go 443: Releasing address using workloadID ContainerID="86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" HandleID="k8s-pod-network.86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" Workload="localhost-k8s-coredns--5d78c9869d--x6762-eth0" Feb 9 19:42:49.742354 env[1111]: 2024-02-09 19:42:49.739 [INFO][4257] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:42:49.742354 env[1111]: 2024-02-09 19:42:49.741 [INFO][4249] k8s.go 591: Teardown processing complete. ContainerID="86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b" Feb 9 19:42:49.742855 env[1111]: time="2024-02-09T19:42:49.742377384Z" level=info msg="TearDown network for sandbox \"86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b\" successfully" Feb 9 19:42:49.745680 env[1111]: time="2024-02-09T19:42:49.745651786Z" level=info msg="RemovePodSandbox \"86944eca5e45dfc3010ef53000a21868c102b14edd9166064f6f00b5b446ea6b\" returns successfully" Feb 9 19:42:49.746243 env[1111]: time="2024-02-09T19:42:49.746190939Z" level=info msg="StopPodSandbox for \"6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a\"" Feb 9 19:42:49.820360 env[1111]: 2024-02-09 19:42:49.780 [WARNING][4280] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--n2n88-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"48e50443-4a64-49dd-8f80-7dc085e7a041", ResourceVersion:"885", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 42, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8ee33eba5bdda2c18b59fa658e2ca7477172365bf824afb95a2173776870e693", Pod:"csi-node-driver-n2n88", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calif2790f2b425", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:42:49.820360 env[1111]: 2024-02-09 19:42:49.780 [INFO][4280] k8s.go 578: Cleaning up netns ContainerID="6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" Feb 9 19:42:49.820360 env[1111]: 2024-02-09 19:42:49.780 [INFO][4280] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" iface="eth0" netns="" Feb 9 19:42:49.820360 env[1111]: 2024-02-09 19:42:49.781 [INFO][4280] k8s.go 585: Releasing IP address(es) ContainerID="6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" Feb 9 19:42:49.820360 env[1111]: 2024-02-09 19:42:49.781 [INFO][4280] utils.go 188: Calico CNI releasing IP address ContainerID="6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" Feb 9 19:42:49.820360 env[1111]: 2024-02-09 19:42:49.801 [INFO][4288] ipam_plugin.go 415: Releasing address using handleID ContainerID="6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" HandleID="k8s-pod-network.6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" Workload="localhost-k8s-csi--node--driver--n2n88-eth0" Feb 9 19:42:49.820360 env[1111]: 2024-02-09 19:42:49.801 [INFO][4288] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:42:49.820360 env[1111]: 2024-02-09 19:42:49.801 [INFO][4288] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:42:49.820360 env[1111]: 2024-02-09 19:42:49.815 [WARNING][4288] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" HandleID="k8s-pod-network.6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" Workload="localhost-k8s-csi--node--driver--n2n88-eth0" Feb 9 19:42:49.820360 env[1111]: 2024-02-09 19:42:49.816 [INFO][4288] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" HandleID="k8s-pod-network.6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" Workload="localhost-k8s-csi--node--driver--n2n88-eth0" Feb 9 19:42:49.820360 env[1111]: 2024-02-09 19:42:49.817 [INFO][4288] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:42:49.820360 env[1111]: 2024-02-09 19:42:49.818 [INFO][4280] k8s.go 591: Teardown processing complete. ContainerID="6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" Feb 9 19:42:49.820873 env[1111]: time="2024-02-09T19:42:49.820392241Z" level=info msg="TearDown network for sandbox \"6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a\" successfully" Feb 9 19:42:49.820873 env[1111]: time="2024-02-09T19:42:49.820424804Z" level=info msg="StopPodSandbox for \"6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a\" returns successfully" Feb 9 19:42:49.821025 env[1111]: time="2024-02-09T19:42:49.820985960Z" level=info msg="RemovePodSandbox for \"6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a\"" Feb 9 19:42:49.821083 env[1111]: time="2024-02-09T19:42:49.821032058Z" level=info msg="Forcibly stopping sandbox \"6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a\"" Feb 9 19:42:49.965569 env[1111]: 2024-02-09 19:42:49.899 [WARNING][4311] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--n2n88-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"48e50443-4a64-49dd-8f80-7dc085e7a041", ResourceVersion:"885", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 42, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8ee33eba5bdda2c18b59fa658e2ca7477172365bf824afb95a2173776870e693", Pod:"csi-node-driver-n2n88", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calif2790f2b425", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:42:49.965569 env[1111]: 2024-02-09 19:42:49.899 [INFO][4311] k8s.go 578: Cleaning up netns ContainerID="6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" Feb 9 19:42:49.965569 env[1111]: 2024-02-09 19:42:49.899 [INFO][4311] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" iface="eth0" netns="" Feb 9 19:42:49.965569 env[1111]: 2024-02-09 19:42:49.899 [INFO][4311] k8s.go 585: Releasing IP address(es) ContainerID="6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" Feb 9 19:42:49.965569 env[1111]: 2024-02-09 19:42:49.899 [INFO][4311] utils.go 188: Calico CNI releasing IP address ContainerID="6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" Feb 9 19:42:49.965569 env[1111]: 2024-02-09 19:42:49.917 [INFO][4318] ipam_plugin.go 415: Releasing address using handleID ContainerID="6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" HandleID="k8s-pod-network.6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" Workload="localhost-k8s-csi--node--driver--n2n88-eth0" Feb 9 19:42:49.965569 env[1111]: 2024-02-09 19:42:49.917 [INFO][4318] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:42:49.965569 env[1111]: 2024-02-09 19:42:49.917 [INFO][4318] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:42:49.965569 env[1111]: 2024-02-09 19:42:49.960 [WARNING][4318] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" HandleID="k8s-pod-network.6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" Workload="localhost-k8s-csi--node--driver--n2n88-eth0" Feb 9 19:42:49.965569 env[1111]: 2024-02-09 19:42:49.960 [INFO][4318] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" HandleID="k8s-pod-network.6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" Workload="localhost-k8s-csi--node--driver--n2n88-eth0" Feb 9 19:42:49.965569 env[1111]: 2024-02-09 19:42:49.962 [INFO][4318] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:42:49.965569 env[1111]: 2024-02-09 19:42:49.963 [INFO][4311] k8s.go 591: Teardown processing complete. ContainerID="6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a" Feb 9 19:42:49.965569 env[1111]: time="2024-02-09T19:42:49.964594898Z" level=info msg="TearDown network for sandbox \"6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a\" successfully" Feb 9 19:42:50.048250 env[1111]: time="2024-02-09T19:42:50.048191701Z" level=info msg="RemovePodSandbox \"6239c265c8ee72fad6abb731806be169372d2f5c92428190cac279e706d3504a\" returns successfully" Feb 9 19:42:50.795000 audit[1865]: AVC avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c314,c980 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:50.795000 audit[1865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013a7bc0 a2=fc6 a3=0 items=0 ppid=1743 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c314,c980 key=(null) Feb 9 19:42:50.795000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:42:50.795000 audit[1865]: AVC avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c314,c980 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:50.795000 audit[1865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000b36cc0 a2=fc6 a3=0 items=0 ppid=1743 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c314,c980 key=(null) Feb 9 19:42:50.795000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:42:50.795000 audit[1865]: AVC avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c314,c980 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:50.795000 audit[1865]: AVC avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c314,c980 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:42:50.795000 audit[1865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000b36ce0 a2=fc6 a3=0 items=0 ppid=1743 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c314,c980 key=(null) Feb 9 19:42:50.795000 audit[1865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002981e20 a2=fc6 a3=0 items=0 ppid=1743 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c314,c980 key=(null) Feb 9 19:42:50.795000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:42:50.795000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:42:51.185313 systemd[1]: Started sshd@15-10.0.0.29:22-10.0.0.1:42422.service. Feb 9 19:42:51.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.29:22-10.0.0.1:42422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:51.203284 kernel: kauditd_printk_skb: 88 callbacks suppressed Feb 9 19:42:51.203382 kernel: audit: type=1130 audit(1707507771.184:1395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.29:22-10.0.0.1:42422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:51.242000 audit[4328]: USER_ACCT pid=4328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:51.242945 sshd[4328]: Accepted publickey for core from 10.0.0.1 port 42422 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:42:51.245000 audit[4328]: CRED_ACQ pid=4328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:51.246266 sshd[4328]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:42:51.249583 kernel: audit: type=1101 audit(1707507771.242:1396): pid=4328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:51.249742 kernel: audit: type=1103 audit(1707507771.245:1397): pid=4328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:51.249769 kernel: audit: type=1006 audit(1707507771.245:1398): pid=4328 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 9 19:42:51.251924 kernel: audit: type=1300 audit(1707507771.245:1398): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd3143b70 a2=3 a3=0 items=0 ppid=1 pid=4328 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:51.245000 audit[4328]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd3143b70 a2=3 a3=0 items=0 ppid=1 pid=4328 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:51.250944 systemd-logind[1103]: New session 16 of user core. Feb 9 19:42:51.252225 systemd[1]: Started session-16.scope. Feb 9 19:42:51.254836 kernel: audit: type=1327 audit(1707507771.245:1398): proctitle=737368643A20636F7265205B707269765D Feb 9 19:42:51.245000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:42:51.256000 audit[4328]: USER_START pid=4328 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:51.256000 audit[4330]: CRED_ACQ pid=4330 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:51.264053 kernel: audit: type=1105 audit(1707507771.256:1399): pid=4328 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:51.264241 kernel: audit: type=1103 audit(1707507771.256:1400): pid=4330 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:51.377675 sshd[4328]: pam_unix(sshd:session): session closed for user core Feb 9 19:42:51.378000 audit[4328]: USER_END pid=4328 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:51.380201 systemd[1]: sshd@15-10.0.0.29:22-10.0.0.1:42422.service: Deactivated successfully. Feb 9 19:42:51.380973 systemd[1]: session-16.scope: Deactivated successfully. Feb 9 19:42:51.381839 systemd-logind[1103]: Session 16 logged out. Waiting for processes to exit. Feb 9 19:42:51.382558 systemd-logind[1103]: Removed session 16. Feb 9 19:42:51.378000 audit[4328]: CRED_DISP pid=4328 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:51.385881 kernel: audit: type=1106 audit(1707507771.378:1401): pid=4328 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:51.385957 kernel: audit: type=1104 audit(1707507771.378:1402): pid=4328 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:51.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.29:22-10.0.0.1:42422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:52.207307 kubelet[2010]: E0209 19:42:52.207278 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:42:56.382689 systemd[1]: Started sshd@16-10.0.0.29:22-10.0.0.1:42424.service. Feb 9 19:42:56.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.29:22-10.0.0.1:42424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:56.385835 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:42:56.385904 kernel: audit: type=1130 audit(1707507776.382:1404): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.29:22-10.0.0.1:42424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:56.419000 audit[4389]: USER_ACCT pid=4389 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:56.419985 sshd[4389]: Accepted publickey for core from 10.0.0.1 port 42424 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:42:56.425009 sshd[4389]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:42:56.428648 systemd-logind[1103]: New session 17 of user core. Feb 9 19:42:56.429053 systemd[1]: Started session-17.scope. Feb 9 19:42:56.424000 audit[4389]: CRED_ACQ pid=4389 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:56.434644 kernel: audit: type=1101 audit(1707507776.419:1405): pid=4389 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:56.434716 kernel: audit: type=1103 audit(1707507776.424:1406): pid=4389 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:56.434740 kernel: audit: type=1006 audit(1707507776.424:1407): pid=4389 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 9 19:42:56.436245 kernel: audit: type=1300 audit(1707507776.424:1407): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc76029e80 a2=3 a3=0 items=0 ppid=1 pid=4389 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:56.424000 audit[4389]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc76029e80 a2=3 a3=0 items=0 ppid=1 pid=4389 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:56.424000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:42:56.439978 kernel: audit: type=1327 audit(1707507776.424:1407): proctitle=737368643A20636F7265205B707269765D Feb 9 19:42:56.440018 kernel: audit: type=1105 audit(1707507776.432:1408): pid=4389 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:56.432000 audit[4389]: USER_START pid=4389 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:56.433000 audit[4391]: CRED_ACQ pid=4391 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:56.445258 kernel: audit: type=1103 audit(1707507776.433:1409): pid=4391 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:56.533818 sshd[4389]: pam_unix(sshd:session): session closed for user core Feb 9 19:42:56.533000 audit[4389]: USER_END pid=4389 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:56.536417 systemd[1]: sshd@16-10.0.0.29:22-10.0.0.1:42424.service: Deactivated successfully. Feb 9 19:42:56.537109 systemd[1]: session-17.scope: Deactivated successfully. Feb 9 19:42:56.537686 systemd-logind[1103]: Session 17 logged out. Waiting for processes to exit. Feb 9 19:42:56.533000 audit[4389]: CRED_DISP pid=4389 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:56.538449 systemd-logind[1103]: Removed session 17. Feb 9 19:42:56.540150 kernel: audit: type=1106 audit(1707507776.533:1410): pid=4389 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:56.540188 kernel: audit: type=1104 audit(1707507776.533:1411): pid=4389 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:56.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.29:22-10.0.0.1:42424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:01.538137 systemd[1]: Started sshd@17-10.0.0.29:22-10.0.0.1:44526.service. Feb 9 19:43:01.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.29:22-10.0.0.1:44526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:01.542397 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:43:01.542458 kernel: audit: type=1130 audit(1707507781.536:1413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.29:22-10.0.0.1:44526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:01.573000 audit[4407]: USER_ACCT pid=4407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:01.575841 sshd[4407]: Accepted publickey for core from 10.0.0.1 port 44526 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:43:01.576000 audit[4407]: CRED_ACQ pid=4407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:01.578846 sshd[4407]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:43:01.580977 kernel: audit: type=1101 audit(1707507781.573:1414): pid=4407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:01.581036 kernel: audit: type=1103 audit(1707507781.576:1415): pid=4407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:01.581058 kernel: audit: type=1006 audit(1707507781.576:1416): pid=4407 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Feb 9 19:43:01.582054 systemd-logind[1103]: New session 18 of user core. Feb 9 19:43:01.582657 kernel: audit: type=1300 audit(1707507781.576:1416): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdda267190 a2=3 a3=0 items=0 ppid=1 pid=4407 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.576000 audit[4407]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdda267190 a2=3 a3=0 items=0 ppid=1 pid=4407 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.582914 systemd[1]: Started session-18.scope. Feb 9 19:43:01.576000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:43:01.586088 kernel: audit: type=1327 audit(1707507781.576:1416): proctitle=737368643A20636F7265205B707269765D Feb 9 19:43:01.585000 audit[4407]: USER_START pid=4407 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:01.592624 kernel: audit: type=1105 audit(1707507781.585:1417): pid=4407 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:01.592684 kernel: audit: type=1103 audit(1707507781.586:1418): pid=4409 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:01.586000 audit[4409]: CRED_ACQ pid=4409 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:01.692415 sshd[4407]: pam_unix(sshd:session): session closed for user core Feb 9 19:43:01.692000 audit[4407]: USER_END pid=4407 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:01.695630 systemd[1]: sshd@17-10.0.0.29:22-10.0.0.1:44526.service: Deactivated successfully. Feb 9 19:43:01.696487 systemd[1]: session-18.scope: Deactivated successfully. Feb 9 19:43:01.692000 audit[4407]: CRED_DISP pid=4407 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:01.698273 systemd[1]: Started sshd@18-10.0.0.29:22-10.0.0.1:44534.service. Feb 9 19:43:01.699403 systemd-logind[1103]: Session 18 logged out. Waiting for processes to exit. Feb 9 19:43:01.700452 systemd-logind[1103]: Removed session 18. Feb 9 19:43:01.700669 kernel: audit: type=1106 audit(1707507781.692:1419): pid=4407 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:01.700741 kernel: audit: type=1104 audit(1707507781.692:1420): pid=4407 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:01.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.29:22-10.0.0.1:44526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:01.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.29:22-10.0.0.1:44534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:01.736000 audit[4420]: USER_ACCT pid=4420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:01.737865 sshd[4420]: Accepted publickey for core from 10.0.0.1 port 44534 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:43:01.736000 audit[4420]: CRED_ACQ pid=4420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:01.737000 audit[4420]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9794cc60 a2=3 a3=0 items=0 ppid=1 pid=4420 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.737000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:43:01.738912 sshd[4420]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:43:01.742231 systemd-logind[1103]: New session 19 of user core. Feb 9 19:43:01.743086 systemd[1]: Started session-19.scope. Feb 9 19:43:01.746000 audit[4420]: USER_START pid=4420 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:01.747000 audit[4422]: CRED_ACQ pid=4422 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:02.066022 sshd[4420]: pam_unix(sshd:session): session closed for user core Feb 9 19:43:02.065000 audit[4420]: USER_END pid=4420 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:02.065000 audit[4420]: CRED_DISP pid=4420 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:02.069018 systemd[1]: sshd@18-10.0.0.29:22-10.0.0.1:44534.service: Deactivated successfully. Feb 9 19:43:02.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.29:22-10.0.0.1:44534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:02.069530 systemd[1]: session-19.scope: Deactivated successfully. Feb 9 19:43:02.070160 systemd-logind[1103]: Session 19 logged out. Waiting for processes to exit. Feb 9 19:43:02.071233 systemd[1]: Started sshd@19-10.0.0.29:22-10.0.0.1:44550.service. Feb 9 19:43:02.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.29:22-10.0.0.1:44550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:02.071912 systemd-logind[1103]: Removed session 19. Feb 9 19:43:02.108000 audit[4431]: USER_ACCT pid=4431 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:02.109986 sshd[4431]: Accepted publickey for core from 10.0.0.1 port 44550 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:43:02.109000 audit[4431]: CRED_ACQ pid=4431 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:02.109000 audit[4431]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdbf1da10 a2=3 a3=0 items=0 ppid=1 pid=4431 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:02.109000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:43:02.111625 sshd[4431]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:43:02.115697 systemd-logind[1103]: New session 20 of user core. Feb 9 19:43:02.116660 systemd[1]: Started session-20.scope. Feb 9 19:43:02.119000 audit[4431]: USER_START pid=4431 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:02.120000 audit[4433]: CRED_ACQ pid=4433 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:03.168000 audit[4445]: NETFILTER_CFG table=filter:113 family=2 entries=20 op=nft_register_rule pid=4445 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:43:03.168000 audit[4445]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffc4bb89000 a2=0 a3=7ffc4bb88fec items=0 ppid=2172 pid=4445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:03.168000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:43:03.175643 sshd[4431]: pam_unix(sshd:session): session closed for user core Feb 9 19:43:03.175000 audit[4431]: USER_END pid=4431 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:03.176000 audit[4431]: CRED_DISP pid=4431 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:03.169000 audit[4445]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4445 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:43:03.169000 audit[4445]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffc4bb89000 a2=0 a3=31030 items=0 ppid=2172 pid=4445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:03.169000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:43:03.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.29:22-10.0.0.1:44562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:03.180559 systemd[1]: Started sshd@20-10.0.0.29:22-10.0.0.1:44562.service. Feb 9 19:43:03.182454 systemd-logind[1103]: Session 20 logged out. Waiting for processes to exit. Feb 9 19:43:03.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.29:22-10.0.0.1:44550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:03.183784 systemd[1]: sshd@19-10.0.0.29:22-10.0.0.1:44550.service: Deactivated successfully. Feb 9 19:43:03.184551 systemd[1]: session-20.scope: Deactivated successfully. Feb 9 19:43:03.186142 systemd-logind[1103]: Removed session 20. Feb 9 19:43:03.185000 audit[4450]: NETFILTER_CFG table=filter:115 family=2 entries=32 op=nft_register_rule pid=4450 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:43:03.185000 audit[4450]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffc3ad2e390 a2=0 a3=7ffc3ad2e37c items=0 ppid=2172 pid=4450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:03.185000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:43:03.186000 audit[4450]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4450 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:43:03.186000 audit[4450]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffc3ad2e390 a2=0 a3=31030 items=0 ppid=2172 pid=4450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:03.186000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:43:03.223000 audit[4448]: USER_ACCT pid=4448 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:03.225100 sshd[4448]: Accepted publickey for core from 10.0.0.1 port 44562 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:43:03.224000 audit[4448]: CRED_ACQ pid=4448 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:03.224000 audit[4448]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd650cac0 a2=3 a3=0 items=0 ppid=1 pid=4448 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:03.224000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:43:03.226361 sshd[4448]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:43:03.230136 systemd-logind[1103]: New session 21 of user core. Feb 9 19:43:03.230977 systemd[1]: Started session-21.scope. Feb 9 19:43:03.234000 audit[4448]: USER_START pid=4448 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:03.235000 audit[4452]: CRED_ACQ pid=4452 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:03.556866 sshd[4448]: pam_unix(sshd:session): session closed for user core Feb 9 19:43:03.556000 audit[4448]: USER_END pid=4448 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:03.556000 audit[4448]: CRED_DISP pid=4448 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:03.559999 systemd[1]: sshd@20-10.0.0.29:22-10.0.0.1:44562.service: Deactivated successfully. Feb 9 19:43:03.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.29:22-10.0.0.1:44562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:03.560797 systemd[1]: session-21.scope: Deactivated successfully. Feb 9 19:43:03.561586 systemd-logind[1103]: Session 21 logged out. Waiting for processes to exit. Feb 9 19:43:03.563363 systemd[1]: Started sshd@21-10.0.0.29:22-10.0.0.1:44574.service. Feb 9 19:43:03.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.29:22-10.0.0.1:44574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:03.564653 systemd-logind[1103]: Removed session 21. Feb 9 19:43:03.600000 audit[4462]: USER_ACCT pid=4462 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:03.602418 sshd[4462]: Accepted publickey for core from 10.0.0.1 port 44574 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:43:03.601000 audit[4462]: CRED_ACQ pid=4462 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:03.602000 audit[4462]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebbb98ce0 a2=3 a3=0 items=0 ppid=1 pid=4462 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:03.602000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:43:03.603934 sshd[4462]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:43:03.609482 systemd[1]: Started session-22.scope. Feb 9 19:43:03.609855 systemd-logind[1103]: New session 22 of user core. Feb 9 19:43:03.614000 audit[4462]: USER_START pid=4462 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:03.616000 audit[4464]: CRED_ACQ pid=4464 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:03.720533 sshd[4462]: pam_unix(sshd:session): session closed for user core Feb 9 19:43:03.720000 audit[4462]: USER_END pid=4462 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:03.720000 audit[4462]: CRED_DISP pid=4462 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:03.723426 systemd[1]: sshd@21-10.0.0.29:22-10.0.0.1:44574.service: Deactivated successfully. Feb 9 19:43:03.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.29:22-10.0.0.1:44574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:03.724393 systemd[1]: session-22.scope: Deactivated successfully. Feb 9 19:43:03.725094 systemd-logind[1103]: Session 22 logged out. Waiting for processes to exit. Feb 9 19:43:03.726517 systemd-logind[1103]: Removed session 22. Feb 9 19:43:08.725226 systemd[1]: Started sshd@22-10.0.0.29:22-10.0.0.1:57728.service. Feb 9 19:43:08.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.29:22-10.0.0.1:57728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:08.726101 kernel: kauditd_printk_skb: 57 callbacks suppressed Feb 9 19:43:08.726165 kernel: audit: type=1130 audit(1707507788.724:1462): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.29:22-10.0.0.1:57728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:08.762000 audit[4480]: USER_ACCT pid=4480 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:08.763245 sshd[4480]: Accepted publickey for core from 10.0.0.1 port 57728 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:43:08.764997 sshd[4480]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:43:08.764000 audit[4480]: CRED_ACQ pid=4480 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:08.768085 kernel: audit: type=1101 audit(1707507788.762:1463): pid=4480 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:08.768151 kernel: audit: type=1103 audit(1707507788.764:1464): pid=4480 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:08.768342 kernel: audit: type=1006 audit(1707507788.764:1465): pid=4480 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 9 19:43:08.768473 systemd-logind[1103]: New session 23 of user core. Feb 9 19:43:08.769325 systemd[1]: Started session-23.scope. Feb 9 19:43:08.769580 kernel: audit: type=1300 audit(1707507788.764:1465): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9d7a8800 a2=3 a3=0 items=0 ppid=1 pid=4480 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:08.764000 audit[4480]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9d7a8800 a2=3 a3=0 items=0 ppid=1 pid=4480 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:08.772242 kernel: audit: type=1327 audit(1707507788.764:1465): proctitle=737368643A20636F7265205B707269765D Feb 9 19:43:08.764000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:43:08.773000 audit[4480]: USER_START pid=4480 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:08.774000 audit[4482]: CRED_ACQ pid=4482 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:08.779078 kernel: audit: type=1105 audit(1707507788.773:1466): pid=4480 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:08.779119 kernel: audit: type=1103 audit(1707507788.774:1467): pid=4482 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:08.878921 sshd[4480]: pam_unix(sshd:session): session closed for user core Feb 9 19:43:08.879000 audit[4480]: USER_END pid=4480 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:08.881446 systemd[1]: sshd@22-10.0.0.29:22-10.0.0.1:57728.service: Deactivated successfully. Feb 9 19:43:08.882201 systemd[1]: session-23.scope: Deactivated successfully. Feb 9 19:43:08.882806 systemd-logind[1103]: Session 23 logged out. Waiting for processes to exit. Feb 9 19:43:08.883482 systemd-logind[1103]: Removed session 23. Feb 9 19:43:08.879000 audit[4480]: CRED_DISP pid=4480 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:08.890618 kernel: audit: type=1106 audit(1707507788.879:1468): pid=4480 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:08.890677 kernel: audit: type=1104 audit(1707507788.879:1469): pid=4480 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:08.881000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.29:22-10.0.0.1:57728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:11.054000 audit[4494]: NETFILTER_CFG table=filter:117 family=2 entries=20 op=nft_register_rule pid=4494 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:43:11.054000 audit[4494]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffce5a20ba0 a2=0 a3=7ffce5a20b8c items=0 ppid=2172 pid=4494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:11.054000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:43:11.058000 audit[4494]: NETFILTER_CFG table=nat:118 family=2 entries=104 op=nft_register_chain pid=4494 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:43:11.058000 audit[4494]: SYSCALL arch=c000003e syscall=46 success=yes exit=47436 a0=3 a1=7ffce5a20ba0 a2=0 a3=7ffce5a20b8c items=0 ppid=2172 pid=4494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:11.058000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:43:13.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.29:22-10.0.0.1:57740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:13.883876 systemd[1]: Started sshd@23-10.0.0.29:22-10.0.0.1:57740.service. Feb 9 19:43:13.884740 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 19:43:13.884766 kernel: audit: type=1130 audit(1707507793.883:1473): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.29:22-10.0.0.1:57740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:13.920000 audit[4497]: USER_ACCT pid=4497 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:13.921403 sshd[4497]: Accepted publickey for core from 10.0.0.1 port 57740 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:43:13.923624 sshd[4497]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:43:13.922000 audit[4497]: CRED_ACQ pid=4497 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:13.927256 kernel: audit: type=1101 audit(1707507793.920:1474): pid=4497 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:13.927318 kernel: audit: type=1103 audit(1707507793.922:1475): pid=4497 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:13.927336 kernel: audit: type=1006 audit(1707507793.922:1476): pid=4497 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 9 19:43:13.928034 systemd-logind[1103]: New session 24 of user core. Feb 9 19:43:13.922000 audit[4497]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc31d0f290 a2=3 a3=0 items=0 ppid=1 pid=4497 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:13.928909 systemd[1]: Started session-24.scope. Feb 9 19:43:13.931617 kernel: audit: type=1300 audit(1707507793.922:1476): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc31d0f290 a2=3 a3=0 items=0 ppid=1 pid=4497 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:13.931685 kernel: audit: type=1327 audit(1707507793.922:1476): proctitle=737368643A20636F7265205B707269765D Feb 9 19:43:13.922000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:43:13.933000 audit[4497]: USER_START pid=4497 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:13.934000 audit[4499]: CRED_ACQ pid=4499 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:13.939143 kernel: audit: type=1105 audit(1707507793.933:1477): pid=4497 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:13.939271 kernel: audit: type=1103 audit(1707507793.934:1478): pid=4499 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:14.037064 sshd[4497]: pam_unix(sshd:session): session closed for user core Feb 9 19:43:14.037000 audit[4497]: USER_END pid=4497 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:14.039968 systemd[1]: sshd@23-10.0.0.29:22-10.0.0.1:57740.service: Deactivated successfully. Feb 9 19:43:14.040948 systemd[1]: session-24.scope: Deactivated successfully. Feb 9 19:43:14.041564 systemd-logind[1103]: Session 24 logged out. Waiting for processes to exit. Feb 9 19:43:14.037000 audit[4497]: CRED_DISP pid=4497 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:14.042356 systemd-logind[1103]: Removed session 24. Feb 9 19:43:14.044550 kernel: audit: type=1106 audit(1707507794.037:1479): pid=4497 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:14.044633 kernel: audit: type=1104 audit(1707507794.037:1480): pid=4497 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:14.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.29:22-10.0.0.1:57740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:17.356972 kubelet[2010]: E0209 19:43:17.356935 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:43:17.357490 kubelet[2010]: E0209 19:43:17.356962 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:43:18.979000 audit[4517]: NETFILTER_CFG table=filter:119 family=2 entries=9 op=nft_register_rule pid=4517 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:43:18.988300 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:43:18.988702 kernel: audit: type=1325 audit(1707507798.979:1482): table=filter:119 family=2 entries=9 op=nft_register_rule pid=4517 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:43:18.988745 kernel: audit: type=1300 audit(1707507798.979:1482): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe77df2170 a2=0 a3=7ffe77df215c items=0 ppid=2172 pid=4517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:18.979000 audit[4517]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe77df2170 a2=0 a3=7ffe77df215c items=0 ppid=2172 pid=4517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:18.979000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:43:18.992627 kernel: audit: type=1327 audit(1707507798.979:1482): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:43:18.981000 audit[4517]: NETFILTER_CFG table=nat:120 family=2 entries=44 op=nft_register_rule pid=4517 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:43:18.994747 kubelet[2010]: I0209 19:43:18.994717 2010 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:43:18.999114 kernel: audit: type=1325 audit(1707507798.981:1483): table=nat:120 family=2 entries=44 op=nft_register_rule pid=4517 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:43:18.999164 kernel: audit: type=1300 audit(1707507798.981:1483): arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffe77df2170 a2=0 a3=7ffe77df215c items=0 ppid=2172 pid=4517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:18.981000 audit[4517]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffe77df2170 a2=0 a3=7ffe77df215c items=0 ppid=2172 pid=4517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:19.000886 kernel: audit: type=1327 audit(1707507798.981:1483): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:43:18.981000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:43:19.008851 systemd[1]: Created slice kubepods-besteffort-pod4528b905_e24e_4a7a_ae66_c324feca81bd.slice. Feb 9 19:43:19.010000 audit[4519]: NETFILTER_CFG table=filter:121 family=2 entries=10 op=nft_register_rule pid=4519 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:43:19.010000 audit[4519]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffd40864eb0 a2=0 a3=7ffd40864e9c items=0 ppid=2172 pid=4519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:19.015883 kubelet[2010]: I0209 19:43:19.013309 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/4528b905-e24e-4a7a-ae66-c324feca81bd-calico-apiserver-certs\") pod \"calico-apiserver-cbf97f889-ljqjq\" (UID: \"4528b905-e24e-4a7a-ae66-c324feca81bd\") " pod="calico-apiserver/calico-apiserver-cbf97f889-ljqjq" Feb 9 19:43:19.015883 kubelet[2010]: I0209 19:43:19.013363 2010 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6qpg2\" (UniqueName: \"kubernetes.io/projected/4528b905-e24e-4a7a-ae66-c324feca81bd-kube-api-access-6qpg2\") pod \"calico-apiserver-cbf97f889-ljqjq\" (UID: \"4528b905-e24e-4a7a-ae66-c324feca81bd\") " pod="calico-apiserver/calico-apiserver-cbf97f889-ljqjq" Feb 9 19:43:19.017034 kernel: audit: type=1325 audit(1707507799.010:1484): table=filter:121 family=2 entries=10 op=nft_register_rule pid=4519 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:43:19.017085 kernel: audit: type=1300 audit(1707507799.010:1484): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffd40864eb0 a2=0 a3=7ffd40864e9c items=0 ppid=2172 pid=4519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:19.017106 kernel: audit: type=1327 audit(1707507799.010:1484): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:43:19.010000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:43:19.012000 audit[4519]: NETFILTER_CFG table=nat:122 family=2 entries=44 op=nft_register_rule pid=4519 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:43:19.012000 audit[4519]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffd40864eb0 a2=0 a3=7ffd40864e9c items=0 ppid=2172 pid=4519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:19.012000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:43:19.026619 kernel: audit: type=1325 audit(1707507799.012:1485): table=nat:122 family=2 entries=44 op=nft_register_rule pid=4519 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:43:19.041405 systemd[1]: Started sshd@24-10.0.0.29:22-10.0.0.1:52474.service. Feb 9 19:43:19.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.29:22-10.0.0.1:52474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:19.077000 audit[4521]: USER_ACCT pid=4521 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:19.078217 sshd[4521]: Accepted publickey for core from 10.0.0.1 port 52474 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:43:19.078000 audit[4521]: CRED_ACQ pid=4521 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:19.078000 audit[4521]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0cf9ba80 a2=3 a3=0 items=0 ppid=1 pid=4521 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:19.078000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:43:19.079284 sshd[4521]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:43:19.084380 systemd-logind[1103]: New session 25 of user core. Feb 9 19:43:19.084692 systemd[1]: Started session-25.scope. Feb 9 19:43:19.090000 audit[4521]: USER_START pid=4521 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:19.091000 audit[4523]: CRED_ACQ pid=4523 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:19.114723 kubelet[2010]: E0209 19:43:19.114385 2010 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 19:43:19.115746 kubelet[2010]: E0209 19:43:19.115712 2010 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/4528b905-e24e-4a7a-ae66-c324feca81bd-calico-apiserver-certs podName:4528b905-e24e-4a7a-ae66-c324feca81bd nodeName:}" failed. No retries permitted until 2024-02-09 19:43:19.614764054 +0000 UTC m=+90.362243070 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/4528b905-e24e-4a7a-ae66-c324feca81bd-calico-apiserver-certs") pod "calico-apiserver-cbf97f889-ljqjq" (UID: "4528b905-e24e-4a7a-ae66-c324feca81bd") : secret "calico-apiserver-certs" not found Feb 9 19:43:19.189937 sshd[4521]: pam_unix(sshd:session): session closed for user core Feb 9 19:43:19.190000 audit[4521]: USER_END pid=4521 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:19.190000 audit[4521]: CRED_DISP pid=4521 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:19.192846 systemd[1]: sshd@24-10.0.0.29:22-10.0.0.1:52474.service: Deactivated successfully. Feb 9 19:43:19.193570 systemd[1]: session-25.scope: Deactivated successfully. Feb 9 19:43:19.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.29:22-10.0.0.1:52474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:19.194220 systemd-logind[1103]: Session 25 logged out. Waiting for processes to exit. Feb 9 19:43:19.194918 systemd-logind[1103]: Removed session 25. Feb 9 19:43:19.913268 env[1111]: time="2024-02-09T19:43:19.913214632Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-cbf97f889-ljqjq,Uid:4528b905-e24e-4a7a-ae66-c324feca81bd,Namespace:calico-apiserver,Attempt:0,}" Feb 9 19:43:20.333889 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:43:20.333999 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic05369f5e6b: link becomes ready Feb 9 19:43:20.333382 systemd-networkd[1012]: calic05369f5e6b: Link UP Feb 9 19:43:20.334334 systemd-networkd[1012]: calic05369f5e6b: Gained carrier Feb 9 19:43:20.346378 env[1111]: 2024-02-09 19:43:20.263 [INFO][4537] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--cbf97f889--ljqjq-eth0 calico-apiserver-cbf97f889- calico-apiserver 4528b905-e24e-4a7a-ae66-c324feca81bd 1110 0 2024-02-09 19:43:18 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:cbf97f889 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-cbf97f889-ljqjq eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calic05369f5e6b [] []}} ContainerID="528ba04164840a9db6c0c6138fb6b4d1feca344ffd85662c3f2fb4e642af2216" Namespace="calico-apiserver" Pod="calico-apiserver-cbf97f889-ljqjq" WorkloadEndpoint="localhost-k8s-calico--apiserver--cbf97f889--ljqjq-" Feb 9 19:43:20.346378 env[1111]: 2024-02-09 19:43:20.263 [INFO][4537] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="528ba04164840a9db6c0c6138fb6b4d1feca344ffd85662c3f2fb4e642af2216" Namespace="calico-apiserver" Pod="calico-apiserver-cbf97f889-ljqjq" WorkloadEndpoint="localhost-k8s-calico--apiserver--cbf97f889--ljqjq-eth0" Feb 9 19:43:20.346378 env[1111]: 2024-02-09 19:43:20.292 [INFO][4551] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="528ba04164840a9db6c0c6138fb6b4d1feca344ffd85662c3f2fb4e642af2216" HandleID="k8s-pod-network.528ba04164840a9db6c0c6138fb6b4d1feca344ffd85662c3f2fb4e642af2216" Workload="localhost-k8s-calico--apiserver--cbf97f889--ljqjq-eth0" Feb 9 19:43:20.346378 env[1111]: 2024-02-09 19:43:20.303 [INFO][4551] ipam_plugin.go 268: Auto assigning IP ContainerID="528ba04164840a9db6c0c6138fb6b4d1feca344ffd85662c3f2fb4e642af2216" HandleID="k8s-pod-network.528ba04164840a9db6c0c6138fb6b4d1feca344ffd85662c3f2fb4e642af2216" Workload="localhost-k8s-calico--apiserver--cbf97f889--ljqjq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029d3f0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-cbf97f889-ljqjq", "timestamp":"2024-02-09 19:43:20.292898601 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:43:20.346378 env[1111]: 2024-02-09 19:43:20.303 [INFO][4551] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:43:20.346378 env[1111]: 2024-02-09 19:43:20.303 [INFO][4551] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:43:20.346378 env[1111]: 2024-02-09 19:43:20.303 [INFO][4551] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Feb 9 19:43:20.346378 env[1111]: 2024-02-09 19:43:20.304 [INFO][4551] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.528ba04164840a9db6c0c6138fb6b4d1feca344ffd85662c3f2fb4e642af2216" host="localhost" Feb 9 19:43:20.346378 env[1111]: 2024-02-09 19:43:20.308 [INFO][4551] ipam.go 372: Looking up existing affinities for host host="localhost" Feb 9 19:43:20.346378 env[1111]: 2024-02-09 19:43:20.315 [INFO][4551] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Feb 9 19:43:20.346378 env[1111]: 2024-02-09 19:43:20.316 [INFO][4551] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Feb 9 19:43:20.346378 env[1111]: 2024-02-09 19:43:20.319 [INFO][4551] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Feb 9 19:43:20.346378 env[1111]: 2024-02-09 19:43:20.319 [INFO][4551] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.528ba04164840a9db6c0c6138fb6b4d1feca344ffd85662c3f2fb4e642af2216" host="localhost" Feb 9 19:43:20.346378 env[1111]: 2024-02-09 19:43:20.320 [INFO][4551] ipam.go 1682: Creating new handle: k8s-pod-network.528ba04164840a9db6c0c6138fb6b4d1feca344ffd85662c3f2fb4e642af2216 Feb 9 19:43:20.346378 env[1111]: 2024-02-09 19:43:20.323 [INFO][4551] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.528ba04164840a9db6c0c6138fb6b4d1feca344ffd85662c3f2fb4e642af2216" host="localhost" Feb 9 19:43:20.346378 env[1111]: 2024-02-09 19:43:20.328 [INFO][4551] ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.528ba04164840a9db6c0c6138fb6b4d1feca344ffd85662c3f2fb4e642af2216" host="localhost" Feb 9 19:43:20.346378 env[1111]: 2024-02-09 19:43:20.328 [INFO][4551] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.528ba04164840a9db6c0c6138fb6b4d1feca344ffd85662c3f2fb4e642af2216" host="localhost" Feb 9 19:43:20.346378 env[1111]: 2024-02-09 19:43:20.328 [INFO][4551] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:43:20.346378 env[1111]: 2024-02-09 19:43:20.328 [INFO][4551] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="528ba04164840a9db6c0c6138fb6b4d1feca344ffd85662c3f2fb4e642af2216" HandleID="k8s-pod-network.528ba04164840a9db6c0c6138fb6b4d1feca344ffd85662c3f2fb4e642af2216" Workload="localhost-k8s-calico--apiserver--cbf97f889--ljqjq-eth0" Feb 9 19:43:20.347243 env[1111]: 2024-02-09 19:43:20.329 [INFO][4537] k8s.go 385: Populated endpoint ContainerID="528ba04164840a9db6c0c6138fb6b4d1feca344ffd85662c3f2fb4e642af2216" Namespace="calico-apiserver" Pod="calico-apiserver-cbf97f889-ljqjq" WorkloadEndpoint="localhost-k8s-calico--apiserver--cbf97f889--ljqjq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--cbf97f889--ljqjq-eth0", GenerateName:"calico-apiserver-cbf97f889-", Namespace:"calico-apiserver", SelfLink:"", UID:"4528b905-e24e-4a7a-ae66-c324feca81bd", ResourceVersion:"1110", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 43, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"cbf97f889", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-cbf97f889-ljqjq", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic05369f5e6b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:43:20.347243 env[1111]: 2024-02-09 19:43:20.330 [INFO][4537] k8s.go 386: Calico CNI using IPs: [192.168.88.133/32] ContainerID="528ba04164840a9db6c0c6138fb6b4d1feca344ffd85662c3f2fb4e642af2216" Namespace="calico-apiserver" Pod="calico-apiserver-cbf97f889-ljqjq" WorkloadEndpoint="localhost-k8s-calico--apiserver--cbf97f889--ljqjq-eth0" Feb 9 19:43:20.347243 env[1111]: 2024-02-09 19:43:20.330 [INFO][4537] dataplane_linux.go 68: Setting the host side veth name to calic05369f5e6b ContainerID="528ba04164840a9db6c0c6138fb6b4d1feca344ffd85662c3f2fb4e642af2216" Namespace="calico-apiserver" Pod="calico-apiserver-cbf97f889-ljqjq" WorkloadEndpoint="localhost-k8s-calico--apiserver--cbf97f889--ljqjq-eth0" Feb 9 19:43:20.347243 env[1111]: 2024-02-09 19:43:20.334 [INFO][4537] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="528ba04164840a9db6c0c6138fb6b4d1feca344ffd85662c3f2fb4e642af2216" Namespace="calico-apiserver" Pod="calico-apiserver-cbf97f889-ljqjq" WorkloadEndpoint="localhost-k8s-calico--apiserver--cbf97f889--ljqjq-eth0" Feb 9 19:43:20.347243 env[1111]: 2024-02-09 19:43:20.334 [INFO][4537] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="528ba04164840a9db6c0c6138fb6b4d1feca344ffd85662c3f2fb4e642af2216" Namespace="calico-apiserver" Pod="calico-apiserver-cbf97f889-ljqjq" WorkloadEndpoint="localhost-k8s-calico--apiserver--cbf97f889--ljqjq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--cbf97f889--ljqjq-eth0", GenerateName:"calico-apiserver-cbf97f889-", Namespace:"calico-apiserver", SelfLink:"", UID:"4528b905-e24e-4a7a-ae66-c324feca81bd", ResourceVersion:"1110", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 43, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"cbf97f889", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"528ba04164840a9db6c0c6138fb6b4d1feca344ffd85662c3f2fb4e642af2216", Pod:"calico-apiserver-cbf97f889-ljqjq", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic05369f5e6b", MAC:"e6:11:b1:d3:53:8d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:43:20.347243 env[1111]: 2024-02-09 19:43:20.343 [INFO][4537] k8s.go 491: Wrote updated endpoint to datastore ContainerID="528ba04164840a9db6c0c6138fb6b4d1feca344ffd85662c3f2fb4e642af2216" Namespace="calico-apiserver" Pod="calico-apiserver-cbf97f889-ljqjq" WorkloadEndpoint="localhost-k8s-calico--apiserver--cbf97f889--ljqjq-eth0" Feb 9 19:43:20.358860 kubelet[2010]: E0209 19:43:20.358814 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:43:20.361710 env[1111]: time="2024-02-09T19:43:20.361463102Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:43:20.361804 env[1111]: time="2024-02-09T19:43:20.361728947Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:43:20.361804 env[1111]: time="2024-02-09T19:43:20.361761559Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:43:20.363100 env[1111]: time="2024-02-09T19:43:20.362025070Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/528ba04164840a9db6c0c6138fb6b4d1feca344ffd85662c3f2fb4e642af2216 pid=4586 runtime=io.containerd.runc.v2 Feb 9 19:43:20.365000 audit[4595]: NETFILTER_CFG table=filter:123 family=2 entries=59 op=nft_register_chain pid=4595 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:43:20.365000 audit[4595]: SYSCALL arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7fffb28663b0 a2=0 a3=7fffb286639c items=0 ppid=3151 pid=4595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:20.365000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:43:20.378223 systemd[1]: Started cri-containerd-528ba04164840a9db6c0c6138fb6b4d1feca344ffd85662c3f2fb4e642af2216.scope. Feb 9 19:43:20.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.399000 audit: BPF prog-id=180 op=LOAD Feb 9 19:43:20.399000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.399000 audit[4597]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4586 pid=4597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:20.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532386261303431363438343061396462366330633631333866623662 Feb 9 19:43:20.399000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.399000 audit[4597]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4586 pid=4597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:20.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532386261303431363438343061396462366330633631333866623662 Feb 9 19:43:20.400000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.400000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.400000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.400000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.400000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.400000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.400000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.400000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.400000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.400000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.400000 audit: BPF prog-id=181 op=LOAD Feb 9 19:43:20.400000 audit[4597]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a2610 items=0 ppid=4586 pid=4597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:20.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532386261303431363438343061396462366330633631333866623662 Feb 9 19:43:20.400000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.400000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.400000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.400000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.400000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.400000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.400000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.400000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.400000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.400000 audit: BPF prog-id=182 op=LOAD Feb 9 19:43:20.400000 audit[4597]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a2658 items=0 ppid=4586 pid=4597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:20.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532386261303431363438343061396462366330633631333866623662 Feb 9 19:43:20.401000 audit: BPF prog-id=182 op=UNLOAD Feb 9 19:43:20.401000 audit: BPF prog-id=181 op=UNLOAD Feb 9 19:43:20.402000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.402000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.402000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.402000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.402000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.402000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.402000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.402000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.402000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.402000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:20.402000 audit: BPF prog-id=183 op=LOAD Feb 9 19:43:20.402000 audit[4597]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a2a68 items=0 ppid=4586 pid=4597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:20.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532386261303431363438343061396462366330633631333866623662 Feb 9 19:43:20.404115 systemd-resolved[1065]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 19:43:20.432696 env[1111]: time="2024-02-09T19:43:20.432632525Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-cbf97f889-ljqjq,Uid:4528b905-e24e-4a7a-ae66-c324feca81bd,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"528ba04164840a9db6c0c6138fb6b4d1feca344ffd85662c3f2fb4e642af2216\"" Feb 9 19:43:20.434025 env[1111]: time="2024-02-09T19:43:20.433997118Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 19:43:22.160547 systemd[1]: run-containerd-runc-k8s.io-816a8ca30cbc26e9bcc71eb0dd71a14857f24f333e8c1d6229f7d22dc9c291fa-runc.C1lUth.mount: Deactivated successfully. Feb 9 19:43:22.366875 systemd-networkd[1012]: calic05369f5e6b: Gained IPv6LL Feb 9 19:43:24.195575 systemd[1]: Started sshd@25-10.0.0.29:22-10.0.0.1:52478.service. Feb 9 19:43:24.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.29:22-10.0.0.1:52478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:24.196811 kernel: kauditd_printk_skb: 73 callbacks suppressed Feb 9 19:43:24.196877 kernel: audit: type=1130 audit(1707507804.195:1514): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.29:22-10.0.0.1:52478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:24.234000 audit[4645]: USER_ACCT pid=4645 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:24.238828 kernel: audit: type=1101 audit(1707507804.234:1515): pid=4645 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:24.238883 sshd[4645]: Accepted publickey for core from 10.0.0.1 port 52478 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:43:24.239035 sshd[4645]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:43:24.246072 kernel: audit: type=1103 audit(1707507804.238:1516): pid=4645 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:24.246190 kernel: audit: type=1006 audit(1707507804.238:1517): pid=4645 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 9 19:43:24.238000 audit[4645]: CRED_ACQ pid=4645 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:24.243141 systemd-logind[1103]: New session 26 of user core. Feb 9 19:43:24.243493 systemd[1]: Started session-26.scope. Feb 9 19:43:24.238000 audit[4645]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce8f223a0 a2=3 a3=0 items=0 ppid=1 pid=4645 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:24.251430 kernel: audit: type=1300 audit(1707507804.238:1517): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce8f223a0 a2=3 a3=0 items=0 ppid=1 pid=4645 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:24.251588 kernel: audit: type=1327 audit(1707507804.238:1517): proctitle=737368643A20636F7265205B707269765D Feb 9 19:43:24.238000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:43:24.248000 audit[4645]: USER_START pid=4645 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:24.259401 kernel: audit: type=1105 audit(1707507804.248:1518): pid=4645 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:24.259457 kernel: audit: type=1103 audit(1707507804.250:1519): pid=4647 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:24.250000 audit[4647]: CRED_ACQ pid=4647 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:24.376098 sshd[4645]: pam_unix(sshd:session): session closed for user core Feb 9 19:43:24.378000 audit[4645]: USER_END pid=4645 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:24.378000 audit[4645]: CRED_DISP pid=4645 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:24.382664 systemd-logind[1103]: Session 26 logged out. Waiting for processes to exit. Feb 9 19:43:24.383561 systemd[1]: sshd@25-10.0.0.29:22-10.0.0.1:52478.service: Deactivated successfully. Feb 9 19:43:24.384419 systemd[1]: session-26.scope: Deactivated successfully. Feb 9 19:43:24.385283 kernel: audit: type=1106 audit(1707507804.378:1520): pid=4645 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:24.385362 kernel: audit: type=1104 audit(1707507804.378:1521): pid=4645 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:24.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.29:22-10.0.0.1:52478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:24.386149 systemd-logind[1103]: Removed session 26. Feb 9 19:43:24.674037 systemd[1]: run-containerd-runc-k8s.io-31a2153d873b945f2afc1ceb613163345d2718e5499cb1102408717c90a53bfe-runc.GGu0Ui.mount: Deactivated successfully. Feb 9 19:43:24.898508 env[1111]: time="2024-02-09T19:43:24.898461294Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:24.900332 env[1111]: time="2024-02-09T19:43:24.900304606Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:24.901942 env[1111]: time="2024-02-09T19:43:24.901922630Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:24.905671 env[1111]: time="2024-02-09T19:43:24.905635353Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:24.906421 env[1111]: time="2024-02-09T19:43:24.906397651Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 9 19:43:24.908079 env[1111]: time="2024-02-09T19:43:24.908050451Z" level=info msg="CreateContainer within sandbox \"528ba04164840a9db6c0c6138fb6b4d1feca344ffd85662c3f2fb4e642af2216\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 19:43:24.917836 env[1111]: time="2024-02-09T19:43:24.917787911Z" level=info msg="CreateContainer within sandbox \"528ba04164840a9db6c0c6138fb6b4d1feca344ffd85662c3f2fb4e642af2216\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"fb53fe4217a1b463494eb65ce3c31ab6e710854a62c19b7188ce24fdfce233b8\"" Feb 9 19:43:24.918260 env[1111]: time="2024-02-09T19:43:24.918238957Z" level=info msg="StartContainer for \"fb53fe4217a1b463494eb65ce3c31ab6e710854a62c19b7188ce24fdfce233b8\"" Feb 9 19:43:24.931748 systemd[1]: Started cri-containerd-fb53fe4217a1b463494eb65ce3c31ab6e710854a62c19b7188ce24fdfce233b8.scope. Feb 9 19:43:24.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.944000 audit: BPF prog-id=184 op=LOAD Feb 9 19:43:24.944000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.944000 audit[4684]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4586 pid=4684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:24.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662353366653432313761316234363334393465623635636533633331 Feb 9 19:43:24.944000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.944000 audit[4684]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4586 pid=4684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:24.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662353366653432313761316234363334393465623635636533633331 Feb 9 19:43:24.945000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.945000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.945000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.945000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.945000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.945000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.945000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.945000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.945000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.945000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.945000 audit: BPF prog-id=185 op=LOAD Feb 9 19:43:24.945000 audit[4684]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000296ab0 items=0 ppid=4586 pid=4684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:24.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662353366653432313761316234363334393465623635636533633331 Feb 9 19:43:24.945000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.945000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.945000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.945000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.945000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.945000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.945000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.945000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.945000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.945000 audit: BPF prog-id=186 op=LOAD Feb 9 19:43:24.945000 audit[4684]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000296af8 items=0 ppid=4586 pid=4684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:24.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662353366653432313761316234363334393465623635636533633331 Feb 9 19:43:24.945000 audit: BPF prog-id=186 op=UNLOAD Feb 9 19:43:24.945000 audit: BPF prog-id=185 op=UNLOAD Feb 9 19:43:24.945000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.945000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.945000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.945000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.945000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.945000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.945000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.945000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.945000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.945000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:24.945000 audit: BPF prog-id=187 op=LOAD Feb 9 19:43:24.945000 audit[4684]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000296f08 items=0 ppid=4586 pid=4684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:24.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662353366653432313761316234363334393465623635636533633331 Feb 9 19:43:24.975683 env[1111]: time="2024-02-09T19:43:24.975623996Z" level=info msg="StartContainer for \"fb53fe4217a1b463494eb65ce3c31ab6e710854a62c19b7188ce24fdfce233b8\" returns successfully" Feb 9 19:43:25.066000 audit[4732]: NETFILTER_CFG table=filter:124 family=2 entries=10 op=nft_register_rule pid=4732 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:43:25.066000 audit[4732]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fff7f8fa940 a2=0 a3=7fff7f8fa92c items=0 ppid=2172 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:25.066000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:43:25.069000 audit[4732]: NETFILTER_CFG table=nat:125 family=2 entries=44 op=nft_register_rule pid=4732 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:43:25.069000 audit[4732]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7fff7f8fa940 a2=0 a3=7fff7f8fa92c items=0 ppid=2172 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:25.069000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:43:25.419000 audit[4695]: AVC avc: denied { watch } for pid=4695 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_43_19.1451894796/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c479,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c479,c1023 tclass=file permissive=0 Feb 9 19:43:25.419000 audit[4695]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c06160 a2=fc6 a3=0 items=0 ppid=4586 pid=4695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c479,c1023 key=(null) Feb 9 19:43:25.419000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:43:25.599330 kubelet[2010]: I0209 19:43:25.599288 2010 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-cbf97f889-ljqjq" podStartSLOduration=3.126183008 podCreationTimestamp="2024-02-09 19:43:18 +0000 UTC" firstStartedPulling="2024-02-09 19:43:20.433571049 +0000 UTC m=+91.181050065" lastFinishedPulling="2024-02-09 19:43:24.90664462 +0000 UTC m=+95.654123636" observedRunningTime="2024-02-09 19:43:25.598901735 +0000 UTC m=+96.346380751" watchObservedRunningTime="2024-02-09 19:43:25.599256579 +0000 UTC m=+96.346735595" Feb 9 19:43:25.615000 audit[4741]: NETFILTER_CFG table=filter:126 family=2 entries=10 op=nft_register_rule pid=4741 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:43:25.615000 audit[4741]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc6663ebb0 a2=0 a3=7ffc6663eb9c items=0 ppid=2172 pid=4741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:25.615000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:43:25.617000 audit[4741]: NETFILTER_CFG table=nat:127 family=2 entries=44 op=nft_register_rule pid=4741 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:43:25.617000 audit[4741]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffc6663ebb0 a2=0 a3=7ffc6663eb9c items=0 ppid=2172 pid=4741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:25.617000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:43:28.357901 kubelet[2010]: E0209 19:43:28.357850 2010 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:43:29.380411 systemd[1]: Started sshd@26-10.0.0.29:22-10.0.0.1:49942.service. Feb 9 19:43:29.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.29:22-10.0.0.1:49942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:29.381381 kernel: kauditd_printk_skb: 73 callbacks suppressed Feb 9 19:43:29.381444 kernel: audit: type=1130 audit(1707507809.379:1546): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.29:22-10.0.0.1:49942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:29.420000 audit[4743]: USER_ACCT pid=4743 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:29.421966 sshd[4743]: Accepted publickey for core from 10.0.0.1 port 49942 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:43:29.423827 sshd[4743]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:43:29.422000 audit[4743]: CRED_ACQ pid=4743 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:29.427182 kernel: audit: type=1101 audit(1707507809.420:1547): pid=4743 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:29.427256 kernel: audit: type=1103 audit(1707507809.422:1548): pid=4743 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:29.427293 kernel: audit: type=1006 audit(1707507809.422:1549): pid=4743 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 9 19:43:29.427797 systemd-logind[1103]: New session 27 of user core. Feb 9 19:43:29.428521 systemd[1]: Started session-27.scope. Feb 9 19:43:29.429690 kernel: audit: type=1300 audit(1707507809.422:1549): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb292a570 a2=3 a3=0 items=0 ppid=1 pid=4743 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:29.422000 audit[4743]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb292a570 a2=3 a3=0 items=0 ppid=1 pid=4743 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:29.432620 kernel: audit: type=1327 audit(1707507809.422:1549): proctitle=737368643A20636F7265205B707269765D Feb 9 19:43:29.422000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:43:29.433000 audit[4743]: USER_START pid=4743 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:29.438165 kernel: audit: type=1105 audit(1707507809.433:1550): pid=4743 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:29.435000 audit[4745]: CRED_ACQ pid=4745 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:29.441581 kernel: audit: type=1103 audit(1707507809.435:1551): pid=4745 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:29.537371 sshd[4743]: pam_unix(sshd:session): session closed for user core Feb 9 19:43:29.537000 audit[4743]: USER_END pid=4743 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:29.539880 systemd[1]: sshd@26-10.0.0.29:22-10.0.0.1:49942.service: Deactivated successfully. Feb 9 19:43:29.540555 systemd[1]: session-27.scope: Deactivated successfully. Feb 9 19:43:29.541113 systemd-logind[1103]: Session 27 logged out. Waiting for processes to exit. Feb 9 19:43:29.537000 audit[4743]: CRED_DISP pid=4743 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:29.541950 systemd-logind[1103]: Removed session 27. Feb 9 19:43:29.544142 kernel: audit: type=1106 audit(1707507809.537:1552): pid=4743 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:29.544192 kernel: audit: type=1104 audit(1707507809.537:1553): pid=4743 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:29.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.29:22-10.0.0.1:49942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'